VibeHunt
Back to browse

AWS Vault

Securely stores and accesses AWS credentials in a development environment

Source

AWS Vault stores IAM credentials in the operating system’s secure keystore and generates short‑lived temporary credentials via Amazon STS. It reads profile definitions from the standard `~/.aws/config` file, then supplies the temporary keys to shells or applications either as environment variables or through a subprocess. This approach limits exposure of long‑term keys and integrates with existing AWS CLI workflows.

The tool is aimed at developers and operators who need to work with AWS services from a local environment while keeping secret keys protected. It supports a range of vault backends, including macOS Keychain, Windows Credential Manager, GNOME/KDE keyrings, the Pass password store, and encrypted files, selectable via a flag or environment variable. Users can add credentials, list stored profiles, open a temporary subshell, or launch the AWS console with a single command.

Installation is available through many package managers on macOS, Windows, Linux, FreeBSD, and OpenSUSE, as well as via direct download of releases. Documentation and usage examples are provided in the repository’s USAGE.md file.

Reviews

Sign in to leave a review.

Loading reviews…

Similar apps