Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow the OIDC extension client secret to be provided by an Environment Variable #35897

Open
biggles007 opened this issue Oct 21, 2024 · 1 comment
Labels
enhancement New feature or request extension/oidcauth needs triage New item requiring triage

Comments

@biggles007
Copy link

Component(s)

extension/oidcauth

Is your feature request related to a problem? Please describe.

Allowing the simple rotation of client secrets in the oidcauth extension at scale in cloud deployments

Describe the solution you'd like

Many aspects of the OTEL SDK are configurable through environment variables, extending this to the oidcauth extension would allow the simple rotation of secrets at large scale. For example, Azure Functions/App Service allow for Key Vault secrets to be passed in through environment variables, these can be rotated in the Key Vault and will then be refreshed within 24 hours.

Describe alternatives you've considered

I'm aware the _file option could be used, but there is no ability to change files easily in many cloud services once they have been deployed.

Additional context

No response

@biggles007 biggles007 added enhancement New feature or request needs triage New item requiring triage labels Oct 21, 2024
Copy link
Contributor

Pinging code owners:

See Adding Labels via Comments if you do not have permissions to add labels yourself.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request extension/oidcauth needs triage New item requiring triage
Projects
None yet
Development

No branches or pull requests

1 participant