externalSecret.enabled: false).
Never commit actual secret values to version control. Use secure secret management practices:
- Store in separate, gitignored values file
- Use Helm
--setflags from CI/CD secrets - Use encrypted secret management (SOPS, sealed-secrets, etc.)
- Prefer external secret stores for production
Database Secrets
Database password.Required: Yes (for database access)Security: Use strong, unique passwords. Rotate regularly.
GitHub Integration Secrets
GitHub personal access token or OAuth token.Auto-Populated: From Replicated license fieldPurpose: Required to pull crewai enterprise repositories.
GitHub token for Crew Studio integration.
GitHub OAuth application client secret.Required For: GitHub OAuth authentication.
Secret token for validating GitHub webhook payloads.Purpose: Ensures webhooks are from GitHub.
Private key for GitHub App authentication.Format: PEM-encoded RSA private key.
Rails Application Secrets
Rails secret key base for session signing and encryption.Default: Auto-generatedAuto-Generation: If not provided, automatically generated using Upgrade Behavior: Once generated, the value persists across Helm upgrades to maintain session continuity.
randAlphaNum 64 and persisted across upgrades via lookup function.Manual Generation:Internal API key for service-to-service authentication.
Application-level encryption key for sensitive data at rest.Auto-Generation: If not provided, automatically generated and persisted across upgrades via
lookup function.Format: Hexadecimal string (recommended: 64 characters).Generation:SSL/TLS Secrets
PEM-encoded private key for application-level TLS.Default: Auto-generated (if
web.tls.autoGenerate: true)Auto-Generation: When web.tls.autoGenerate: true, a self-signed certificate and key are generated and persisted across upgrades.Manual Provision:PEM-encoded certificate for application-level TLS.Default: Auto-generated (if
web.tls.autoGenerate: true)Format: Can include certificate chain (server cert + intermediates).SSL certificate for crew service communication.Default: Auto-generated (if
web.tls.autoGenerate: true)SSL private key for crew service communication.Default: Auto-generated (if
web.tls.autoGenerate: true)AWS Secrets (Optional)
AWS access key ID for S3 and other AWS services.When Required:
STORAGE_SERVICE: amazonwith static credentials- Not using IAM roles (IRSA)
AWS secret access key.
Azure Secrets (Optional)
Azure Storage account access key.When Required:
STORAGE_SERVICE: microsoftAzure service principal client secret.
Microsoft Entra ID (Azure AD) application client secret.When Required:
AUTH_PROVIDER: entra_idSetup: Generate in Azure Portal under App Registrations > Certificates & secrets.Built-in LLM Secrets (Optional)
API key for built-in LLM provider.Purpose: Provides authentication for internal LLM calls used by the CrewAI Platform, including:
- Improving Studio prompts
- Generating automation descriptions
- Chatting with flows
- Other platform AI-assisted features
- Obtain from: https://platform.openai.com/api-keys
- Format:
sk-proj-...orsk-...
- Obtain from: https://console.anthropic.com/settings/keys
- Format:
sk-ant-...
- Configure
envVars.BUILT_IN_LLM_PROVIDERto specify the LLM provider - Configure
envVars.BUILT_IN_LLM_MODELto specify the model
Python Package Registry
PyPI registry URL for enterprise Python packages.Default: Auto-generated (in Replicated deployments)Auto-Generation (Replicated): Automatically built from license credentials:Requirements:
- Customer ID from:
global.replicated.licenseFields.replicated_customer_id - Password from:
global.replicated.dockerconfigjson(registry.crewai.com entry) - Generated URL format:
https://customer_id:password@enterprise-pypi-registry-production.crewai.workers.dev/simple/
- Must use HTTPS protocol
- Must include authentication credentials in format
username:password@host - Must end with
/simple/for PyPI compatibility - Automatically base64-encoded by the chart
Authentication Provider Secrets
Most authentication provider configuration values have moved to
envVars (non-sensitive).
Only the client secret remains in secrets for Entra ID authentication.For complete authentication setup, see the Environment Variables Authentication Configuration section.Built-in Integrations Secrets
OAuth secrets are used when
oauth.enabled: true. These secrets enable secure communication between the Built-in Integrations service and the Rails application for third-party integrations (Gmail, Google Calendar, Microsoft Outlook, etc.).Secret key for signing OAuth session cookies.Auto-Generation: If not provided, automatically generated using
randAlphaNum 64 and persisted across upgrades via lookup function.Purpose: Secures OAuth flow session data.Manual Generation:Encryption key for OAuth tokens stored in the database.Auto-Generation: If not provided, automatically generated as a 64-character hexadecimal string and persisted across upgrades.Format: Hexadecimal string (64 characters).Purpose: Encrypts sensitive OAuth tokens (access tokens, refresh tokens) at rest.Manual Generation:
Internal API key for authentication between the Built-in Integrations service and Rails application.Auto-Generation: If not provided, automatically generated using Note: When set manually, both
randAlphaNum 64 and persisted across upgrades.Important: This value is automatically duplicated as CREWAI_OAUTH_API_KEY for the Rails application. Both keys will always have the same value.Purpose: Enables secure service-to-service communication for OAuth operations.Manual Generation:OAUTH_INTERNAL_API_KEY (used by Built-in Integrations service) and CREWAI_OAUTH_API_KEY (used by Rails) will use this value automatically.OAuth Provider Secrets
OAuth provider secrets are optional and only required if you want to enable specific OAuth integrations. Each provider requires a client ID and client secret obtained from the provider’s developer console.Configuration: OAuth provider credentials are configured via The secrets documented below are the Kubernetes secret keys that are automatically generated from your
oauth.secrets.* values in your Helm values file, which support provider-level defaults and product-specific overrides. See the CrewAI Built-in Integrations Reference - OAuth Secrets Configuration for detailed configuration examples.For example, to configure Google OAuth for all Google products:oauth.secrets.* configuration.Google OAuth client ID for Gmail integration.
Google OAuth client secret for Gmail integration.
Google OAuth client ID for Google Calendar integration.
Google OAuth client secret for Google Calendar integration.
Google OAuth client ID for Google Drive integration.
Google OAuth client secret for Google Drive integration.
Google OAuth client ID for Google Contacts integration.
Google OAuth client secret for Google Contacts integration.
Google OAuth client ID for Google Sheets integration.
Google OAuth client secret for Google Sheets integration.
Google OAuth client ID for Google Slides integration.
Google OAuth client secret for Google Slides integration.
Google OAuth client ID for Google Docs integration.
Google OAuth client secret for Google Docs integration.
Microsoft OAuth client ID for Outlook integration.
Microsoft OAuth client secret for Outlook integration.
Microsoft OAuth client ID for OneDrive integration.
Microsoft OAuth client secret for OneDrive integration.
Microsoft OAuth client ID for Teams integration.
Microsoft OAuth client secret for Teams integration.
Microsoft OAuth client ID for SharePoint integration.
Microsoft OAuth client secret for SharePoint integration.
Microsoft OAuth client ID for Excel integration.
Microsoft OAuth client secret for Excel integration.
Microsoft OAuth client ID for Word integration.
Microsoft OAuth client secret for Word integration.
HubSpot OAuth client ID.
HubSpot OAuth client secret.
Notion OAuth client ID.
Notion OAuth client secret.
