Skip to main content
Securely store and manage credentials that agents need to access external services.

How Credentials Work

1

User provides credential

API keys, tokens, or passwords are entered in the platform.
2

Encrypted storage

Credentials are encrypted before being stored.
3

Named reference

Agents reference credentials by name, not value.
4

Platform handles auth

The platform uses credentials on behalf of the agent.

Security Measures

MeasureDescription
Client-side encryptionSecrets encrypted using RSA-OAEP with SHA-256 before transmission
Encrypted storageStored encrypted in database
Key separationPrivate decryption key stored in GCP Secret Manager, not database
Access controlOnly authorized agents can use specific credentials
No LLM exposureCredentials are never exposed to the LLM directly

Credential Types

API Keys

Authentication tokens for external services.

OAuth Tokens

Authorized access to services like Google, Slack.

Passwords

Service account credentials.

Custom Headers

Any authentication scheme via HTTP headers.

Access Control

Credentials can be stored at different levels:
LevelVisibility
Team levelAvailable to all agents in the team
Agent levelOnly available to specific agents
Personal levelOnly available when you’re using the agent

Example: Google Drive Access

When you give an agent access to Google Drive:
  1. You authorize via OAuth
  2. Access token is stored securely
  3. You specify which files/folders the agent can access
  4. Other users with agent access can indirectly access those files
  5. But they cannot access your personal token or other Drive files
Never put credentials directly in agent instructions. Always use the credential system.

Key Rotation

ComponentRotation
Platform keysRotated annually
User credentialsUser-controlled, rotate per your security policy
OAuth tokensRefreshed automatically as needed

Best Practices

Create credentials with only the permissions needed.
Update credentials periodically, especially after team changes.
Review which agents are using which credentials.
Remove credentials when they’re no longer required.