Manager

Estimated reading: 2 minutes 5232 views

Introduction

The Credential Manager securely stores sensitive information such as usernames, passwords, tokens, pins, keys, and other configuration assets in encrypted form. This ensures that critical data is protected and inaccessible to unauthorized users.

The Credential Vault acts as a centralized and secure location for managing these items. It provides administrative access to view, update, or rotate credentials and other stored data as needed.

All stored information is encrypted and maintained in a secure database to uphold strict security standards. For example, when a robot needs to access a webpage, tool, application, or external system, the required credentials and tokens can be securely retrieved from the vault—eliminating the need to hardcode sensitive data within workflows. Click here to learn more about where the configured credentials are stored. 

By integrating the Credential Manager within each project, it significantly reduces the risk of credential exposure and enhances the overall security of automation processes.

Use cases

1. Web and Desktop Applications: In automation scenarios involving websites or desktop applications, bots often need to log in repeatedly using credentials.
2. Cloud Platforms (e.g., Azure, AWS, GCP): Accessing cloud services typically requires API keys, access tokens, client secrets, or service principal credentials.
3. Database Access: Bots that interact with databases for data extraction, reporting, or updating records require authentication credentials like database usernames and passwords.
4. Third-Party API Integrations: Many automation workflows involve integration with third-party APIs such as payment gateways, CRM systems, or messaging platforms (e.g., Twilio, Salesforce).
5. Internal Tools and Systems: Organizations often use custom tools and internal systems that require secured access.
6. Shared Assets and Configuration: Beyond login credentials, the Credential Manager can also store non-sensitive but critical data such as configuration values, environment-specific tokens, or encryption keys needed during execution.

To learn more about credential vault, refer the credential vault documentation.  

Share this Doc

Manager

Or copy link

CONTENTS