Creating secrets
On the Secrets page, you can store credentials on the platform. You can create:- Login secrets: username and password, with optional TOTP 2FA
- Value secrets: API keys, tokens, and other credential values
Setting up 2FA
When registering a new 2FA device in a service’s dashboard, you’ll typically see both a QR code and a text key likeCLAH6OEOV52XVYTKHGKBERP42IUZHY4D.
If only the QR code is visible, use a QR code reader to view the URL, which looks like:
Best practices
- If the service supports multiple 2FA devices, register an additional device alongside your existing one
- If only one device is allowed, store the secret in your password manager as well. Multiple applications can use the same secret key
Using secrets in tasks
During task creation
When creating a task, simply add the secrets needed to perform the task. For example, if your task is “Retrieve a list of checked-in customers from the hotel management system”, you would select the login secret for that system during creation.During runs
After task creation, you can view which secrets the task uses. Each secret is assigned a descriptive slot name (e.g.MANAGEMENT_LOGIN). When running a task, you can change which credentials to use by binding a different secret to this slot:
- In the API: Use the secret_bindings parameter when creating a run
- In the dashboard: You’ll be prompted to select which secret to use in the “Run” dialog
Example: You create a task to retrieve checked-in customers from your Hotel Management System and provide your credentials during creation.After creation, you see the task uses a slot named
MANAGEMENT_LOGIN.
At runtime, you can switch to different credentials by updating the secret bindings: