Key Features
Encrypted Storage
All secrets are encrypted at rest using Vault’s seal mechanism. Data is never stored in plaintext.
Version History
Every change creates a new version. View, compare, and rollback to any previous version.
Folder Organization
Organize secrets into folders (paths) for logical grouping by application, environment, or team.
Rotation Tracking
Automatic age tracking with warnings when secrets should be rotated based on policy.
Secret Rotation
Secrets are automatically tracked for age to encourage regular rotation. The system classifies secrets based on how long ago they were last updated:| Status | Age | Meaning |
|---|---|---|
| OK | < 30 days | Recently updated, no action needed |
| Warning | 30-90 days | Consider rotating soon |
| Critical | > 90 days | Rotate immediately |
Rotation status is calculated from the secret’s last update time. Any change to a secret (adding, modifying, or deleting keys) creates a new version and resets the age counter.
Required Permissions
| Action | Permission |
|---|---|
| View/Read secrets | iam:project:cicd:vault:read |
| Create/Update secrets | iam:project:cicd:vault:write |
| Delete secrets | iam:project:cicd:vault:delete |
Concepts
Mounts
A mount is a logical grouping of secrets, similar to a filesystem mount point. Common mounts include:secret/- General purpose key-value secretsdatabase/- Database credentialskv/- Key-value store
Paths
Paths organize secrets within a mount. Use slashes to create folder hierarchies:Keys
Each secret contains one or more key-value pairs. For example, a database secret might have:username: the database usernamepassword: the database passwordhost: the database hostname
How to Navigate Secrets
Browse Folders
Click on folders to navigate deeper into the path hierarchy. The breadcrumb shows your current location.
How to Create a Secret
Enter Secret Path
Provide a name for the secret. Use slashes to create subfolders:
database- Creates secret at current pathapp/config- Createsappfolder andconfigsecret inside
Add Key-Value Pairs
Add one or more key-value pairs:
- Enter a key name (e.g.,
password) - Enter the value (hidden by default)
- Toggle JSON for complex data structures
Secret paths can only contain alphanumeric characters, hyphens, underscores, and slashes. They cannot start or end with a slash.
How to View and Edit a Secret
Row View vs JSON View
Toggle between two editing modes:| Mode | Best For | Features |
|---|---|---|
| Row View | Simple key-value pairs | Individual field editing, show/hide per value |
| JSON View | Complex structures | Full Monaco editor, syntax highlighting, paste JSON |
{}) to switch to JSON view. Click the list icon to return to row view.
How to Add a New Key
Enter Details
A new row appears at the top:
- Enter the key name
- Enter the value
- Toggle JSON if needed
How to Delete a Key
How to Delete a Secret
How to Copy Values
- Single Value: Click the copy icon on any row to copy that value
- All Values: Click the clipboard icon in the toolbar to copy the entire secret as JSON
Version History
Every change to a secret creates a new version. Access version history to:- View previous values
- Compare versions side-by-side
- Rollback to a previous state
- Destroy old versions permanently
How to View Version History
Browse Versions
The left panel shows all versions with status:
- Current: Active version
- Available: Can be viewed or rolled back
- Deleted: Soft-deleted, can be restored
- Destroyed: Permanently removed
How to Compare Versions
How to Rollback to a Previous Version
Rollback creates a new version rather than overwriting. This preserves the complete audit trail.
How to Destroy a Version
Working with JSON Values
For complex data structures, enable JSON mode on individual keys:Troubleshooting
Cannot see secrets
Cannot see secrets
- Verify you have read permission for Vault
- Check that the mount exists and is accessible
- Ensure you’re in the correct project context
Cannot create or edit secrets
Cannot create or edit secrets
- You need write permission for Vault
- The secret path may already exist (use a different name)
- Check for invalid characters in the path
JSON validation error
JSON validation error
- Check for missing commas between key-value pairs
- Ensure strings are wrapped in double quotes
- Validate brackets and braces match
- Use a JSON validator to find syntax errors
Version history empty
Version history empty
- New secrets have only one version initially
- Make and save changes to create new versions
- Destroyed versions don’t appear in history
Cannot rollback
Cannot rollback
- You need write permission to rollback
- Destroyed versions cannot be rolled back
- The target version may be corrupted
Secret age showing critical
Secret age showing critical
- This is a policy reminder, not an error
- Rotate the secret by updating its values
- Any change creates a new version and resets the age
FAQ
How are secrets encrypted?
How are secrets encrypted?
Secrets are encrypted using Vault’s seal mechanism with AES-256-GCM. The encryption key is protected by the unseal keys and never stored in plaintext.
Who can access my secrets?
Who can access my secrets?
Access is controlled by Vault policies. Only users with appropriate permissions can read, write, or delete secrets in specific paths.
Can I recover a deleted secret?
Can I recover a deleted secret?
Soft-deleted secrets can be recovered if not yet destroyed. Destroyed secrets are permanently removed and cannot be recovered.
How long is version history kept?
How long is version history kept?
Version history is kept indefinitely unless explicitly destroyed. Storage policies may vary by installation.
Can I reference secrets in pipelines?
Can I reference secrets in pipelines?
Yes. Secrets can be injected into pipeline environments using the Vault integration. See pipeline documentation for details.
What's the difference between delete and destroy?
What's the difference between delete and destroy?
Delete removes the current version but keeps it recoverable. Destroy permanently removes the data with no recovery possible.