There is no native way to call Azure Key Vault from Power BI, so you would need to call the API, creating the conundrom that to authenticate to Key Vault API, you need to store authentication details.
I have a solution whereby I created a Power BI Dataflow, which returns the SAS Token. The Dataflow is in a locked-down workspace & thus only accessible by trusted users. The M-code does not have the SAS Token in clear text, but is base64 encoded. This is not secure in any way but gives a very small additional obfuscation layer.
Then every single Power BI report that connects to the Azure storage uses the Dataflow to retrieve the token. This means I can change the token in one place when needs be, and all Power BI reports will continue to run smoothly. Anyone can publish, then the credentials to the Power BI dataflow are updated to use a trusted account.
This is not a fool proof & highly secure method, so please use at your own discretion.
Here is an example of the M query in my SAS Token dataflow:
I have already gone through these links and other similar articles from Microsoft (and community forums), but with no success. My requirement is to see if there is an article or sample code snippet to be used in Power BI to call the account key. (I am assuming it would need to be written in the Power Query editor, as I have not been able to locate other settings).