Algorithmia’s Secret Store enables you to decouple sensitive data like passwords, access tokens, and credentials from your algorithm source code. With this feature, you can store your sensitive data securely on Algorithmia and access individual secret values from within your algorithms using environment variables.
- Connecting to a password-protected database
- Calling a secure HTTP webhook to
POSTyour algorithm result
Secrets are encrypted at rest, encrypted in transit, and only exposed to the select algorithms you specify. We never expose sensitive data through the web interface or any user-facing APIs.
Keep in mind that any Algorithmia collaborator who has access to an algorithm’s source code can also access an algorithm’s secrets by modifying that source code to expose the secret value.
External secret providers
The ability to use external secret providers is available to Algorithmia Enterprise users only.
If your organization uses an external vaulting system to manage secrets, storing your secrets within Algorithmia might not be suitable. Therefore, Algorithmia Enterprise’s Secret Store enables cluster admins to connect Algorithmia to external vaulting systems such as Hashicorp Vault and Azure Key Vault, where secrets are managed and maintained by a DevOps team. This helps Data Science teams access secrets in accordance to an organization’s security and compliance standards.
Managing Secret Store entries
Secrets are managed through the Settings tab on an algorithm’s homepage, where you can create, update, and delete secrets, and view secret metadata.
To create a new entry in the Secret Store, click New secret.
In the modal, select the secret provider. This will default to the internal secret provider if an external secret provider hasn’t been configured on your cluster.
Enter a display name, description, environment variable name, and value for your secret.
It can take up to one minute for new secrets to show up inside your algorithm. Similarly, when you update a secret, it can take one minute for that change to take effect.
After your secret is created, it can be updated or deleted from the same page. Clicking Update will open the same modal as shown above, and you’ll be able to change the secret’s name, description, and value. Note that through the settings page you can view but not update an existing secret’s environment variable name, and you can update but not view an existing secret’s value.
Accessing Secret Store values
Secrets are accessed in your algorithm source code through environment variables. Every language supported by Algorithmia can read environment variables using functionality in the language’s standard library.
The following demonstrates how you’d access a Secret Store secret from an environment variable in Python. Note that this code just returns the value, but in practice, we don’t recommend returning secret values! Rather, you’d use the secret to establish a database connection, etc., within your algorithm.
Keep your secrets safe! We highly recommend you never include secrets in your algorithm output. The example above demonstrates how algorithms can leak sensitive data if secrets aren’t handled correctly.