[Security] Enable secret rotation feature in KV secret provider
Related MR in Infra repo: infra-azure-provisioning!741 (merged)
Current Behavior or Linked Issues
Each Service principal secret has expiration date. When we perform rotation and secret value is updated in Keyvault - KV secret provider is not able to sync new version of the secret into AKS secret. This MR enabling automatic syncing of Keyvault secret to AKS which is expected behaviour.
Does this introduce a breaking change?
- [NO]