Use this file to discover all available pages before exploring further.
Authsome interacts with environment variables in three roles: inputs that change CLI behavior, outputs produced by export, and injected variables set inside processes spawned by run.
Client-side daemon URL used by the CLI and proxy helpers. Set this on machines that should talk to a hosted authsome daemon instead of auto-starting a local one. Defaults to http://127.0.0.1:7998.
AUTHSOME_HOME
Override the default ~/.authsome directory. Useful for tests, ephemeral environments, and per-project profiles.
AUTHSOME_SERVER_BASE_URL
Canonical external base URL for hosted daemon deployments. Authsome uses it to build browser-facing URLs and OAuth callback URLs such as /auth/callback/oauth. Set this when the daemon is reached through a private VM, reverse proxy, or internal DNS name instead of localhost.
HTTP_PROXY / HTTPS_PROXY
Honored by authsome’s own outbound HTTP requests (token endpoints, device flow polling). The proxy started by uvx authsome run is set as these variables in the child process; it does not chain through them.
Some bundled provider definitions declare api_key.env_var so the API-key flow can pick up an existing key without prompting:
Provider
Variable checked
openai
OPENAI_API_KEY
anthropic
ANTHROPIC_API_KEY
…
See each provider’s api_key.env_var field via uvx authsome inspect <provider>.
If the variable is set and non-empty, uvx authsome login <provider> uses its value with no prompt. If unset, the secure browser bridge takes over.The OAuth2 client config block can declare client.client_id_env and client.client_secret_env for similar automated collection. Bundled providers do not currently declare these, they rely on the browser bridge, but custom provider definitions can.
For every provider with a connected default connection, authsome sets a placeholder under the provider’s export.env key so SDKs initialize successfully without seeing the real secret:
Provider
Variable
Placeholder value
openai
OPENAI_API_KEY
authsome-proxy-managed
github
GITHUB_ACCESS_TOKEN
authsome-proxy-managed
…
Per provider definition
authsome-proxy-managed
The real secret is added to outbound requests at the proxy layer, never in the environment.
A typical agent run that pulls credentials from authsome:
# One-time setupuvx authsome login githubuvx authsome login openai# Run the agent through the proxy, secrets stay in the vaultuvx authsome run -- python my_agent.py
The agent reads OPENAI_API_KEY and GITHUB_ACCESS_TOKEN as it normally would. They are placeholders. The proxy injects the real values into outbound requests to api.openai.com and api.github.com.If the agent needs to run a tool that doesn’t honor HTTP_PROXY, fall back to export: