Overview
Secret managers provide:Centralized Storage
Store all secrets in one secure location
Access Control
Fine-grained permissions on secret access
Audit Trail
Track who accessed which secrets when
Supported Providers
Activepieces supports four secret manager providers:- AWS Secrets Manager
- HashiCorp Vault
- 1Password
- CyberArk Conjur
AWS Secrets Manager
Store secrets in AWS with automatic rotation and IAM integration.Features:- Automatic secret rotation
- IAM-based access control
- Multi-region replication
- CloudTrail audit logging
- AWS-native deployments
- Existing AWS infrastructure
- Compliance requirements
AWS Secrets Manager
Configuration
Storing Secrets
Create secrets in AWS Secrets Manager:Referencing Secrets
Use the format:secretName:jsonKey
The
ap_sep_v1 separator is automatically added by Activepieces to identify secret references.AWS Secret Structure
HashiCorp Vault
Configuration
Storing Secrets
Store secrets in KV v2 engine:Referencing Secrets
Use the format:mount/data/path/key
For KV v2, the path must include
/data/ after the mount point. For KV v1, omit /data/.Vault Path Structure
Namespace Support
For Vault Enterprise with namespaces:1Password
Configuration
Create Service Account
In 1Password, navigate to:
- Settings > Service Accounts
- Create New Service Account
- Grant vault access permissions
Storing Secrets
Create items in 1Password vaults using the app or CLI:Referencing Secrets
Use 1Password’s secret reference format:op://vault/item/field
1Password Reference Syntax
Using Secret Managers
Connection Setup
- Platform Admin
- Connection Status
- Disconnect
Configure secret managers at platform level:
Secret Resolution
Activepieces automatically resolves secret references:Caching
Secret values are cached to reduce API calls:- Cache TTL: 5 minutes (default)
- Connection Status Cache: 30 seconds
- Cache Invalidation: On configuration change
Caching improves performance but means secret changes may take up to 5 minutes to propagate.
Advanced Usage
Nested Secret Resolution
Resolve secrets in nested objects:Conditional Resolution
Resolve only if value looks like a secret:Error Handling
Secret Not Found
Secret Not Found
- Verify secret exists in secret manager
- Check secret path is correct
- Ensure JSON key exists (AWS)
Connection Failed
Connection Failed
- Verify credentials are correct
- Check network connectivity
- Review secret manager logs
Invalid Format
Invalid Format
- Check secret reference format
- AWS: Use
secretName:jsonKey - Vault: Use
mount/data/path/key - 1Password: Use
op://vault/item/field
Security Considerations
Credential Security
Encrypt at Rest
Secret manager credentials are encrypted using AES-256-GCM in the database.
Least Privilege
Grant only necessary permissions:
- AWS:
GetSecretValue,ListSecrets - Vault: Read access to specific paths
- 1Password: Limited vault access
Credential Rotation
Rotate secret manager credentials regularly:
- AWS: Every 90 days
- Vault: AppRole secret IDs monthly
- 1Password: Service account tokens quarterly
Audit Logging
Enable audit logs in your secret manager:
- AWS CloudTrail
- Vault audit devices
- 1Password activity log
Best Practices
Use Dedicated Credentials
Create dedicated IAM users/roles for Activepieces, not personal credentials.
Troubleshooting
Connection Test Fails
Connection Test Fails
AWS:
- Verify IAM credentials are correct
- Check IAM permissions include
secretsmanager:ListSecrets - Ensure region is correct
- Verify Vault URL is accessible
- Check AppRole credentials are valid
- Ensure policy grants
sys/mountsread permission
- Verify service account token is valid
- Check service account has vault access
- Ensure token hasn’t expired
Secrets Not Resolving
Secrets Not Resolving
Check:
- Secret reference format is correct
- Secret exists in secret manager
- Connection is still active
- Cache hasn’t expired (wait 5 minutes)
- No recent configuration changes
Performance Issues
Performance Issues
Solutions:
- Increase cache TTL (requires code change)
- Use secrets sparingly in high-frequency flows
- Deploy secret manager close to Activepieces
- Monitor secret manager API limits
API Reference
Migration Guide
Moving from Environment Variables
Related Topics
Security Practices
General security guidelines
Audit Logs
Track secret access
Environment Setup
Configure deployment