A Microsoft cloud service that enables deployment of Azure services across hybrid and multicloud environments.
Hello Mark !
Thank you for posting on MS Learn Q&A.
This doesn't look like a simple app misconfiguration because when I check the docs and the broader 1.56 incident, I would treat this as either a 1.56 Windows regression affecting HIMDS or token access paths or an ACL or inheritance issue on the individual token files not just the tokenfolder itself and that would also explain why only some app pools failed while others with the same configuration still worked.
I found this old thread :
https://learn.microsoft.com/en-us/answers/questions/5558004/arc-service-fail-after-upgrade-to-v1-56
You can compare ACLs on the folder and on the actual .key files for a working site versus a failing site and the exception you shared is on a specific file so folder membership alone may not prove the file inherited the expected ACEs.
You can verify also if the failing worker process token actually contains the group SID at runtime because group membership on the identity object is one thing and the running w3wp.exe token is what matters.
You can review also Arc HIMDS logs and Windows events around the recycle time because it can be related to HIMDS agent failure and azcmagent check --include-all --verbose helped confirm the problem.
I would avoid keeping IIS_IUSRS on the token folder long term unless you have no alternative because MS model is to scope access through hybrid agent extension apps and not broad IIS worker access.