Skip to main content

AWS Secrets Manager

Fetch secrets from AWS Secrets Manager to use as variables in your API requests.

Prerequisites

  • AWS account with Secrets Manager access
  • IAM credentials (Access Key ID and Secret Access Key)
  • A secret stored in AWS Secrets Manager

Configuration

  1. Go to Settings > Secret Providers
  2. Click Add Provider
  3. Select AWS
  4. Fill in the configuration:
FieldDescription
NameDisplay name for this provider
RegionAWS region (e.g., us-east-1)
Access Key IDYour AWS access key
Secret Access KeyYour AWS secret key
Secret NameName of the secret in Secrets Manager
  1. Click Test Connection to verify credentials
  2. Click Save

Secret Format

Secrets can be stored as JSON key-value pairs:

{
"API_KEY": "sk-xxx",
"DATABASE_URL": "postgres://user:pass@host:5432/db",
"JWT_SECRET": "your-jwt-secret"
}

Each key becomes a variable you can use as {{API_KEY}}, {{DATABASE_URL}}, etc.

If your secret is a plain string (not JSON), it will be available using the secret name as the variable name.

IAM Policy

Minimum required permissions:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"secretsmanager:GetSecretValue"
],
"Resource": "arn:aws:secretsmanager:REGION:ACCOUNT_ID:secret:SECRET_NAME*"
}
]
}

For testing the connection, add:

{
"Effect": "Allow",
"Action": [
"sts:GetCallerIdentity"
],
"Resource": "*"
}

Usage

Once configured, click Fetch Secrets to load the secrets. They will be available as variables in your requests:

GET {{API_URL}}/users
Authorization: Bearer {{API_KEY}}