Configure secrets for identity providers

With component version v2.3, secrets can stored in Vault and be referenced by name.

Configure openshift4_authentication.secrets as following:

parameters:
  openshift4_authentication:
    secrets:
      company-keycloak: (1)
        clientSecret: '?{vaultkv:${cluster:tenant}/${cluster:name}/...}' (2)
1 This will be the metadata.name of the Secret in Kubernetes.
2 In this example clientSecret is a key that goes into the stringData of the Secret.
See Supported identity providers how to configure secret keys for various providers.
See Configure OIDC provider for an example how to reference such secrets.