Weird issue when executing az login through winrm

Hi community!

I’ms stuck since a week on a weird issue.
I’m trying to install ARC sql enabled server on a w2K19 SQL 2019 server image by terraform.

When running the powershell configuration script, executed with a remote-exec and winRM connection, I’m raising a python execption in the terraform console.
The most significative warning is null_resource.copy-and-execute-scripts-on-windows (remote-exec): PermissionError: [WinError 5] : ''. It seems that I cannot store a token or whatever?

null_resource.copy-and-execute-scripts-on-windows (remote-exec): ERROR: The command failed with an unexpected error. Here is the traceback:
null_resource.copy-and-execute-scripts-on-windows (remote-exec): ERROR: [WinError 5] : ''
null_resource.copy-and-execute-scripts-on-windows (remote-exec): Traceback (most recent call last):
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\knack/cli.py", line 231, in invoke
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\azure/cli/core/commands/__init__.py", line 657, in execute
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\azure/cli/core/commands/__init__.py", line 720, in _run_jobs_serially
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\azure/cli/core/commands/__init__.py", line 691, in _run_job
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\azure/cli/core/commands/__init__.py", line 328, in __call__
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\azure/cli/core/commands/command_operation.py", line 121, in handler
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\azure/cli/command_modules/profile/custom.py", line 145, in login
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\azure/cli/core/_profile.py", line 160, in login null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\azure/cli/core/auth/identity.py", line 147, in login_with_service_principal
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal/application.py", line 1589, in acquire_token_for_client
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal/oauth2cli/oauth2.py", line 735, in obtain_token_for_client
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal/oauth2cli/oidc.py", line 115, in _obtain_token
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal/oauth2cli/oauth2.py", line 771, in _obtain_token
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal/application.py", line 523, in <lambda>
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal/token_cache.py", line 307, in add
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal/token_cache.py", line 113, in add
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal/token_cache.py", line 184, in __add
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal_extensions/token_cache.py", line 49, in modify
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal_extensions/persistence.py", line 163, in save
null_resource.copy-and-execute-scripts-on-windows (remote-exec): File "D:\a\1\s\build_scripts\windows\artifacts\cli\Lib\site-packages\msal_extensions/windows.py", line 82, in protect

null_resource.copy-and-execute-scripts-on-windows (remote-exec): PermissionError: [WinError 5] : ''

null_resource.copy-and-execute-scripts-on-windows (remote-exec): To open an issue, please run: 'az feedback'
#< CLIXML <Objs Version="1.1.0.1" xmlns="http://schemas.microsoft.com/powershell/2004/04"><Obj S="progress" RefId="0"><TN RefId="0"><T>System.Management.Automation.PSCustomObject</T><T>System.Object</T></TN><MS><I64 N="SourceId">1</I64><PR N="Record"><AV>Preparing modules for first use.</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Completed</T><SR>-1</SR><SD> </SD></PR></MS></Obj><Obj S="progress" RefId="1"><TNRef RefId="0" /><MS><I64 N="SourceId">1</I64><PR N="Record"><AV>Preparing modules for first use.</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Completed</T><SR>-1</SR><SD> </SD></PR></MS></Obj></Objs>#< CLIXML <Objs Version="1.1.0.1" xmlns="http://schemas.microsoft.com/powershell/2004/04"><Obj S="progress" RefId="0"><TN RefId="0"><T>System.Management.Automation.PSCustomObject</T><T>System.Object</T></TN><MS><I64 N="SourceId">1</I64><PR N="Record"><AV>Preparing modules for first use.</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Completed</T><SR>-1</SR><SD> </SD></PR></MS></Obj></Objs>
null_resource.copy-and-execute-scripts-on-windows: Creation complete after 10m25s [id=8907140901669040838] Apply complete! Resources: 41 added, 0 changed, 0 destroyed.

The command that throw exception is:

$azlogin = az login --service-principal -u $AzCred.UserName -p $AzCred.GetNetworkCredential().Password --tenant $servicePrincipalTenantId

I’m calling my script with (I tried Bypass and Unrestricted, same result):

provisioner "remote-exec" { inline = [ "powershell -ExecutionPolicy Unrestricted -File c:\\Temp\\create-arc-sql-server-instance.ps1"]

When I launch locally the script (ie. ont he 2K19 SQL server instance) it IS working…

Please, any help is welcomed!

Thanks