Instead of copying secrets into Skyvern, you can point Skyvern at your existing vault and it pulls credentials at runtime. If your organization already manages secrets in a dedicated vault, connect it as a credential source and reference items directly from workflow parameters.
External providers are configured per-organization. Once connected, any workflow in the organization can reference credentials from that provider.
Log into Bitwarden, navigate to Admin Console, and ensure you have an organization created.
2
Create a collection to share with Skyvern
In your organization, click New → Create a collection. Name it something identifiable (e.g., “Skyvern Credentials”). Skip this step if you already have a collection ready.
3
Configure access with the Skyvern team
Go to the Access tab on your collection. This step requires coordination with the Skyvern enterprise team, who will configure access on their end. Contact sales@skyvern.com to get started.
4
Grab your Collection ID
Click into the collection and find the collection UUID in the URL bar.
5
Add to a workflow
In the Skyvern workflow editor, click Parameters → Add Parameter → Credential Parameter and select the Bitwarden tab. Enter your Collection ID and optionally an Item ID to target a specific vault item.
For identity fields (SSN, address, phone numbers), specify an Identity Key and a comma-separated list of Identity Fields (e.g., ssn, address, phone) in the Credential Parameter configuration panel.
Self-hosted Bitwarden (Vaultwarden)
Skyvern integrates with self-hosted Bitwarden-compatible services like Vaultwarden using the Bitwarden CLI server as a bridge:
Copy
Ask AI
Skyvern → bw serve (CLI Server) → Vaultwarden
Environment variables:
Copy
Ask AI
# Skyvern Bitwarden ConfigurationSKYVERN_AUTH_BITWARDEN_ORGANIZATION_ID=your-org-id-hereSKYVERN_AUTH_BITWARDEN_MASTER_PASSWORD=your-master-password-hereSKYVERN_AUTH_BITWARDEN_CLIENT_ID=user.your-client-id-hereSKYVERN_AUTH_BITWARDEN_CLIENT_SECRET=your-client-secret-here# Vaultwarden ConfigurationBW_HOST=https://your-vaultwarden-server.comBW_CLIENTID=${SKYVERN_AUTH_BITWARDEN_CLIENT_ID}BW_CLIENTSECRET=${SKYVERN_AUTH_BITWARDEN_CLIENT_SECRET}BW_PASSWORD=${SKYVERN_AUTH_BITWARDEN_MASTER_PASSWORD}# CLI Server ConfigurationBITWARDEN_SERVER=http://localhostBITWARDEN_SERVER_PORT=8002
Connects via a service account token. A service account is an API-only identity that accesses vault items without a human login. Supports passwords and credit cards.
In your 1Password admin console, go to Developer > Service Accounts and create a new service account. Grant it access to the vault that contains the credentials Skyvern needs.
2
Open Settings
In Skyvern, go to Settings and find the 1Password card.
3
Enter your service account token
Paste the service account token from the previous step.
4
Save and verify
Click Update. The status indicator turns Active once the token is validated.
If the status does not turn Active, verify that your service account token has access to the target vault and has not expired.
In the workflow editor, add a Credential Parameter and select 1Password as the source. Provide the Vault ID and Item ID. You can find both IDs in the URL when viewing an item in the 1Password web app.
Credit cards from 1Password need a custom text field named “Expire Date”, “Expiry Date”, or “Expiration Date” in MM/YYYY or MM/YY format. 1Password does not expose the native expiration field through its API, so Skyvern reads this custom text field instead.
In the workflow editor, add a Credential Parameter and select Azure Key Vault as the source. Provide the vault name and the secret names that store the username, password, and optionally a TOTP secret. Enter the secret names, not the values themselves.For example, if your vault stores secrets named salesforce-username, salesforce-password, and salesforce-totp, enter those three names in the corresponding fields.
Connect your own HTTP API as a credential backend. Skyvern calls your API to create, retrieve, and delete credentials, so sensitive data stays in your infrastructure.
Verify the API base URL is a valid URL and the API token is not empty. The configuration is validated on save but does not make a live request to your server.
Credentials not created
Review your API logs for auth errors. Ensure the response includes an id field. Skyvern expects HTTP 200 for all operations.
Credentials not retrieved
Ensure the GET response includes all required fields for the credential type (username and password for passwords, all card fields for credit cards, secret_value for secrets).
Env config not working
Restart Skyvern after setting variables. Verify CREDENTIAL_VAULT_TYPE=custom is set and both URL and token are provided. The default vault type is bitwarden, so this variable must be explicitly set.
Credentials Overview
Built-in credential storage, security model, and quick start
Password Credentials
Store login details with optional 2FA
Workflow Parameters
Configure credential parameters in the workflow editor