Docs
  • Solver
  • Models
    • Field Service Routing
    • Employee Shift Scheduling
    • Pick-up and Delivery Routing
  • Platform
Try models
  • Timefold Platform
  • How-tos
  • Secrets management

Timefold Platform

    • Introduction
    • Planning AI concepts
    • Getting started with the Timefold Platform
    • Platform concepts
    • Models
      • Model catalog and documentation
      • Model versioning and maturity
      • Trialing Timefold models
    • How-tos
      • Dataset lifecycle
      • Interpreting dataset results
      • Configuration parameters and profiles
      • Reviewing the audit log
      • Searching and categorizing datasets for auditability
      • Member management and roles
      • Secrets management
      • Using the maps service
      • Comparing datasets (preview)
      • Real-time planning with /from-patch (preview)
    • Job-oriented guides
      • Balancing different optimization goals
      • Validating an optimized plan with Explainable AI
      • Uncovering inefficiencies in operational planning
      • Responding to disruptions with real-time planning
      • Designing better routing plans with (just enough) traffic awareness
    • API integration
      • API usage
      • Webhooks
    • Changelog
    • Feature requests
    • Self-Hosted
      • Self-Hosted vs. Timefold Cloud Platform
      • Installation instructions
      • Troubleshooting
    • Trust
      • Risk profile
      • Product security
      • Data security
      • Legal and privacy
      • AI legislation compliance
      • Trust center

Secrets management

Secrets management allows you to securely store and reuse sensitive values, such as API keys or tokens, across your Timefold Platform integrations without exposing them in configuration screens or logs.

This feature is designed for enterprise-grade security and compliance, while keeping day-to-day configuration simple.

Why use secrets?

Many Timefold platform features integrate with external systems, such as webhooks or map providers. These integrations may require sensitive credentials.

Secrets management improves security by:

  • Encrypting secret values at rest.

  • Preventing retrieval of secret values after creation.

  • Allowing secure reuse via references.

  • Providing ownership, sharing, and audit logging.

What is a secret?

A secret is a secure, tenant-scoped object consisting of:

  • Name: A short descriptive name.

  • Description: Optional free text.

  • Owner: The user who created the secret.

  • Visibility flag: Whether the secret can be managed by other tenant admins.

  • Value: The sensitive data itself (write-only).

Secret values can be set or updated, but they can never be retrieved again.

Each secret is identified internally by a unique ID. This ID is used to reference the secret at runtime.

Who can manage secrets?

Secrets management is available to tenant admins.

Ownership and sharing rules apply:

  • Private secrets

    • Only visible to the owner.

    • Only the owner can use, update, or delete the secrets.

  • Shared secrets

    • Visible to all tenant admins.

    • Any tenant admin can use, update, or delete the secrets.

This allows teams to centralize sensitive credentials while still supporting single-owner responsibility when needed.

See Member management and roles for details on permissions.

Creating a secret

To create a secret:

  1. Navigate to Tenant Settings → Secrets.

  2. Click Add secret.

  3. Provide:

    1. A name.

    2. (Optional) description.

    3. The secret value.

    4. Whether the secret should be shared.

  4. Click Save.

After saving, the value is encrypted and cannot be viewed again.

Using secrets

Secrets are injected at runtime using a reference pattern: {secret.id}

You can copy this reference from the Secrets UI and paste it into supported configuration fields.

Editing a secret

Supported usage

Secrets can currently be used in:

  • Webhooks

    • Headers.

    • Example: Authorization: {secret.id}.

    • HMAC Key.

Using a secret in a webhook
  • External map providers

    • Headers only.

    • Configured via the Gateway API (POST / PUT).

Secrets cannot be used in request bodies or query parameters.

If a user doesn’t have access to a private secret, they might still be able to edit the configuration where it’s used. In this case:

  • They can see the reference but not the value.

  • They cannot re-add or change a private secret they do not own.

Updating and rotating secrets

To rotate a secret:

  1. Update the secret value.

  2. Save the change.

All configurations referencing the secret automatically use the new value. No configuration updates are required.

  • © 2026 Timefold BV
  • Timefold.ai
  • Documentation
  • Changelog
  • Send feedback
  • Privacy
  • Legal
    • Light mode
    • Dark mode
    • System default