Secrets
Secrets let you securely store sensitive credentials like API keys, passwords, and tokens for use in component configurations.
How It Works
Section titled “How It Works”Secrets are key-value stores scoped to your organization. Each secret contains one or more named keys that hold sensitive values.
- Organization-scoped: Accessible to all workflows in the organization
- Encrypted at rest: Secret data is encrypted before storage
- Referenced in configurations: Components reference secrets by name and key, not by value
- Resolved at runtime: Secret values are decrypted and resolved when components execute
Creating Secrets
Section titled “Creating Secrets”Create secrets in Organization Settings > Secrets.
Example secret structure:
A secret named production-ssh-keys containing:
private_key=-----BEGIN OPENSSH PRIVATE KEY-----...passphrase=my-passphrase
Each secret can contain multiple key-value pairs.
Using Secrets in Components
Section titled “Using Secrets in Components”Currently, secrets are available for the SSH Command component. When configuring the SSH Command component, select a secret and key from your organization’s secrets for authentication credentials.
Support for secrets in other components will be added in future releases.
Secret Resolution
Section titled “Secret Resolution”During workflow execution, SuperPlane:
- Looks up the secret by name in the organization
- Decrypts the secret data using the encryption key
- Extracts the specific key from the secret’s key-value pairs
- Provides the value to the component for execution
If a secret or key doesn’t exist, the component execution fails with an error.
Best Practices
Section titled “Best Practices”- Use descriptive names: Name secrets clearly (e.g.
production-keysandstaging-keys) - Organize by service: Group related credentials in a single secret with multiple keys
- Rotate regularly: Update secret values when credentials change
- Don’t hardcode: Always use secret key fields instead of entering values directly
Permissions
Section titled “Permissions”Secret management requires specific permissions:
secrets.read- View organization secrets (but not their values)secrets.create- Create new secretssecrets.update- Update existing secretssecrets.delete- Delete secrets
By default, only Admin and Owner roles have these permissions. See Access Control for details.