Infisical currently only supports two methods for connecting to Azure, which are OAuth and Client Secrets.Documentation Index
Fetch the complete documentation index at: https://infisical-saif-eng-4890-add-support-for-oracle-db-access-in.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Self-Hosted Instance
Self-Hosted Instance
- Set up Azure.
Create an application in Azure

Create the application. As part of the form, set the Redirect URI to https://your-domain.com/organization/app-connections/azure/oauth/callback.
Assign API permissions to the application
Azure Client Secrets permissions
Set the API permissions of the Azure application to include the following permissions:- Microsoft Graph
-
Application.ReadWrite.All -
Application.ReadWrite.OwnedBy -
Application.ReadWrite.All(Delegated) -
Directory.ReadWrite.All(Delegated) -
User.Read(Delegated)
-
Add your application credentials to Infisical


Back in your Infisical instance, add two new environment variables for the credentials of your Azure application.INF_APP_CONNECTION_AZURE_CLIENT_SECRETS_CLIENT_ID: The Application (Client) ID of your Azure application.INF_APP_CONNECTION_AZURE_CLIENT_SECRETS_CLIENT_SECRET: The Client Secret of your Azure application.
Client Secret Authentication
Client Secret Authentication
- An active Azure setup.
Assign API permissions to the application
Required API Permissions
Microsoft Graph-
Application.ReadWrite.All -
Application.ReadWrite.OwnedBy -
Application.ReadWrite.All(Delegated) -
Directory.ReadWrite.All(Delegated) -
User.Read(Delegated)
Certificate Authentication
Certificate Authentication
- An active Azure setup.
Assign API permissions to the application
Required API Permissions
Microsoft Graph-
Application.ReadWrite.All -
Application.ReadWrite.OwnedBy -
Application.ReadWrite.All(Delegated) -
Directory.ReadWrite.All(Delegated) -
User.Read(Delegated)
Setup Azure Connection in Infisical
Navigate to App Connections

Create Connection
- OAuth
- Client Secret
- Certificate
Authorize Connection

Automatic Credential Rotation
When using the Client Secret authentication method, Infisical can automatically rotate the Client Secret of your Azure application on a recurring schedule. When enabled, Infisical will immediately generate a new Client Secret on connection creation and revoke the original one, ensuring that no external party retains access using the credentials you provided.Locate the Key ID of your Client Secret

Enable Automatic Credential Rotation

Provide the Client Secret Key ID

Configure the Rotation Schedule
- Rotation Interval – How many days between each rotation.
-
Rotate At – The local time of day at which the rotation will be triggered.





