Skip to content

Commit

Permalink
Drop images from secrets
Browse files Browse the repository at this point in the history
  • Loading branch information
topher-lo committed Nov 7, 2024
1 parent 6605b36 commit abfa124
Showing 1 changed file with 0 additions and 8 deletions.
8 changes: 0 additions & 8 deletions docs/platform/secrets.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -11,14 +11,10 @@ Secrets are encrypted at rest and stored in the database.

Secrets are scoped to a workspace. To add a secret, navigate to the **Credentials** page and click on the **Create Secret** button.

![Create secret](/img/platform/credentials/create-secret.png)

## Retrieving secrets in workflows

To get a secret and use it in an action input, use the `SECRETS.<secret-name>.<secret-key>` syntax.

![Retrieve secret](/img/platform/credentials/retrieve-secret.png)

Tracecat will automatically replace the expression with the secret value at runtime.
Retrieved secrets are deleted from memory after the workflow run completes.

Expand All @@ -31,8 +27,6 @@ Retrieved secrets are deleted from memory after the workflow run completes.
Pre-built integrations require a specific secret name and required keys.
For example, the VirusTotal integration requires a secret with the name `virustotal` and the key `VIRUSTOTAL_API_KEY`.

![VirusTotal integration](/img/platform/credentials/virustotal-integration.png)

Different integrations may require different required and optional keys.
For example, Tracecat's AWS integration is configured with the following secret with optional keys:

Expand Down Expand Up @@ -60,8 +54,6 @@ Check out the [Quickstart](/tutorials/1-quickstart) tutorial for a step-by-step
Tracecat also supports organization-level secrets that are accessible to all workspaces within an organization.
To create an organization-level secret, navigate to the **Organization** page and click on the **Create Secret** button.

![Create organization secret](/img/platform/credentials/create-organization-secret.png)

## Multi-tenant secrets

A common use case is to have different sets of the same secret for different tenants or environments.
Expand Down

0 comments on commit abfa124

Please sign in to comment.