Feature: Enable Microsoft Azure AD (Entra ID) enterprise connections to use certificates instead of client secrets.
Description: Current Azure AD enterprise connections only support connecting to an azure app with a client secret, these secrets have a relatively short expiry (2 years on client secrets compared to the three years on certificates)
Use-case: We currently integrate our auth0 connections into our customers IDP solutions to provide SAML and SSO that is authoritative and controlled by their IDP of choice. The benefit of enabling certificates would allow us an easier process to rotate client managed credentials and a longer expiry time. Not to mention this is the recommended configuration from Microsoft.
Sometimes called a public key , a certificate is the recommended credential type because they’re considered more secure than client secrets
Cross linking another post about the same feature request to try and bump this in the backlog.