What are Credentials?
Credentials in Flowise are secure storage objects for API keys, tokens, and authentication information required by nodes to connect to external services. They provide centralized, encrypted management of sensitive data, ensuring your integrations work without exposing secrets in your workflow configurations.Credentials are encrypted before storage and are never included in exported chatflows or agentflows, protecting your sensitive data.
Credential Architecture
Credential Structure
Credentials are stored as database entities:Credential Types
Each credential type is defined by a credential class:Credential types are loaded from
flowise-components/dist/credentials at server startup, similar to how nodes are loaded.Supported Credential Types
Flowise supports credentials for numerous services:AI Providers
OpenAI, Anthropic, Google, Azure, Cohere, Hugging Face
Cloud Services
AWS, Azure, Google Cloud, Cloudflare
Databases
Pinecone, Supabase, MongoDB, Postgres, Astra
Search & APIs
SerpAPI, Brave Search, Serper, Tavily
Integrations
Airtable, Notion, GitHub, GitLab, Slack
Custom
MCP Servers, Custom APIs, Webhooks
Credential Lifecycle
Creating Credentials
Provide Details
Enter required information:
- Credential name (for your reference)
- API keys, tokens, or authentication details
- Optional configuration parameters
Using Credentials in Nodes
When configuring a node that requires authentication:- Node displays a “Connect Credential” dropdown
- Select from your saved credentials of compatible types
- Credential is linked to the node instance
- At runtime, encrypted data is decrypted and injected
Security Features
Encryption at Rest
Credentials are encrypted before storage:- Algorithm: Industry-standard encryption
- Storage: Only encrypted data is persisted to the database
- Decryption: Happens only at runtime when needed
Workspace Isolation
Credentials are scoped to workspaces:- Each credential belongs to a specific workspace
- Users can only access credentials in their workspace
- Prevents credential leakage between teams or projects
Flow Data Separation
Credentials are NOT included in flow exports:Credential Management
Updating Credentials
To update an existing credential:- Navigate to the credential in the UI
- Edit the encrypted fields
- Save changes
- All nodes using this credential automatically use the updated values
No need to update individual nodes when rotating API keys - just update the credential once.
Deleting Credentials
Before deletion:- Check which chatflows use the credential
- Update or remove those references
- Then safely delete the credential
Credential Icons
Credentials inherit icons from their associated nodes:Advanced Features
Multi-Field Credentials
Some credentials require multiple values:OAuth Credentials
For services requiring OAuth flows:- Credential type includes OAuth endpoints
- User initiates authentication flow
- Access and refresh tokens are stored encrypted
- Tokens are automatically refreshed when expired
Conditional Credentials
Some nodes accept multiple credential types:API Integration
Credential Request Flow
When creating via API:plainDataObj before storage.
Credential Response
When retrieved (for editing):Best Practices
Credential Types Reference
Common Credential Types
OpenAI API (openAIApi)
- OpenAI API Key
- Optional: Organization ID
anthropicApi)
- Anthropic API Key
googleGenerativeAI)
- Google API Key
pineconeApi)
- Pinecone API Key
- Environment (deprecated in newer versions)
supabaseApi)
- Supabase URL
- Supabase API Key
awsCredential)
- Access Key ID
- Secret Access Key
- Region
mcpServer)
- Server configuration (command, args, env)
Testing Credentials
While Flowise doesn’t have built-in credential testing, you can verify credentials by:
- Creating a simple test chatflow
- Using the credential in a basic node
- Running a test query
- Checking for authentication errors
Troubleshooting
Credential Not Appearing in Dropdown- Ensure credential type matches node’s
credentialNames - Check that credential was saved successfully
- Verify workspace permissions
- Verify API key is correct and active
- Check API key permissions/scopes
- Confirm service is not experiencing outages
- Review rate limits and quotas
- Credentials are not included in exports (security feature)
- Manually recreate credentials in the target environment
- Reconnect credentials to imported nodes
Related Concepts
- Nodes - Using credentials in node configurations
- Chatflows - Building workflows with authenticated nodes
- Agentflows - Using credentials in autonomous workflows