Use environment variables to manage passwords in ACLI

Use environment variables to manage passwords in ACLI

Many ACLI actions require authentication using a password or cloud token. While you can include credentials in your custom start scripts to avoid entering them each time, this approach can expose sensitive information. On some operating systems, administrators can still view commands running in memory, including any embedded passwords.

To reduce this risk, ACLI supports using environment variables to securely reference passwords without exposing them on the command line.

Use environment variables for credentials

You can substitute the following environment variables in place of passwords or tokens by using the @ symbol in the CLI command.

Environment Variable

Substitutes For

Environment Variable

Substitutes For

ATLASSIAN_CLI_PASSWORD

--password @

ATLASSIAN_CLI_DB_PASSWORD

--dbPassword @

ATLASSIAN_CLI_TARGET_PASSWORD

--targetPassword @

Use environment variables in property files (recommended)

Starting with ACLI 8.8, you can reference environment variables directly in your property file configuration using standard syntax. This is the recommended method for managing sensitive information and is expected to fully replace the older environment variable support in future releases.

Example property file entries:

myjira = jira https://jira.examplegear.com -u automation -p ${MY_PASSWORD} cloud = https://examplegear.atlassian.net --user automation@examplegear.com --token ${MY_ATLASSIAN_CLOUD_TOKEN}

Using this method lets you centralize and securely manage credentials while keeping your automation scripts clean and portable.