How It Works
- Connect a service account — Add your 1Password service account token in the dashboard
- Domain matching — When Agent Auth needs credentials, it searches your connected vaults for items matching the target domain
- Automatic fill — Credentials (including TOTP secrets) are used to complete authentication
Credentials are retrieved securely at authentication time. Values are never stored in Kernel—they remain in 1Password.
Setup
1
Create a 1Password Service Account
In 1Password, create a service account with access to the vaults containing your login credentials.Copy the service account token.
2
Connect in Kernel Dashboard
Go to Agent Auth in the Kernel dashboard, click the settings icon, then select Integrations. Click Connect 1Password.Paste your service account token. Kernel will validate the connection and show which vaults are accessible.
3
Use with Agent Auth
Start an auth invocation without specifying a
credential_id. If 1Password has a matching item for the domain, it will be used automatically.Domain Matching
1Password items are matched by their website/URL field:| 1Password Item URL | Matches Domain |
|---|---|
github.com | github.com |
https://github.com/login | github.com |
*.example.com | app.example.com, api.example.com |
TOTP Support
If your 1Password item has a one-time password (TOTP) field configured, it will be used automatically for 2FA—no additional setup needed.Priority
When both Kernel credentials and 1Password are available for a domain:- Explicit credential — If
credential_nameorcredential_idis specified, that credential is used - 1Password — If no explicit credential, 1Password is searched
- Request input — If no credentials found, the auth agent waits for input
Security
| Feature | Description |
|---|---|
| Token encrypted | Service account token encrypted with per-org keys |
| No credential storage | Credentials stay in 1Password, retrieved at auth time |
| Vault access control | Limit access via 1Password service account permissions |
| Audit trail | 1Password logs all credential access |

