Secrets Management

2 min read

Archestra supports external secrets storage. When enabled, sensitive data like API keys and MCP server credentials are stored externally.

Note: Existing secrets are not migrated when you enable external storage. Recreate secrets after changing the secrets manager.

HashiCorp Vault

Enterprise feature: Contact sales@archestra.ai for licensing information.

To enable Vault, set ARCHESTRA_SECRETS_MANAGER to VAULT and configure the address and authentication method.
See the documentation below for supported authentication methods and configuration instructions.

VariableValue
ARCHESTRA_SECRETS_MANAGERVAULT
ARCHESTRA_HASHICORP_VAULT_ADDRYour Vault server address
ARCHESTRA_HASHICORP_VAULT_AUTH_METHODTOKEN, K8S, or AWS
ARCHESTRA_ENTERPRISE_LICENSE_ACTIVATEDYour license value

Token Authentication

VariableRequiredDescription
ARCHESTRA_HASHICORP_VAULT_TOKENYesVault authentication token

Kubernetes Authentication

VariableRequiredDescription
ARCHESTRA_HASHICORP_VAULT_K8S_ROLEYesVault role bound to the Kubernetes service account
ARCHESTRA_HASHICORP_VAULT_K8S_TOKEN_PATHNoPath to SA token (default: /var/run/secrets/kubernetes.io/serviceaccount/token)
ARCHESTRA_HASHICORP_VAULT_K8S_MOUNT_POINTNoVault K8S auth mount point (default: kubernetes)

The K8S auth method requires a Vault role configured with a bound service account. The role must have permissions to read and write secrets under secret/data/archestra/*.

AWS IAM Authentication

VariableRequiredDescription
ARCHESTRA_HASHICORP_VAULT_AWS_ROLEYesVault role bound to the AWS IAM principal
ARCHESTRA_HASHICORP_VAULT_AWS_MOUNT_POINTNoVault AWS auth mount point (default: aws)
ARCHESTRA_HASHICORP_VAULT_AWS_REGIONNoAWS region for STS signing (default: us-east-1)
ARCHESTRA_HASHICORP_VAULT_AWS_STS_ENDPOINTNoSTS endpoint URL (default: https://sts.amazonaws.com)
ARCHESTRA_HASHICORP_VAULT_AWS_IAM_SERVER_IDNoValue for X-Vault-AWS-IAM-Server-ID header (additional security)

Note: If ARCHESTRA_SECRETS_MANAGER is set to VAULT but the required environment variables are missing, the system falls back to database storage.

Secret Storage Paths

Secrets are stored using the KV secrets engine v2:

  • Data path: secret/data/archestra/{secretName}

Database Storage

Secrets are stored in the database by default.
To explicitly configure database storage, set ARCHESTRA_SECRETS_MANAGER to DB.

Secrets Management | Archestra Docs | Archestra