Secret Store
The Secret Store lets you securely save API keys, tokens, passwords, and other credentials that your Agent Studio automations can use. Secrets are encrypted and stored in Google Secret Manager — values are never visible after saving.Accessing the Secret Store
- Navigate to Settings from the main menu
- Select Secret Store from the settings sidebar
Managing Secrets
Creating a Secret
- Click Add Secret
- Enter a unique Key name (e.g.,
OPENAI_API_KEY,SLACK_WEBHOOK_TOKEN) - Enter the secret Value in the password field
- Click Add Secret to save
Updating a Secret
- Click the edit (pencil) icon next to the secret
- Enter the new value — the previous value is not shown
- Click Update Secret
Deleting a Secret
- Click the delete (trash) icon next to the secret
- Confirm the deletion in the dialog
Using Secrets in Agent Studio
Secrets from the Secret Store are available in components that support authentication, such as the API Call V2 component.Example: API Call with Bearer Token
- Create a secret with key
MY_API_TOKENand your token as the value - In Agent Studio, add an API Call V2 component
- Set Authentication to Bearer Token
- Click the refresh icon on Secret Value to load your secrets
- Select
MY_API_TOKENfrom the dropdown
Supported Authentication Types
| Auth Type | Secret Used As |
|---|---|
| API Key | The API key value sent in a header or query parameter |
| Bearer Token | The token in the Authorization: Bearer <token> header |
| Basic Auth | The password (username is configured separately) |
Security
- Secrets are encrypted at rest in Google Secret Manager
- Secret values are never displayed in the UI after creation (always shown as
••••••••) - Each organization’s secrets are isolated — no cross-tenant access
- Only admins can create, update, or delete secrets
- Secrets are accessed at runtime only by the automation engine
Best Practices
Use specific, descriptive key names
Use specific, descriptive key names
Name secrets after their purpose and service:
SLACK_WEBHOOK_URL, SALESFORCE_REFRESH_TOKEN, SENDGRID_API_KEY.Rotate secrets regularly
Rotate secrets regularly
Update secrets periodically, especially after team member changes or suspected exposure.
One secret per purpose
One secret per purpose
Avoid reusing the same secret across unrelated integrations. This makes rotation easier and limits blast radius if a secret is compromised.