It seems that Azure Key Vault doesn't support access policies assigned to groups; only ones assigned to users or service principals. It also supports a maximum of 10 access policies per key vault, which means I can't assign all of the people I want to have access individually.
I don't want to pass client secrets around to all developers. In the case of a deployed application, passing a single client secret so that the code can authenticate as a service principal and then get secrets is fine.
Developers authenticate to AAD via NTLM/Kerberos (via ADFS) to get an access token (not via a client secret). By acquiring this access token, they should be able to access securely stored forms of all other secrets required to run our application (just like the production code does when authenticating as a service principal).
How can I accomplish this?