How it works
Secret sharing is designed so that ConductorOne never has access to your secrets. Encryption happens in your browser, before anything leaves your device. Here’s how a secret moves from creation to delivery:- Create — choose who can access the secret, add your content, and decide how long it should stay available and how many times it can be viewed.
- Encrypt — your browser encrypts the content before upload. ConductorOne stores only the encrypted result and never sees your plaintext.
- Share — copy the generated link and send it to recipients through whatever channel you choose: email, Slack, a ticket, or anything else.
- Access — recipients click the link and authenticate (SSO for internal users, a one-time email magic link for external contacts), then view or download the content.
Create a secret
Choose your audience.
| Audience | Description |
|---|---|
| Team members | Share with ConductorOne users in your organization. Recipients authenticate via SSO. |
| External recipients | Share with anyone via email address. Recipients verify their identity with a one-time magic link. |
Add recipients.
- Internal: Search and select up to 128 users from your organization
- External: Enter up to 64 email addresses (comma- or newline-separated)
Choose a content format.
| Format | Description |
|---|---|
| File | Any file up to 1 GB — documents, certificates, credential files, SSH keys. |
| Text | Passwords, API keys, tokens, or any sensitive plaintext (up to 64 KB). |
| JSON | Service account credentials or config objects, with syntax validation. |
| YAML | Kubernetes secrets, Helm values, or CI/CD configs. |
| Env | Environment variables in KEY=Value format — supports paste from .env files. |
Optional. To help recipients understand the secret’s purpose, add an explanatory label that will be visible to recipients.
Set access limits.
- Expiration: 1 hour to 30 days. Encrypted content is permanently deleted on expiry.
- View limit: Unlimited, or 1–1,000 views. When the limit is reached, the content is permanently and irreversibly deleted.
View a secret
- Internal recipients
- External recipients
Manage secrets
You can view and manage secrets you’ve created from the Secrets page. Administrators can manage all secrets across the tenant on the Shared secrets page.As the secret creator
All users with the Basic user role can create secrets, view their own secrets, and revoke their own secrets.
View all secrets you’ve created with their status, view count, and expiration.Use the filters to switch between Active secrets and All secrets (which includes expired, burned, and revoked secrets).
As an administrator
Requires the Super admin role. Super admins can view metadata (not content) for all secrets in the tenant and revoke any secret.
Use the Audit Log tab to view all secret-related activity. Filter by actor email or IP address.Click View on any secret to view the JSON metadata for the secret.
Secret-sharing security
Content is encrypted in your browser before it’s uploaded. ConductorOne stores only encrypted blobs and never sees your plaintext. When a recipient accesses a secret, an isolated vault service decrypts and delivers the content to that specific recipient. Plaintext is never stored, logged, or persisted.| Control | Detail |
|---|---|
| Browser-side encryption | Content is encrypted before upload; plaintext never touches ConductorOne servers or logs. |
| Isolated decryption | A dedicated vault service handles decryption, with access controlled by AWS KMS with hardware security modules. |
| View limits and expiration | Content is permanently deleted after the view limit is reached or the expiration time passes. |
| Magic link protection | Magic link tokens are single-use and expire after 15 minutes. |
| Audit logging | All create, view, revoke, and access-denied events are logged. |
Frequently asked questions about secret sharing
Can ConductorOne employees see my secrets?
Can ConductorOne employees see my secrets?
Absolutely not. ConductorOne stores only encrypted blobs. Decryption occurs in an isolated vault service and plaintext is never stored or logged.
What happens when a secret expires or is burned?
What happens when a secret expires or is burned?
Encrypted content is permanently deleted. Metadata (creator, creation date, recipients) is retained for audit purposes with a status of “Expired” or “Burned.”
Can I extend a secret's expiration?
Can I extend a secret's expiration?
No. If you need a secret to be available for longer, create a new one with the desired expiration and share the new link with recipients.
What happens if I revoke a secret?
What happens if I revoke a secret?
Encrypted content is permanently deleted and all future access attempts return a “Revoked” status.
Can I see who viewed my secret?
Can I see who viewed my secret?
Creators can see the current view count. Administrators can access detailed audit logs with per-viewer, per-event timestamps and client IP addresses.
How many recipients can I add?
How many recipients can I add?
Internal recipients: up to 128 users. External recipients: up to 64 email addresses. These limits apply per secret.
Is there a file size limit?
Is there a file size limit?
Files: up to 1 GB. Text content (Text, JSON, YAML, Key-value): up to 64 KB.
How do external recipients verify their identity?
How do external recipients verify their identity?
Via a single-use magic link sent to their email address. Magic links expire after 15 minutes.
Secret sharing events in system logs
All secret-sharing activity is recorded in the ConductorOne system log. Events use thepaper_secret_ prefix. For details on accessing, exporting, and querying log data, see System logs.
Event types
| Event | Activity name | Description |
|---|---|---|
| Secret created | paper_secret_created | New secret created. |
| Opened (internal) | paper_secret_opened_internal | Internal user viewed content. |
| Opened (external) | paper_secret_opened | External user viewed content. |
| Revoked | paper_secret_revoked | Creator revoked a secret. |
| Revoked (admin) | paper_secret_revoked_admin | Admin revoked a secret. |
| Magic link created | paper_secret_magic_link_created | Magic link sent to external recipient. |
| Access denied | paper_secret_access_denied | Unauthorized access attempt. |
| File downloaded | paper_secret_file_downloaded | File secret downloaded. |
Event payload
Each event includes:- Secret ID and share code (format:
XXXX-XXXX-XXXX) - Sharing mode: internal or external
- Secret type: text or file
- Actor: user or email address
- Client IP and timestamp