Overview: n8n credentials encryption how stored?
This article explains n8n credentials encryption how stored and gives simple guidance for beginners. In n8n, credentials are encrypted before they are saved to the database when encryption is enabled. The encryption protects secrets like API keys and passwords while they sit in storage.
n8n credentials encryption how stored: What it means
Encryption means the raw secret is transformed so it cannot be read without a key. n8n can encrypt credential data so the database stores only ciphertext. Only a process with the correct key can decrypt and use the credentials during workflows.
Why encryption matters for automation
Automation often uses sensitive tokens and passwords. Encrypting credentials reduces risk from database leaks or backups. It also helps meet basic compliance and lowers exposure when multiple people manage the system.
Where encrypted credentials are kept in n8n
Encrypted credentials are stored in the n8n database alongside node configuration. The platform saves credential records in a secure field. The encryption key itself is kept separately, not inside the database record for the credentials.
How to manage credential storage and keys
Choose where to keep your encryption key. Common choices are environment variables in Docker, or external secret stores for larger setups. Rotate keys when needed and limit access to the key to the running service account. Keep backups of encrypted data and the key so you do not lose access.
Summary
n8n encrypts credentials and stores the encrypted data in the database when encryption is enabled. Proper key management and limited access help keep automations safe. For beginners, enabling encryption and using secure key storage is a practical first step.