1Password protects secrets like logins and credit cards. Secrets Automation protects secrets in your company infrastructure – like API tokens, application keys, and private certificates – and supplies them when and where they’re needed.
Secure, orchestrate, and manage your company’s infrastructure secrets with 1Password Secrets Automation.
Your single source of truth
With Secrets Automation, 1Password now provides one place to house and manage all your secrets, from your team’s logins to infrastructure secrets.
With everything under one roof, there's no more disconnected audit logs, no more second-guessing – and no more wasted time.
Secure by design
Just like 1Password, security isn't a feature. It's the foundation. Secrets Automation is built on the trusted security architecture of 1Password.
Credentials, tokens, and other secrets you store are fully encrypted, and only you hold the keys to decrypt them. We can't see your data, so we can't use it, share it, or sell it.
Connected to the tools you already use
Secrets Automation connects shared secrets directly to the services that require them. HashiCorp Vault, Terraform, Kubernetes, and Ansible are supported out of the box.
You’ll also find ready-to-use client libraries in Go, Node, and Python.View integrations
The 1Password difference
If you've used 1Password, you'll feel right at home with Secrets Automation. You’ll get the same best-in-class user experience, granular access control, and authenticated encryption.
- A seamless user experience leads to fewer vulnerabilities, because no one’s tempted to store secrets in an insecure config file.
- Granular access control gives people and apps access to the right information at the right time, without slowing down development.
- Secrets sync with 1Password.com, so if you rotate a token or create a new one, it’s automatically synced, everywhere.
- Secrets Automation is backed by the same world-class support team that’s been keeping 1Password customers happy since 2005.
Built on 1Password’s best-in-class security foundation
Following the Principle of Least Privilege, you define who has access to what.
Connect Server Logs
Integrate process logs into any SIEM or logging tool of your choice for full visibility.
Connect Activity API
Programmatically request access logs to see which tokens have accessed which secrets.
Secure your infrastructure with 1Password Secrets Automation
Tiers are assigned daily, after analyzing credit usage for that day. Billing occurs monthly, as the sum of the price of each daily tier assigned during the previous month.