This page covers how credentials flow through the system and the guarantees we make about their handling.Documentation Index
Fetch the complete documentation index at: https://docs.tensor9.com/llms.txt
Use this file to discover all available pages before exploring further.
Credential Ownership
There are three categories of credentials in a deployment:Credentials You Provide
These are secrets the application needs from you - API keys, tokens, database passwords, webhook URLs. During setup, the interface tells you exactly what’s required and gives you the commands to create them. How they flow:Secret created locally
The secret goes directly from your terminal into your cluster or cloud secret manager.
Credentials We Provide
Some secrets come from us - internal service credentials, license keys, or pre-configured tokens. These are injected automatically during deployment. You don’t need to create or manage them.Credentials Generated at Deploy Time
Some secrets are generated fresh during deployment - random passwords, internal tokens, auto-generated keys. These are created directly in your infrastructure by the controller. They never transit through our systems.Where Secrets Are Stored
- Kubernetes
- AWS
Kubernetes Secrets (in your namespace), created by you via kubectl.
During Part 2 Configuration
After the controller is online, some deployments have a second configuration step where you provide secrets and domain settings. This step uses a direct connection:
This means even during interactive configuration, your secrets stay within your network perimeter.
Secret Rotation
You can rotate any secret you created by replacing it in your secret store:- Kubernetes
- AWS
What We Guarantee
- We never see your secret values - only existence/absence status
- We never store your credentials on our infrastructure
- We never transmit your secrets over the network between your infrastructure and ours
- You can rotate at any time without coordinating with us
Related
- Secrets (Configuration) - How to create secrets during setup
- Security Model - The overall security architecture