W&B Secret Manager allows you to securely and centrally store, manage, and inject secrets, which are sensitive strings such as access tokens, bearer tokens, API keys, or passwords. Configure and manage team secrets in team settings. W&B features can read team secret values, removing the need to paste them or store them in code, training scripts, or plain-text automation configuration. Secrets are stored and managed in each team’s Secret Manager, in the Team secrets section of the team settings.Documentation Index
Fetch the complete documentation index at: https://wb-21fd5541-john-wbdocs-2044-rename-serverless-products.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
- Only W&B Admins can create, edit, or delete a secret.
- Secrets are included as a core part of W&B, including in W&B Server deployments that you host in Azure, Google Cloud, or AWS. Connect with your W&B account team to discuss how you can use secrets in W&B if you use a different deployment type.
-
In W&B Server, you are responsible for configuring security measures that satisfy your security needs.
- W&B strongly recommends that you store secrets in a W&B instance of a cloud provider’s secrets manager provided by AWS, Google Cloud, or Azure, which are configured with advanced security capabilities.
- W&B recommends against using a Kubernetes cluster as the backend of your secrets store unless you are unable to use a W&B instance of a cloud secrets manager (AWS, Google Cloud, or Azure), and you understand how to prevent security vulnerabilities that can occur if you use a cluster.
Where team secrets are used
Team secrets can be used in W&B in multiple contexts. After you add a secret, a feature like W&B Automations can access the secret by name.- Webhook automations: When an automation sends an HTTP request to a webhook, you can attach team secrets for authentication headers and for values referenced in the payload. Automations can be scoped to a project or a Registry. Registry-scoped automations that call a webhook use the same team webhooks and team secrets as project-scoped webhook automations.
- Weave Playground: Provider credentials are supplied as named team secrets. See Add provider credentials and information.
- Sandboxes: Securely provide team secrets to your sandboxes to make them available as environment variables. See Secrets in sandboxes.
- LLM evaluation jobs: Some benchmarks need API keys or tokens stored as team secrets. See the Evaluation benchmark catalog.
Add a secret
To add a secret:- If an external service gives you a token or API key, obtain that value through that service’s normal flow. If necessary, save the sensitive string securely, such as in a password manager, before you paste it into W&B Secret Manager.
- Log in to W&B and go to the team’s Settings page.
- In the Team Secrets section, click New secret.
- Using letters, numbers, and underscores (
_), provide a name for the secret. - Paste the sensitive string into the Secret field.
- Click Add secret.
Once you create a secret, you can access that secret in a webhook automation’s payload using the format
${SECRET_NAME}.Rotate a secret
To rotate a secret and update its value:- Click the pencil icon in the secret’s row to open the secret’s details.
- Set Secret to the new value. Optionally click Reveal secret to verify the new value.
- Click Add secret. The secret’s value updates and no longer resolves to the previous value.
After a secret is created or updated, you can no longer reveal its current value. Instead, rotate the secret to a new value.
Delete a secret
To delete a secret:- Click the trash icon in the secret’s row.
- Read the confirmation dialog, then click Delete. The secret is deleted immediately and permanently.