- Getting started
- Data security and compliance
- Organizations
- Authentication and security
- Licensing
- About licensing
- Unified Pricing: Licensing plan framework
- Flex: Licensing plan framework
- Activating your Enterprise license
- Upgrading and downgrading licenses
- Assigning licenses to tenants
- Assigning user licenses
- Deallocating user licenses
- Monitoring license allocation
- License overallocation
- Licensing notifications
- User license management
- Tenants and services
- Accounts and roles
- AI Trust Layer
- External applications
- Notifications
- Logging
- Troubleshooting
- Migrating to Automation Cloud

Automation Cloud admin guide
ALE with customer-managed keys
This feature is available across all tiers of our Enterprise licensing plan, including the Standard tier.
Enabling this feature has serious implications with regards to data access. Should key issues arise, you risk losing access to your data.
The following table describes common problematic scenarios and their solutions.
Scenario |
Solution |
---|---|
Your credentials for accessing the Azure Key Vault (AKV) have expired or have been deleted. |
If you can still log in using your email and password (non-SSO)... ... and if you are an organization administrator, you can update your credentials in the Encryption section of the organization Admin page. ... and if you are not an organization administrator, you can ask, via a support ticket, to be promoted to an administrator role; you can then update your credentials in the Encryption section of the organization Admin page. If you can no longer log in, provide your organization ID through a support ticket, and we can invite and promote you as an administrator. You can then update your credentials in the Encryption section of the organization Admin page. Once you regain login access, we recommend that you create a new AKV key and credentials set, then configure the customer-managed key using this new information, thus ensuring that nobody else has access to your credentials. |
Your AKV key has expired. |
Your customer-managed key still works, but we recommend that you switch to a new key. |
Your AKV key was deleted. |
You can restore your AKV key from the Azure portal during the retention period. |
Your AKV key was purged, but it had a backup. |
You can restore the key from the Azure portal backup. By default, the restored key has the same ID as the original one, which you should not change. |
Your AKV key was purged and it did not have a backup. |
Warning:
There is no solution for this scenario. In this situation, your UiPath® customer data is lost. |
In addition to the standard TDE at the storage level, certain services also employ Implicit Application-Level Encryption (ALE). This means that data is encrypted at the application layer before being stored, providing an added layer of security.
Furthermore, some services/resources offer an optional, user-driven encryption known as Optional (Opt in) ALE. This gives you the option to decide whether those services/resources should employ ALE or not. For the list of services or resources, and the types of encryption relevant to them, please refer to the encrypted data page in our documentation.
For services with ALE, either implicit or opted in for, you have the ability to choose who handles the encryption key. It could be managed by either UiPath or yourself. To assist in this, Azure Key Vault supports secret versioning, allowing you to generate a secret to use in configuring your key at the organization level.
After you enable the customer-managed key, previously backed up data is not re-encrypted, and any existing backups are removed once they expire. Only new data is encrypted using this option.
In the customer-managed key architecture, UiPath products or platform services (such as UiPath Orchestrator or UiPath Identity Service) generally encrypt sensitive customer data before storing it. When data access is required, the product or service calls your key management infrastructure to get the decryption key. This gives you control over the encrypted data in UiPath because you have the ability to refuse to return the key.
This process involves the following components:
- The key management service (KMS) - this is UiPath's internal tool, developed for key encryption purposes.
- The data encryption key (DEK or KMS DEK) - used to encrypt plain text data. Generally, the DEK is generated by the KMS or by UiPath's internal key vault, and is never stored anywhere in clear text.
- The key encryption key (KEK) - used to encrypt the DEK. The process of encrypting a key is known as key wrapping. Generally, the KEK is generated by you, it is stored in your key vault, and it constitutes the actual customer-managed key which is controlled by your key management service.
- The encrypted data encryption key (EDEK) - this is the DEK that is wrapped by the KEK. Generally, this key is stored by the service provider (such as Orchestrator); consequently, whenever a service needs to access encrypted data, the service calls the customer’s key management service to obtain the KEK needed to decrypt the EDEK, and to produce the DEK which is then used to decrypt the data.
- The UiPath internal key - this is used to encrypt data columns, including the CMK and the KMS DEK.
This diagram illustrates how the various components involved in enabling customer-managed keys work together:
To enable customer-managed keys, you must configure the Microsoft Entra ID application representing Automation CloudTM to access the key encryption key in your Azure Key Vault.
- (Recommended) Automated setup: Use the UiPath-managed Microsoft Entra ID application (multi-tenant model) for the following benefits:
- No secrets or certificates to manage.
- Quick and reliable setup.
- UiPath maintains the Microsoft Entra ID application for you.
- Manual setup with a custom Microsoft Entra ID application registration: Use your own Microsoft Entra ID application and manage
its configuration manually, with the following considerations:
- You must create and manage application credentials.
- Credentials expire and require periodic updates.
- If credentials are not updated before they expire, users are blocked from signing in.
Use this method if you want to simplify configuration and avoid managing secrets or certificates. UiPath recommends this approach for most organizations.
If you are a Microsoft Entra ID and Automation CloudTM administrator
If you are both a Microsoft Entra ID administrator and an Automation CloudTM administrator, take the following steps to configure the integration using the UiPath-managed multi-tenant application:
- In Automation CloudTM, go to Admin > Security > Encryption.
- Choose Customer managed key and confirm the selection by entering your organization name in the confirmation dialog.
- Select UiPath managed multi-tenant application (Recommended).
-
Select Grant consent, then sign in with your Microsoft Entra ID account.
After you grant consent, Automation CloudTM creates a Microsoft Entra ID application in Azure that represents your organization.
- Create your key encryption key and set up Azure Key Vault.
- Enter the Azure Key Vault key URI of the key encryption key.
