Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.crewai.com/llms.txt

Use this file to discover all available pages before exploring further.

Overview

The Secrets Manager feature lets your organization connect an external secret store — AWS Secrets Manager, Google Cloud Secret Manager, or Azure Key Vault — and reference those secrets directly from environment variables on your automations and crews. Instead of pasting plaintext values into the platform, you store one set of credentials per provider and refer to secrets by name. This gives you:
  • Centralized storage — manage secrets in your provider rather than editing CrewAI Platform configuration. CrewAI Platform keeps no plaintext copy of the secret value.
  • Reduced exposure — sensitive values never live in plaintext in your CrewAI Platform configuration.
  • Cloud-native auditability — your provider’s audit log records every secret read.
Secrets Manager (both the static-credentials and Workload Identity paths) requires CrewAI runtime version 1.14.5 or later in the automation pod image.

Two Paths: Static Credentials vs Workload Identity

There are two ways to wire CrewAI Platform up to your cloud’s secret store. They differ significantly in rotation behavior, so choose based on how often your secrets rotate and how strict your security posture is.
AspectStatic CredentialsWorkload Identity (OIDC Federation)
AuthenticationLong-lived access keys / service account JSON stored in CrewAI PlatformShort-lived tokens minted per worker process; no static credentials stored anywhere
Rotation propagationResolved at deploy time and baked into the deployment’s container image — rotated values require a re-deployResolved at automation execution time — rotated values propagate to the next kickoff with no re-deploy
Setup effortLower — paste keys / upload service account JSONHigher — register CrewAI Platform as an OIDC provider in your cloud, configure trust policies
Best forGetting started, infrequently-rotated secrets, single-account deploymentsProduction, frequently-rotated secrets, compliance-driven environments that prohibit long-lived credentials
Both paths use the same UI flow to reference secrets in environment variables (see Using the Secrets Manager). The difference is entirely in how the platform authenticates to your cloud and when it reads the secret value.

Choose your setup guide

The Secrets Manager and Workload Identity UIs are currently labeled Beta in CrewAI Platform.

How It Fits Together

Setting up Secrets Manager is a three-step flow that involves both your cloud provider and CrewAI Platform:
  1. An admin configures a provider credential. This is the cloud-side work — and the work differs depending on which path (static credentials or Workload Identity) you choose. Provider-specific guides cover this end to end.
  2. An admin (or a permitted member) references a secret in an environment variable. From the Environment Variables page, the user picks a provider credential and selects the secret name. See Using the Secrets Manager.
  3. The automation receives the resolved value at runtime. When a crew or automation runs, CrewAI Platform fetches the secret from your provider and injects it as the environment variable’s value. With Workload Identity, this fetch happens on every kickoff (rotation-aware). With static credentials, this fetch happens at deploy time and the value is baked into the deployment image.

Visibility & Scope

WI-backed environment variables follow the same assignment model as plaintext environment variables: an automation resolves only the WI-backed variables explicitly assigned to it. Assign a WI-backed variable to an automation from the Environment Variables page on that automation; variables defined at the organization level or in a Studio project are not resolved at kickoff until you assign them.
The secret-fetch stage runs on every kickoff but only does work when WI-backed environment variables are assigned to the deployment. For each assigned variable, the runtime resolves the value from your cloud provider on every crew, flow, training, test, or checkpoint-restore kickoff and writes it into the process environment. With nothing assigned, the stage is a no-op. Otherwise, cost is proportional to the number of assigned variables: a small added latency per kickoff plus one cloud-side audit-log entry per variable.
At the Workload Identity configuration level, scope is still organization-wide today. Every automation in the organization is bootstrapped against every Workload Identity configuration the org has registered, and you cannot today bind a specific Workload Identity configuration to a specific automation. Per-automation Workload Identity scoping is on the roadmap. Until then, only register Workload Identity configurations every automation in your organization is allowed to use.

Permissions

Two CrewAI Platform features control access to Secrets Manager:
  • secret_providers — controls who can view or manage provider credentials.
  • environment_variables — controls who can create and edit environment variables (including those that reference secrets).
A third feature controls Workload Identity setup:
  • workload_identity_configs — controls who can view or manage Workload Identity configurations. Required only if you’re using the Workload Identity path.
Owners always have full access. Members do not receive access to secret_providers or workload_identity_configs by default and must be granted permission via a custom role. See Permissions (RBAC) for the full matrix and step-by-step instructions.

Next Steps

Pick your path: