I am using Azure KeyVault to store my database credentials, Now to access it I have hardcoded client id and client secret in service code. How can I avoid this hard coding as its insecure?
1) I don't want to store client id and client secret in certificates, as
deployed certificates are again insecure
2) My app is not hosted on Azure App service, so I can't use App Settings to
store client id and client secret.
Is there a way to make Azure Active Directory return access token only if a request is made from my app URL? else How can I protect client id and client secret from hackers