UiPath Documentation
automation-suite
2024.10
false

Automation Suite on EKS/AKS installation guide

Last updated May 15, 2026

Configuring credential stores

The following secure stores are already available in Orchestrator:

  • Azure Key Vault
  • CyberArk CCP
  • HashiCorp Vault
  • Thycotic Secret Server
  • Beyond Trust
  • AWS Secrets Manager

Any credential store plugin you choose to use must be Linux-compatible.

To disable the default plugins, set the Plugins.SecureStores.Default key as an empty string in the appsettings.json file. For details, refer to Configuring appSettings.

Uploading custom secure store plugins

If you want to add custom secure store assemblies, you can do so via the uipathctl command line tool, using the uipathctl config orchestrator upload command:

uipathctl config orchestrator upload --securestore-plugins-directory /path/to/plugins/directory
uipathctl config orchestrator upload --securestore-plugins-directory /path/to/plugins/directory

Plugin settings are configured in appSettings using the convention for configuration keys. For details, refer to Configuring appSettings.

Important:

Plugins must not write to any storage apart from /tmp.

If you use an external storage configuration at the cluster level, you must indicate this by including the --is-external-storage parameter.

  1. Add the custom secure store plugins of your choice to appSettings using the following command:

    Plugins.SecureStores.<<FriendlyName>>.<<SettingName>>
    Plugins.SecureStores.<<FriendlyName>>.<<SettingName>>
    
  2. Enable the custom secure store plugins by updating appSettings with the relative path of the plugin (from the securestoreplugins folder):

    "Plugins.SecureStores":"myplugin/MyPlugin.dll,secondPlugin/SecondPlugin.dll"
    "Plugins.SecureStores":"myplugin/MyPlugin.dll,secondPlugin/SecondPlugin.dll"
    
  • Uploading custom secure store plugins

Was this page helpful?

Connect

Need help? Support

Want to learn? UiPath Academy

Have questions? UiPath Forum

Stay updated