The Harness UI allows configuring an Azure Key Vault secret manager connector using delegate credentials — System-assigned or User-assigned Managed Identity — without storing an Azure client secret in Harness.
The Terraform resource for the same connector currently treats client_id, tenant_id, and secret_key as required arguments. Passing null or omitting them for MSI-style configuration fails with errors such as:
Error: Missing required argument
The argument "client_id" is required, but no definition was found.
The argument "tenant_id" is required, but no definition was found.
The argument "secret_key" is required, but no definition was found.
That forces ManualConfig-style usage in Terraform, where secret_key must reference the Harness Built-in Secret Manager, which conflicts with org policies that do not allow storing connector credentials in the harness built-in secret manager.
Please update the Harness Terraform provider (and document behavior) so that harness_platform_connector_azure_key_vault match