You can feel the tension when a deploy halts because someone forgot a secret. The database password lives in a vault, the service token expired, and suddenly half the team is playing detective. 1Password Jetty exists to end that nonsense by wiring secure secret delivery straight into your infrastructure runtime.
At its core, 1Password manages encrypted credentials for humans and machines. Jetty, on the other hand, is 1Password’s service connector that syncs those credentials into cloud environments, CI systems, and local dev sandboxes without anyone copying tokens around. Together they bridge the gap between “I have a password” and “my service can fetch it safely.”
With 1Password Jetty, you plug secure storage directly into tools like Kubernetes, GitHub Actions, or AWS Lambda. Jetty authenticates using your identity provider—Okta, Azure AD, or any OIDC-compliant source—then fetches vault items only for authorized contexts. No VPNs. No static .env leaks. Each credential is scoped, logged, and rotated on schedule. You can think of it as dynamic secrets as a service without the overhead of managing your own vault clusters.
How does 1Password Jetty work behind the scenes?
Jetty runs as a lightweight agent that reads policies from your 1Password account. When a workload requests access, Jetty checks identity, confirms RBAC rules, and retrieves the secret through a short-lived secure channel. The whole exchange is auditable under SOC 2 controls and repeatable across environments.
Best practices: Keep policy definitions simple. Treat vault names and access groups like interface contracts, not directories. Rotate your Jetty tokens weekly and pair them with your CI’s short-lived credentials. If you use AWS IAM, map your roles one-to-one with 1Password access groups to reduce policy drift.