ARM Credential Manager

Important Note:This article is for Org Administrators in particular. The actions discussed in the article are not available to general users.

Credential Manager: Overview

Credential Manager (CM) is the "digital locker" where ARM stores log-in credentials like usernames and passwords. It securely stores your credentials, so you only need to enter them once for each remote repository you access. Storing login information in the ARM CM saves you time when you frequently access a file shared on another machine.

Create a New Credential

Log into ARM with username, for example, then do the following:

  1. Hover your mouse over the Admin tile and select the option for Credentials.

  2. Click Create Credential.

  3. On the next pop-up screen, enter a Credential name.

  4. Choose a Credential Type from the drop-down field.

    • Username with Password

    • SSH

    • HashiCorp Vault

    • SSH Certificate

    • Application Token (for Enterprise users only)

Username with Password

Password-based authentication requires the user to enter their username and password to create a credential.

Credential Scope lets you specify exactly what type of access you need.

  • Global: Credential to be accessed by the team

  • Private: Credential for private usage


SSH is an encrypted protocol used to administer and communicate with servers. SSH is a secure way to access a site’s server remotely. The user must generate a public/private key pair on the client machine to identify them on the servers. You can choose to protect it with a password. Entering it with no password means anyone with access to the key files has the same level of access as the user, and no password is required when the client connects to the servers. Protecting the keys with a password means that whenever the user connects to a server using those keys, the password for decrypting it is required.

Important Note:

  1. We recommend using SSH-type credentials rather than password-type credentials for increased security.

  2. Credential Scope lets you specify exactly what type of access you need.

    • Global: Credential to be accessed by the team

    • Private: Credential for private usage

  3. Upload the Private key, if available on your local machine, or paste it into the clipboard provided.

HashiCorp Vault

You can now choose the AWS Authentication method while adding HashiCorp credentials to ARM to generate the Vault Token automatically whenever the existing token expires. Now the user does not have to update the token manually from the application when it expires. Click here for a more detailed article on this topic.

Authentication using SSH Certificates

About SSH Certificates

SSH certificates allow one SSH key to sign another SSH key, resulting in an SSH certificate. A server that trusts the Certificate Authority (CA) can verify the certificate’s signature and trust the certificate and its associated metadata.

Learn more information about SSH certificate authorities at

How is an SSH certificate different than an SSH key?

SSH uses key-based authentication with public key cryptography, while an SSH certificate-based authentication and attaches a signed certificate to each key to verify their identities. By using a certificate signed by a trusted CA, users can do away with passwords, which are not secure, given that passwords can either be stolen or cracked via brute force, and leverage a partially automated, trust-based certificate authentication process to gain access to systems.

How to add SSH certificates?

To give organizations more control over how their members access their repositories in GitHub, ARM now supports credentials of the SSH Certificate type. The user must upload the key for the SSH certificate while creating a credential. Then the user can later authenticate the repositories and add them inside ARM using the credential.

SSH certificates only allow access to repositories that belong to their organization.


Adding SSH certificates is currently limited to organizations using GitHub Enterprise Cloud.

Application Token (for Enterprise users only)

As an Enterprise user, you can now connect ARM to Jira with the support of PAT to meet the compliance requirements set up by your organization and facilitate communication between Jira and ARM setup.

Select Application Token from the Credential Type dropdown, enter the Token generated from Jira, and click Save.

This feature is only available upon request. If you would like to use PAT authentication to connect to Jira, please reach out to us at, and the AutoRABIT support team will be able to assist you further.

For more information on generating a token in Jira, refer here.

Last updated