-
Notifications
You must be signed in to change notification settings - Fork 11
Description
Is your feature request related to a problem? Please describe.
For Azure resources we have the capability get secrets from some services via list functions (https://learn.microsoft.com/en-us/azure/azure-resource-manager/bicep/bicep-functions-resource#list) or getSecret (https://learn.microsoft.com/en-us/azure/azure-resource-manager/bicep/bicep-functions-resource#getsecret) for Key Vault secrets. As far as I understand there is no such option for Entra applications and service principals.
There are still a lot of Azure services that require application and secret in order to configure something. One such example is credential provider for Azure APIM https://learn.microsoft.com/en-us/azure/api-management/credentials-how-to-azure-ad but of course there are many other. Of course the APIM option is in that format so it can allow external Entra tenants to the APIM instance but in Bicep would be good if you can pull the secret directly by referencing the application, instead of getting the secret value and storing it in Key Vault and pulling it from there. I do not know if this is possible as there might not be the option to pull secret at all from Application besides the first time it is being created. Is there possibility such option to be added? Other method would be to be able to create secrets from Bicep to Entra applications. In such scenarios we should be able to create the secret by specifying its value. We could pull the value from Key Vault so we can add the secret to the application/service principal.
Describe the solution you'd like
A clear and concise description of what you want to happen.
Additional context
Add any other context or screenshots about the feature request here.