Secret Management
When operating in production environments, securely handling credentials, API keys, and access tokens is critical. Lunar MCPX Enterprise provides a flexible approach to secret management, allowing you to control how sensitive data is stored, used, and rotated within your own infrastructure.
Because MCPX Enterprise is fully self-hosted, all secret management happens inside your environment. No credentials are ever transmitted outside your deployment.
How Secret Management Worksβ
MCPX Enterprise is designed to integrate with your existing secret storage and rotation processes. You can reference and load secrets directly from your own infrastructure rather than embedding them into configuration files or environment variables.
Key Principlesβ
- Self-Hosted Control β All secrets remain within your infrastructure. MCPX Enterprise never sends, syncs, or mirrors secret data externally.
- Separation of Duties β Authentication credentials, API keys, and service tokens are stored and managed separately from application logic.
- Pluggable Integrations β You can configure MCPX Enterprise to fetch secrets from your organizationβs preferred provider (for example, HashiCorp Vault, AWS Secrets Manager, or GCP Secret Manager).
- Scoped Access β Each secret can be scoped to a specific agent, tool, or service, ensuring that credentials are only available where needed.
Recommended Practicesβ
- Use a Central Secret Store β Reference secrets via environment variables or APIs that connect to your organizationβs trusted secret manager.
- Rotate Regularly β Schedule key and token rotation to reduce risk exposure.
- Avoid Storing Secrets in Configuration Files β Keep configurations declarative and reference secure sources instead.
- Restrict Access by Role β Use the Centralized User Management feature to control which users or agents can access credentials for specific tools or servers.
Benefitsβ
- Keeps all credentials inside your controlled infrastructure
- Supports integration with existing enterprise secret management tools
- Enables scoped, auditable access to sensitive data
- Reduces the risk of credential leaks or configuration drift