- If you provide a versionless key URI, Automation CloudTM uses the latest key version automatically (key rotation enabled).
- If you provide a versioned key URI, Automation CloudTM encrypts all data with that specific key version.
-
Select Test and save to activate the integration.
If an error occurs, verify your credentials and try again.
If you are an Automation CloudTM administrator only
If you do not have administrative privileges in Microsoft Entra ID but are an Automation CloudTM administrator, take the following steps to request admin consent and complete the integration:- In Automation CloudTM, go to Admin > Security > Encryption.
- Select
Customer managed key
and confirm the selection by entering your organization name in the confirmation dialog. - Select UiPath managed multi-tenant application (Recommended).
-
Select Grant consent, then sign in with your Microsoft Entra ID account.
Because you do not have Microsoft Entra ID admin rights, you should see one of the following prompts:
- Request approval, as depicted in the Microsoft documentation: Request admin approval. After your Microsoft Entra ID administrator approves the request, continue to the next step.
- Needs admin approval, as depicted in the Microsoft documentation: Ask your Microsoft Entra ID administrator to take the following steps:
- Navigate to this URL to open the Microsoft Entra ID consent prompt.
- Select Consent on behalf of your organization, then Accept.
- After you receive confirmation that admin consent was granted, create your encryption key and set up Azure Key Vault, then
return to Automation CloudTM and repeat steps 1 through 4.
- A successful sign-in indicates that the integration is configured correctly.
- If the sign-in fails, ask your Microsoft Entra ID administrator to verify that consent was granted properly.
- Enter the Azure Key Vault key URI of the key encryption key.
- If you provide a versionless key URI, automatic key rotation is enabled, and Automation CloudTM uses the latest key version.
- If you provide a versioned key URI, Automation CloudTM encrypts all data with that specific key version.
-
Select Test and save to activate the integration.
If an error occurs, verify your credentials and try again.
- You can create the Key Vault in any region, but we recommend using the same region as your Automation CloudTM organization.
- UiPath requires access to the Key Vault used for the customer-managed key. To limit scope, we recommend creating a dedicated vault for this purpose.
- The feature works with any key size supported by Azure Key Vault.
- To perform cryptographic operations, you must grant Wrap Key and Unwrap Key permissions. These permissions are required regardless of whether you use Azure RBAC (Role-Based Access Control) or Key Vault access policies to manage access.
Once you enable this option, you can also edit any details related to the connection. To that end, select Edit connection under the Customer managed key option, and change any information as needed.
It is good practice to routinely rotate your keys, so as to ensure the continuous protection of your encrypted data against any potential breaches.
Manual key rotation involves changing the entire CMK configuration itself. While you could change the whole configuration, it is recommend to change only the key identifier, or key version, to minimize breaking changes.
To perform manual key rotation, take the following steps:
-
Create a new key in the Azure Key Vault you previous configured.
-
I page inn your Automation CloudTM organization, go to Admin > Security.
-
Under Customer managed key, select Edit connection.
- Replace the existing key identifier with the new key URI.
Automatic key rotation enables Automation CloudTM to use the latest version of your key automatically, based on the rotation policy defined in Azure Key Vault. This approach reduces manual effort and improves security.
To enable the automatic key rotation process, take the following steps:
-
In Azure Key Vault, create a rotation policy for your key.
-
In Automation Cloud, go to Customer managed key configuration and provide the versionless key identifier.
For configuration steps, refer to Enabling the customer-managed key.
- After each key rotation in Azure Key Vault, Automation CloudTM automatically fetches and applies the latest key version.
- Do not disable or modify access permissions for older key versions. Both the previous and current key versions must remain accessible to maintain uninterrupted access to encrypted data during the rotation process.
- You can view both manual changes to the customer-managed key configuration, such as updates to the key identifier, and automatic key rotation events in the Audit logs section under Admin in Automation CloudTM .
If your Enterprise plan expires, you are automatically downgraded to the Free plan. This is what you can expect in terms of data encryption:
- The Customer managed key option is still enabled for you, but it is greyed out in the interface. As such, you can no longer edit its values, such as changing key vault details.
- You can switch to UiPath managed key (Default), but you will not be able to revert to Customer managed key until your plan is upgraded to Enterprise.
There are some important details to keep in mind before you start using customer-managed keys:
-
Once you start using a new key as part of the key rotation process, the old one can no longer be used to access and encrypt data. It is therefore important to keep any old keys in the key vault, namely to disable them instead of deleting them. This is especially important in disaster recovery scenarios, where UiPath might need to revert to a backup of an older version of the database. If that backup uses one of your old keys, you can rotate to it to regain data access.
If you choose to remove a key, it is important that you use the soft-delete feature.
- If you lose your key, you can no longer connect to the vault. You should therefore always create a backup of the key on the Azure portal or in a secure key vault separate from Azure, in accordance with your organization's security policies.
- If you are leveraging Single Sign On to access UiPath services, you may consider creating a local account to function as a break glass account. Because the external identity provider information is included in the data encrypted by the customer managed key, SSO accounts will be inaccessible should your key vault become unreachable.
- For security purposes, users that do not have top-level administrator privileges should not have purge rights over the customer-managed key.
-
If you no longer want UiPath to have access to your data, you can disable the key from the Azure Key Vault, as shown in the following image:
Find out more about Azure Key Vault recovery actions.
- Overview
- Customer-managed keys explained
- Enabling the customer-managed key
- Automated setup with UiPath-managed Microsoft Entra ID application (Recommended)
- Manual setup with custom Microsoft Entra ID application registration
- Creating the key encryption key and setting up Azure Key Vault
- Editing the customer-managed key
- Key rotation
- Manual key rotation
- Automatic key rotation
- Licensing downgrade
- Best practices for using customer-managed keys