Configuring applications to consume secrets