AWS Secrets Manager
Fetch secrets from AWS Secrets Manager to use as variables in your API requests.
Prerequisites
- AWS account with Secrets Manager access
- IAM credentials (Access Key ID and Secret Access Key)
- A secret stored in AWS Secrets Manager
Configuration
- Go to Settings > Secret Providers
- Click Add Provider
- Select AWS
- Fill in the configuration:
| Field | Description |
|---|---|
| Name | Display name for this provider |
| Region | AWS region (e.g., us-east-1) |
| Access Key ID | Your AWS access key |
| Secret Access Key | Your AWS secret key |
| Secret Name | Name of the secret in Secrets Manager |
- Click Test Connection to verify credentials
- Click Save
Secret Format
Secrets can be stored as JSON key-value pairs:
{
"API_KEY": "sk-xxx",
"DATABASE_URL": "postgres://user:pass@host:5432/db",
"JWT_SECRET": "your-jwt-secret"
}
Each key becomes a variable you can use as {{API_KEY}}, {{DATABASE_URL}}, etc.
If your secret is a plain string (not JSON), it will be available using the secret name as the variable name.
IAM Policy
Minimum required permissions:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"secretsmanager:GetSecretValue"
],
"Resource": "arn:aws:secretsmanager:REGION:ACCOUNT_ID:secret:SECRET_NAME*"
}
]
}
For testing the connection, add:
{
"Effect": "Allow",
"Action": [
"sts:GetCallerIdentity"
],
"Resource": "*"
}
Usage
Once configured, click Fetch Secrets to load the secrets. They will be available as variables in your requests:
GET {{API_URL}}/users
Authorization: Bearer {{API_KEY}}