Many MCP servers require API keys or tokens. Instead of storing these as plain text in config files, Harbor lets you store them in your operating system’s keychain and reference them withDocumentation Index
Fetch the complete documentation index at: https://docs.harbormcp.ai/llms.txt
Use this file to discover all available pages before exploring further.
vault: prefixes.
How It Works
- You store a secret in Harbor’s vault (backed by your OS keychain)
- You reference it in a server’s environment variables or headers as
vault:SECRET_NAME - When Harbor syncs to a host or the gateway resolves secrets at runtime, the actual value is injected
Your secrets are stored in the OS keychain (macOS Keychain, Windows Credential Manager, or Linux Secret Service). They never appear in plain-text config files.
CLI Usage
Store a secret
Retrieve a secret
List all secrets
Delete a secret
Using Vault References
In environment variables
Reference stored secrets in env vars with thevault: prefix:
~/.harbor/config.toml:
In HTTP headers
Remote servers can use vault references in headers:vault: reference within the string, replacing vault:github_personal_access_token with the actual value while preserving the Bearer prefix.
In gateway configuration
The gateway token can also be a vault reference:OAuth Tokens
When you authorize an OAuth provider (e.g.,harbor dock slack), Harbor automatically stores the tokens in the vault with keys like:
oauth:<provider>:access_tokenoauth:<provider>:refresh_tokenoauth:<provider>:client_idoauth:<provider>:client_secret

