Your CI pipeline deserves better than a tangle of expired secrets and frantic permission updates five minutes before a deployment. Azure Bicep OIDC fixes that mess by letting GitHub Actions or any trusted identity provider request temporary access tokens for Azure. No shared keys, no vault spelunking, just clean automation and predictable state.
Bicep brings structure to Azure Resource Manager templates, while OIDC (OpenID Connect) brings identity you can trust. Combine them, and your infrastructure code talks to Azure using verifiable identity assertions instead of long‑lived secrets. It is security through math, not hope.
When your workflow runs, the OIDC provider issues a signed token with claims about who the workflow really is. Azure validates it against your federated identity setup, then grants the requested role. The scope can be tight—one subscription, one resource group, or a single storage account. After that, the token dies quietly. No human rotation required.
To wire it together, you define a federated credential in Azure AD that trusts your workflow’s OIDC claims. In your pipeline, the azure/login action exchanges the short‑lived OIDC token for an Azure access token. From there, Bicep can deploy resources using that temporary role. The entire path is verifiable, logged, and auditable with your existing identity provider, whether Okta, Entra ID, or GitHub Actions’ native OIDC.
Quick answer: What does Azure Bicep OIDC actually do?
It lets CI workflows authenticate to Azure without storing secrets. Bicep uses Azure AD’s OIDC federation to obtain just‑in‑time credentials, improving both security and automation speed.