Use the Secrets Manager to store sensitive values — API keys, OAuth tokens, certificates, database URLs — and have Cosmos inject them into your Expert VMs at boot. Secrets are encrypted at rest and never logged in plaintext.Documentation Index
Fetch the complete documentation index at: https://docs.augmentcode.com/llms.txt
Use this file to discover all available pages before exploring further.
Secrets are how you set environment variables for cloud agents. There is no separate env var feature for cloud-agent VMs — every secret in scope is automatically exported as a shell variable in the VM. Environment-scoped environment variables (set on the Environment itself) are for non-sensitive defaults only (e.g.
NODE_ENV=development) and are shared with every user of that environment.Where to Find It
The Secrets Manager lives in the sidebar under Configuration → Secrets. It supports add, edit, delete, and search operations. Values are write-only — once a secret is saved, the value cannot be retrieved again. To rotate a secret, edit it and enter the new value.Scopes
When you create a secret, choose its visibility:| Scope | Visibility |
|---|---|
| Personal | Only your sessions can read it. |
| Shared | Visible to all members of your organization. |
Creating a Secret
- Go to Configuration → Secrets in the sidebar.
- Click + Add Secret.
- Fill in:
- Name — used as the variable name when injected (e.g.
OPENAI_API_KEY). - Value — the secret value. Pasted in once and never shown again.
- Visibility — Personal or Shared.
- Automatically install in VMs — leave on so the secret is auto-exported as an environment variable in every Expert VM in scope. Turn it off to keep the secret in storage but skip auto-injection.
- Name — used as the variable name when injected (e.g.
- Click Create Secret.
Auto-Injection into VMs
By default, every in-scope secret with Automatically install in VMs enabled is exported as a shell variable on VM boot. The exported variable name is the upper-snake-case of the secret name:| Secret name | Exported as |
|---|---|
openai-api-key | $OPENAI_API_KEY |
pagerduty.token | $PAGERDUTY_TOKEN |
db_url | $DB_URL |
$OPENAI_API_KEY is set in this workspace.”
Secrets vs Environment Variables
| Concern | Secrets Manager | Environment variables on an Environment |
|---|---|---|
| API keys, tokens, credentials | ✅ | ❌ — values are committed into the environment’s version history |
| Per-user values | ✅ (Personal) | ❌ — same value for everyone using the environment |
| Public defaults (paths, feature flags) | Possible | ✅ |
Auto-exported as $FOO in VM shell | ✅ | ✅ |
Limits and Lifecycle
- Versioning — each secret has an opaque version; saving a new value rotates it.
- Rotation — there is no built-in scheduler. Rotate by editing the secret and entering the new value.
- Deletion — deleting a secret removes it from future VM boots; existing running sessions keep the value already exported.