Overview
Secrets store sensitive values like API keys, passwords, database credentials, and certificates.List Secrets
Retrieve all secrets in an organization.Organization ID
Response
Returns all secrets accessible to the current user or service account.Secret unique identifier
Parent organization ID
Secret name/key
Secret value (encrypted)
Optional notes about the secret
When secret was created
Last modification date
Projects containing this secret
Whether user has read access
Whether user has write access
Get Secret
Retrieve a specific secret by ID.Secret ID
List Secrets by Project
Retrieve all secrets in a specific project.Project ID
Create Secret
Create a new secret.Request Body
Secret name/key (e.g., “API_KEY”, “DATABASE_PASSWORD”)
Secret value
Optional description or notes
Projects to add secret to
Secret values are encrypted by the SDK/client before sending to the server.
Update Secret
Update an existing secret.Secret ID
Request Body
Secret name/key
New secret value
Notes about the secret
Projects containing this secret
When the value changes, a new version is automatically created for audit purposes.
Delete Secrets
Delete one or more secrets.Array of secret IDs to delete
Response
Returns results for each deletion attempt:Get Secrets by IDs
Retrieve multiple secrets by their IDs.Array of secret IDs to retrieve
Secret Versioning
Secrets Manager automatically tracks version history when secret values change.Version Information
Each version records:- Secret value at that point in time
- Who made the change (user or service account)
- When the change was made
Accessing Versions
Use the Secret Versions API to:- List all versions of a secret
- View historical values
- Restore previous versions
Access Policies
Control who can access secrets using access policies.User Access
Grant users direct access to secrets:Group Access
Grant groups access to secrets:Service Account Access
Grant service accounts access:Best Practices
Naming Conventions
Use clear, consistent naming:Organization
- Group by Environment: Separate prod, staging, dev
- Use Projects: Group related secrets
- Add Notes: Document what secrets are for
- Rotate Regularly: Update secrets periodically
Security
- Least Privilege: Grant minimum required access
- Use Service Accounts: For automation, not user tokens
- Monitor Access: Review audit logs
- Rotate Keys: Update secrets when team members leave