Instead of copying secrets into Skyvern, you can point Skyvern at your existing vault and it pulls credentials at runtime. If your organization already manages secrets in a dedicated vault, connect it as a credential source and reference items directly from workflow parameters.Documentation Index
Fetch the complete documentation index at: https://skyvern.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
External providers are configured per-organization. Once connected, any workflow in the organization can reference credentials from that provider.
Choosing a provider
| Source | Credential types | Setup | Best for |
|---|---|---|---|
| Skyvern (default) | Password, Credit Card, Secret | None (built in) | Most users, fastest setup |
| Bitwarden | Password, Credit Card, Identity | Credential parameter config | Teams already using Bitwarden (enterprise) |
| 1Password | Password, Credit Card | Settings page setup | Teams with 1Password service accounts |
| Azure Key Vault | Password (with optional TOTP) | Settings page setup | Enterprise Azure environments |
| Webhook (Custom API) | Password, Credit Card | Settings page setup | Organizations with custom vaults |
Bitwarden
Bitwarden integration is available on the enterprise plan. Contact sales@skyvern.com for access.
Cloud setup
Create a Bitwarden Organization
Log into Bitwarden, navigate to Admin Console, and ensure you have an organization created.
Create a collection to share with Skyvern
In your organization, click New → Create a collection. Name it something identifiable (e.g., “Skyvern Credentials”). Skip this step if you already have a collection ready.
Configure access with the Skyvern team
Go to the Access tab on your collection. This step requires coordination with the Skyvern enterprise team, who will configure access on their end. Contact sales@skyvern.com to get started.
Configuration options
| Field | Description |
|---|---|
| Collection ID | The UUID of your Bitwarden collection (found in the URL when viewing the collection) |
| Item ID | Target a specific vault item. Leave blank to use URL matching instead. |
| URL Parameter Key | Match credentials by the target URL. Useful when the same workflow runs against different sites. |
Identity data
For identity fields (SSN, address, phone numbers), specify an Identity Key and a comma-separated list of Identity Fields (e.g.,ssn, address, phone) in the Credential Parameter configuration panel.
Self-hosted Bitwarden (Vaultwarden)
Self-hosted Bitwarden (Vaultwarden)
Skyvern integrates with self-hosted Bitwarden-compatible services like Vaultwarden using the Bitwarden CLI server as a bridge:Environment variables:Start the CLI server with Docker Compose:Verify it’s running:
1Password
Connects via a service account token. A service account is an API-only identity that accesses vault items without a human login. Supports passwords and credit cards.One-time setup
Create a service account
In your 1Password admin console, go to Developer > Service Accounts and create a new service account. Grant it access to the vault that contains the credentials Skyvern needs.
Using in a workflow
In the workflow editor, add a Credential Parameter and select 1Password as the source. Provide the Vault ID and Item ID. You can find both IDs in the URL when viewing an item in the 1Password web app.Azure Key Vault
Pulls credentials stored as Azure secrets. Supports passwords with optional TOTP.One-time setup
Using in a workflow
In the workflow editor, add a Credential Parameter and select Azure Key Vault as the source. Provide the vault name and the secret names that store the username, password, and optionally a TOTP secret. Enter the secret names, not the values themselves. For example, if your vault stores secrets namedsalesforce-username, salesforce-password, and salesforce-totp, enter those three names in the corresponding fields.
Webhook (Custom API)
Connect your own HTTP API as a credential backend. Skyvern calls your API to create, retrieve, and delete credentials, so sensitive data stays in your infrastructure.API contract
Your service must implement three endpoints. All requests include anAuthorization: Bearer {API_TOKEN} header.
Create credential
Password request body
Password request body
totp and totp_type fields are optional. totp_type can be "authenticator", "email", "text_message", or "none".Credit card request body
Credit card request body
Secret request body
Secret request body
secret_label field is optional.name). Include type so Skyvern knows how to parse the response.
Delete credential
Setup
Example: minimal FastAPI implementation
Example: minimal FastAPI implementation
Self-hosted configuration (environment variables)
Self-hosted configuration (environment variables)
For self-hosted Skyvern deployments, set these environment variables instead of using the Settings UI:Restart Skyvern after setting these variables.
Troubleshooting
| Problem | What to check |
|---|---|
| Status stays Inactive | Verify the API base URL is a valid URL and the API token is not empty. The configuration is validated on save but does not make a live request to your server. |
| Credentials not created | Review your API logs for auth errors. Ensure the response includes an id field. Skyvern expects HTTP 200 for all operations. |
| Credentials not retrieved | Ensure the GET response includes all required fields for the credential type (username and password for passwords, all card fields for credit cards, secret_value for secrets). |
| Env config not working | Restart Skyvern after setting variables. Verify CREDENTIAL_VAULT_TYPE=custom is set and both URL and token are provided. The default vault type is bitwarden, so this variable must be explicitly set. |
Credentials Overview
Built-in credential storage, security model, and quick start
Password Credentials
Store login details with optional 2FA
Workflow Parameters
Configure credential parameters in the workflow editor

