Hi @Jorge Lopez ,
You are correct that currently the out-of-box process requires some manual work and there isn't an automatic rotation feature available yet in the platform itself, but there are several options available for automating the rotation of client secrets.
One option is to use Power Automate to notify of upcoming client secret expiration, as detailed in this article with accompanying Github samples:
Alternatively, you can use a PowerShell script or logic app that runs daily. When it catches a secret expiring within x number of days it will remove the old one and create a new one and push it to the vault. Here is a Logic Apps example: https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/use-azure-logic-apps-to-notify-of-pending-aad-application-client/ba-p/3014603?fbclid=IwAR3ECopMRsitagEStKLC_yvAmFX4a1Ispn_a8ZFitapPquq9OZcZvQgKVOQ
Another option would be to use an Azure Automation account to send logs to a Log Analytics workspace. Then you could set up Azure Monitor alerts to run queries for expiration warnings and errors.
To request an ability rotate secrets from the platform itself, you can leave feedback in the feedback portal. I have shared this feedback as well with the product team. https://feedback.azure.com/
If the information helped you, please Accept the answer. This will help us and improve searchability for others in the community who may be researching the same question.