Where Secrets Are Used
The current product uses saved secrets in multiple places, including:- Cal.com integration credentials
- SIP trunk authentication passwords
- MCP server headers and query parameters
- custom API actions and other agent-side authenticated calls
Create a Secret
Choose whether it starts enabled
Leave Enabled on for active use, or turn it off if you want to save the value before rollout.
Inventory and Statuses
The inventory table shows:- Name
- Status
- Usage count
- Last used
| Status | Meaning |
|---|---|
| Active | The secret is enabled and ready for supported references |
| Disabled | The secret stays stored but should not be used for active workflows |
| Missing | A referenced secret value is unavailable and needs attention |
Edit, Disable, and Rotate
- Edit a secret to rename it or replace the stored value.
- When you edit an existing secret, you can leave the value blank to keep the current value.
- Disable a secret when you want to pause new usage without deleting the record.
- Review usage references before rotation so you know which downstream flows are affected.
Delete Behavior
You can delete a secret only when it is not in use. If a secret still has active references, the platform blocks deletion until you remove or update those references.Best Practices
Create one secret per integration context
Create one secret per integration context
Keep production, staging, and sandbox credentials separate so you can rotate or disable them independently.
Name secrets for searchability
Name secrets for searchability
Prefer stable, descriptive names over generic labels like
API key or token.Rotate after exposure or ownership changes
Rotate after exposure or ownership changes
Replace values immediately after a suspected leak or when the owning system changes.
Review unused secrets regularly
Review unused secrets regularly
Remove stale credentials once you confirm they are no longer referenced.
Next Steps
Integrations
Connect third-party services for supported workflows
Webhooks
Configure signed event delivery to your own systems
API Keys
Manage direct programmatic access to the platform
Custom API Actions
Use external APIs from your agents