{{vault:key}} namespace as local secrets, so your requests donβt need to know where a secret comes from.
AWS Secrets Manager integration requires Requestly authentication and an eligible plan. Local vault remains fully functional without signing in.
Setting up an AWS provider
Enter AWS credentials
Fill in the configuration form:
| Field | Required | Description |
|---|---|---|
| Display Name | Yes | A label for this configuration (e.g., βProductionβ, βStagingβ) |
| Access Key ID | Yes | Your AWS IAM access key |
| Secret Access Key | Yes | Your AWS IAM secret key |
| Region | Yes | AWS region (e.g., us-east-1) |
| Session Token | No | Required only for STS temporary credentials |
Test the connection
Click Test Connection to validate your credentials against AWS. You can still save even if the test fails and fix credentials later.
Required AWS IAM permissions
Your IAM user or role needs the following permissions:Adding and fetching secrets
Add a secret mapping
In the AWS Secrets Manager section, click Add Secret. Enter:
- Alias: the key youβll use in
{{vault:alias}} - Secret Name or ARN: the AWS secret identifier
- Mode:
PlaintextorJSON
Fetch the secret
Click Fetch on the secret row. Requestly calls the AWS
GetSecretValue API and stores the result encrypted locally.JSON secrets
When an AWS secret contains a JSON object, Requestly auto-expands it into dot-separated keys:{{vault:dbCredentials.username}}resolves toadmin{{vault:dbCredentials.password}}resolves tos3cret{{vault:dbCredentials.host}}resolves todb.example.com
Refreshing secrets after rotation
Fetched values are cached locally and persist indefinitely. They survive app restarts and donβt auto-expire. When your team rotates a secret in AWS:- Open the Vault page
- Click Refresh on the secret (or Refresh All to update all AWS secrets)
- The new value replaces the cached one immediately
Multiple AWS configurations
You can store multiple AWS configurations (e.g., Production, Staging, EU region) and switch between them:- Click the config selector in the AWS section header
- Select a different configuration. The secrets table swaps to that configβs secrets.
{{vault:key}}references resolve from the active configuration only
Credential errors
When AWS credentials expire or become invalid:- The affected secret row shows an error message
- The provider config section shows an error indicator
- Previously cached values remain available. Requests continue working with the last fetched value.
Move to Local
You can convert any AWS secret to a local vault secret:- Select Move to Local on an AWS secret
- The secret moves to the Local Secrets section with the last fetched value preserved
- It becomes fully editable and is no longer linked to AWS
FAQ
Can I use multiple AWS accounts at the same time?
Can I use multiple AWS accounts at the same time?
You can store multiple AWS configurations, but only one is active at a time. The active configβs secrets are the ones that resolve via
{{vault:key}}. Switch between configs using the config selector in the AWS section header.Do vault secrets auto-refresh when rotated in AWS?
Do vault secrets auto-refresh when rotated in AWS?
No. Fetched values are cached locally and persist until you manually refresh. Click Refresh on a secret (or Refresh All) to pull the latest value from AWS.
Can scripts modify AWS secrets?
Can scripts modify AWS secrets?
No.
rq.vault.set() and rq.vault.unset() only work on local secrets. AWS secrets are read-only from scripts. Use rq.vault.get() to read them.
