Back to articles
Set Up Secrets Management for MCP Servers in 5 Minutes
How-ToTools

Set Up Secrets Management for MCP Servers in 5 Minutes

via Dev.toLuca Moretti

If you're running MCP (Model Context Protocol) servers, your API keys are probably sitting in plaintext config files. Here's how to fix that in 5 minutes. What You'll Build A setup where: Your AI agents (Claude Desktop, Cursor, etc.) can use APIs No agent ever sees a raw API key Every API call is logged with timestamps You can revoke access instantly Prerequisites Node.js 18+ An MCP-compatible client (Claude Desktop, Cursor, etc.) At least one API key you want to protect Step 1: Install Janee npm install -g @true-and-useful/janee Janee is an open-source MCP server specifically designed for secrets management. Step 2: Initialize janee init This creates ~/.janee/config.yaml with a starter template. Step 3: Add Your First Service janee add The interactive wizard walks you through it: Service name: github Base URL: https://api.github.com Auth type: bearer API key: ghp_your_actual_token_here ✓ Added service "github" Create a capability for this service? (Y/n): y Capability name: github-read

Continue reading on Dev.to

Opens in a new tab

Read Full Article
2 views

Related Articles