Keyring
Atmos supports three keyring backends for storing authentication credentials. Configure the keyring in the auth.keyring section of your atmos.yaml.
System Keyring (Default)
Uses your operating system's native secure credential storage:
- macOS: Keychain
- Linux: Secret Service (GNOME Keyring, KDE Wallet)
- Windows: Windows Credential Manager
atmos.yaml
This is the default and recommended option for interactive use. Credentials are stored securely using the operating system's built-in credential management.
File Keyring
AES-256 encrypted file-based storage with password protection.
atmos.yaml
type- Required. Must be
file. spec.path- Optional. Custom path for the keyring file. Defaults to XDG data directory.
spec.password_env- Optional. Environment variable name containing the keyring password. Defaults to
ATMOS_KEYRING_PASSWORD.
Password resolution order:
- Environment variable (
ATMOS_KEYRING_PASSWORDor custom frompassword_env) - Interactive prompt (if TTY available)
- Error if neither available
Use Cases
File keyring is useful for:
- Headless servers without system keyring support
- Docker containers
- CI/CD environments with persistent storage
- Shared credentials across multiple machines
Memory Keyring
In-memory storage with no persistence (credentials lost on exit).
atmos.yaml
Best for:
- Unit tests
- Temporary credential caching
- Environments where persistence is not desired
Memory keyring does not persist credentials. You will need to re-authenticate after every Atmos restart.
Environment Variables
ATMOS_KEYRING_TYPE- Override keyring type (
system,file,memory). ATMOS_KEYRING_PASSWORD- Password for file keyring.
Choosing a Keyring Type
| Type | Persistence | Security | Use Case |
|---|---|---|---|
system | Yes | High (OS-managed) | Interactive workstations |
file | Yes | Medium (encrypted) | Servers, containers, CI/CD |
memory | No | Low (in-process) | Testing, temporary sessions |
Storing Credentials
Use atmos auth user configure to store IAM user credentials in the keyring:
# Store credentials for an aws/user identity
atmos auth user configure --identity emergency-user
This command prompts for access key ID and secret access key, then stores them securely in the configured keyring backend.
Related Commands
📄️ atmos auth user configure
Store IAM user credentials in the keyring
📄️ atmos auth login
Authenticate with a configured identity
📄️ atmos auth logout
Clear cached credentials from the keyring
See Also
- Profiles — Use profiles to configure different keyring settings for CI vs local development