Console terminology: In the Maverics Console, Orchestrator instances and
configuration delivery are managed through Deployments. When working directly
with YAML, configuration is managed as files delivered via the
-config flag or
MAVERICS_CONFIG environment variable.How Secret Providers Work
Secret providers are configured via theMAVERICS_SECRET_PROVIDER environment variable or the -secretProvider CLI flag — not in YAML configuration. Only one secret provider may be active at a time.
<maverics.client_secret> by fetching it from the configured secret provider. The namespace (maverics) and key (client_secret) map to the secret path and key in the provider.
Using Secret References in the Console
The same angle bracket syntax works in the Maverics Console. When configuring connectors, apps, or other resources in the Console, use secret references (e.g.,<maverics.client_secret>) in any field that accepts a sensitive value. The Orchestrator resolves them at runtime just as it does with YAML.
This applies even during testing. While you could enter plaintext values for local testing against non-production resources, we recommend using secret references from the start to build good habits. The Secret File provider makes this easy — point the Orchestrator at a local YAML file and reference those secrets in the Console the same way you would in production.
Available Providers
| Provider | URL Scheme | Use Case |
|---|---|---|
| AWS Secrets Manager | awssecretsmanager:// | AWS-native secret storage |
| Azure Key Vault | azurekeyvault:// | Azure-native secret and certificate management |
| CyberArk CCP | cyberarkccp:// | CyberArk Central Credential Provider |
| CyberArk Conjur | conjur:// | DevOps-oriented secrets for CI/CD and containers |
| Delinea Secret Server | delinea:// | Enterprise privileged access management |
| HashiCorp Vault | hashivault:// | Enterprise secret management with dynamic secrets |
| Secret File | secretfile:// | Local file-based secrets for testing |
Provider Pages
AWS Secrets Manager
AWS-native secret storage
Azure Key Vault
Azure-native secret and certificate management
CyberArk CCP
CyberArk Central Credential Provider
CyberArk Conjur
DevOps-oriented secrets for CI/CD and containers
Delinea Secret Server
Enterprise privileged access management
HashiCorp Vault
Enterprise secret management with dynamic secrets
Secret File
Local file-based secrets for testing