Web Dashboard
Organization Secrets
The Secrets page in your dashboard is where you securely manage organization-wide secrets — API keys, database credentials, tokens, and other sensitive values. All secrets are encrypted with AES-256-GCM and isolated per organization.
Login at app.envvault.com
Click Secrets in the left sidebar
Use the organization dropdown in the header to switch between organizations
Above the secrets list, an Environment dropdown lets you switch between development, staging, and production. Switching the environment refreshes the list to show only secrets in the selected bucket and triggers a brief confirmation toast.
Each environment is fully isolated — the same key can hold different values in development and production. Create, edit, and delete operations apply only to the currently selected environment.
Managing Secrets
Click + Add Secret in the top right
Enter the Secret Key (e.g., STRIPE_SECRET_KEY) — automatically uppercased
Enter the Secret Value — the sensitive value to store
(Optional) Add a Description for context
Click Create Secret
Values are masked by default. Click the eye icon next to a secret to reveal its plaintext value.
Click the pencil icon next to the secret
Update the value and/or description
Click Save — the version increments automatically
Click the trash icon next to the secret
Confirm deletion in the dialog
Use the search box above the list to filter secrets by key name. Search is case-insensitive and matches partial keys.
Roles & Permissions
| Role | View | Reveal | Create | Edit | Delete |
|---|---|---|---|---|---|
| Owner | ✓ | ✓ | ✓ | ✓ | ✓ |
| Admin | ✓ | ✓ | ✓ | ✓ | ✓ |
| Editor | ✓ | ✓ | — | — | — |
| Viewer | ✓ | ✓ | — | — | — |
Switching Organizations
If you belong to multiple organizations, use the organization dropdown in the header to switch between them. Each organization has its own independent set of secrets — secrets in one org are completely invisible to another.
Security & Encryption
AES-256-GCM encryption — values are encrypted at the edge before being stored. Plaintext never reaches the database.
Organization isolation — secrets are scoped per organization at the database level. Cross-organization access is impossible.
Audit logs — every create, read, update, and delete operation is logged with timestamp, user, IP address, and user agent.
HTTPS everywhere — all traffic is encrypted in transit with HSTS enabled.
Auto-hide on reveal — revealed values automatically re-mask after 30 seconds.
Best Practices
Use descriptive keys. Prefer STRIPE_LIVE_SECRET_KEY over generic names like SECRET.
Add descriptions. Explain what the secret is for so future team members understand the context.
Limit access. Use the Editor or Viewer role for users who only need to read secrets.
Rotate regularly. Update sensitive secrets like database passwords and API keys on a schedule.
Review audit logs. Check the Audit Logs page for unexpected reveal or update activity.