Secrets Management

4 min read

Archestra supports external secrets storage. When enabled, sensitive data like API keys and MCP server credentials are stored externally.

Note: Existing secrets are not migrated when you enable external storage. Recreate secrets after changing the secrets manager.

HashiCorp Vault

Enterprise feature: Contact sales@archestra.ai for licensing information.

To enable Vault, set ARCHESTRA_SECRETS_MANAGER to VAULT and configure the address and authentication method.

VariableValue
ARCHESTRA_SECRETS_MANAGERVAULT
ARCHESTRA_HASHICORP_VAULT_ADDRYour Vault server address
ARCHESTRA_HASHICORP_VAULT_AUTH_METHODTOKEN, K8S, or AWS
ARCHESTRA_ENTERPRISE_LICENSE_ACTIVATEDYour license value

Configure authentication using one of the methods described in Vault Authentication.

Note: If ARCHESTRA_SECRETS_MANAGER is set to VAULT but the required environment variables are missing, the system falls back to database storage.

Secret Storage Paths

Secrets are stored using the KV secrets engine v2:

  • Data path: secret/data/archestra/{secretName}

Readonly Vault

Enterprise feature: Contact sales@archestra.ai for licensing information.

Readonly Vault enables teams to use secrets from their organization's external HashiCorp Vault without Archestra managing those secrets. In this mode, Archestra only reads secrets from Vault at runtime—it never creates, updates, or deletes secrets in your Vault.

Environment Configuration

To enable Readonly Vault, configure the following environment variables:

VariableValue
ARCHESTRA_SECRETS_MANAGERREADONLY_VAULT
ARCHESTRA_HASHICORP_VAULT_ADDRYour Vault server address
ARCHESTRA_HASHICORP_VAULT_AUTH_METHODTOKEN, K8S, or AWS
ARCHESTRA_HASHICORP_VAULT_KV_VERSION1 or 2 (default: 2)
ARCHESTRA_ENTERPRISE_LICENSE_ACTIVATEDYour license value

Configure authentication using one of the methods described in Vault Authentication.

Connecting a Team to a Vault Folder

Each team in Archestra should be linked to a specific vault folder to use external secrets. Team members can then use secrets from that folder when installing MCP servers.

Example: Connecting the Default Team

To connect the default team to a Vault folder at kv/platform/ee/archestra:

  1. Navigate to SettingsTeams
  2. Find the Default team and click the Configure Vault Folder button

Teams page with Configure Vault Folder button

  1. Enter the path: kv/platform/ee/archestra
  2. Click Test Connection to verify access
  3. Click Save Path

Team Vault Folder Configuration Dialog

Using Vault Secrets with MCP Servers

Once a team is connected to a Vault folder, team members can select secrets from Vault when installing MCP servers.

Example: Creating a GitHub MCP Server with Vault Secret

This example shows how to install a remote GitHub MCP server using a personal access token stored in Vault at ghtoken with the key token:

  1. Navigate to MCP Catalog
  2. Find the GitHub MCP server and click Install
  3. Select the team with the configured Vault folder
  4. In the authentication section, select Use Vault Secret
  5. From the Secret dropdown, select ghtoken
  6. From the Key dropdown, select token
  7. Complete the installation

The MCP server will now use the secret value from your Vault at runtime.

MCP Server Installation with Vault Secrets

Required Vault Permissions

Ensure your Vault policy grants Archestra read access to the configured paths:

# For KV v2
path "<mount>/data/<path>/*" {
  capabilities = ["read", "list"]
}

path "<mount>/metadata/<path>/*" {
  capabilities = ["read", "list"]
}

# For KV v1
path "<mount>/<path>/*" {
  capabilities = ["read", "list"]
}

Database Storage

Secrets are stored in the database by default.
To explicitly configure database storage, set ARCHESTRA_SECRETS_MANAGER to DB.

Vault Authentication

Archestra supports three authentication methods for connecting to HashiCorp Vault.

Token Authentication

VariableRequiredDescription
ARCHESTRA_HASHICORP_VAULT_TOKENYesVault authentication token

Kubernetes Authentication

VariableRequiredDescription
ARCHESTRA_HASHICORP_VAULT_K8S_ROLEYesVault role bound to the Kubernetes service account
ARCHESTRA_HASHICORP_VAULT_K8S_TOKEN_PATHNoPath to SA token (default: /var/run/secrets/kubernetes.io/serviceaccount/token)
ARCHESTRA_HASHICORP_VAULT_K8S_MOUNT_POINTNoVault K8S auth mount point (default: kubernetes)

The K8S auth method requires a Vault role configured with a bound service account.

AWS IAM Authentication

VariableRequiredDescription
ARCHESTRA_HASHICORP_VAULT_AWS_ROLEYesVault role bound to the AWS IAM principal
ARCHESTRA_HASHICORP_VAULT_AWS_MOUNT_POINTNoVault AWS auth mount point (default: aws)
ARCHESTRA_HASHICORP_VAULT_AWS_REGIONNoAWS region for STS signing (default: us-east-1)
ARCHESTRA_HASHICORP_VAULT_AWS_STS_ENDPOINTNoSTS endpoint URL (default: https://sts.amazonaws.com)
ARCHESTRA_HASHICORP_VAULT_AWS_IAM_SERVER_IDNoValue for X-Vault-AWS-IAM-Server-ID header (additional security)