Skip to main content

Using Secrets in Conductor

Often, we have requirements where sensitive values are used in workflows. In such situations, secrets can be used to hide these sensitive values on the UI. These values include usernames, passwords, API keys, authorization tokens, etc.

Creating Secrets

Follow the below steps to create and store secrets in Conductor:

  1. From your Orkes Conductor Console, navigate to the Definitions > Secrets option from the left menu. The Secrets page lists all the secrets associated with your account that you have access to.
  2. Click Add Secrets and provide the following values:
    • Secret Name - Reference name for your secret.
    • Secret Value - Provide the value to be stored.
  3. Clicking Add saves the secret.

Using Secrets in Workflow

Once the secret is created, we can use them in the workflow using the variable ${workflow.secrets.secret_name}. Refer to this article on how to pass values to tasks and sub workflows.

Managing Secrets

We can manage secrets using the following ways. In each of these methods, the previous value is replaced with the new value, and the operation cannot be rolled back.

Using UI

Users with access to the secret can update the secret on the UI. Access the left menu "Definitions > Secrets".

Using APIs

The following API endpoints can be invoked with credentials that have permission to update the secret value.

Using a Worker

A common use case is when a secret managed by Conductor is an access token with an expiry. Tokens that expire require a periodic refresh, and this can be easily achieved using a system worker task that can update the secret. This system worker does the same function as a custom worker updating a secret.

Refer to this link for the documentation on how to use this worker: Update Secret.

Refer to this link for the documentation on how to use a workflow to rotate secrets: Rotating Secrets that Expire.

Adding Tags to Secrets

Conductor also provides the provision to add tags to secret keys. This helps in granting permissions to the secret to an entity with tag-based access. Read more about using tags for permissions here.

Secrets as Outputs of Tasks

Often, we might want to use a secret value as an output of a task. This is the case when we want to use the value as an input to a subsequent task. In such cases, we can use the following convention to ensure that output value is managed as a secret.

All values stored in the output object with key name: _secrets will be treated as secrets.

"_secrets" : {
"my-secret-key" : "my-secret-value"
Secrets Management

The users with the execute ability to the task will be able to read the task and will be able to see the inputs and outputs.

Additional Use Cases

In addition to using secrets for sensitive values, we can use them when we need to use a variable specific to an environment. For example - ${workflow.secrets.env-variable-1} - here, env-variable-1 is not necessarily a secret but a value that could be configured differently in each environment, such as UAT vs. Production.


Here is a simple workflow definition that uses a secret in one of the tasks:

"name": "workflow-with-a-secret",
"version": 1,
"tasks": [
"name": "sample_task_http",
"taskReferenceName": "sample_task_http",
"inputParameters": {
"http_request": {
"uri": "",
"method": "GET",
"connectionTimeOut": 3000,
"readTimeOut": "3000",
"accept": "application/json",
"contentType": "application/json",
"headers": {
"Authorization": "Bearer: ${workflow.secrets.sampletask-api-token}"
"type": "HTTP"
"schemaVersion": 2

When we run this workflow, as long as the permissions exist, the value ${workflow.secrets.sampletask-api-token} will be replaced with the value stored in the secrets repository.