When using Apidog, you can fetch secrets from external vaults such as HashiCorp Vault, Azure Key Vault, and AWS Secrets Manager, and use them like global variables when sending requests.Administrators can configure integration with external vaults for teams and projects, allowing users to log in with OAuth 2.0 or their own access tokens to fetch secrets securely. The fetched secrets are encrypted and stored in your local client, ensuring privacy and security.On the team resources page, you can configure multiple vault providers for your team. Each provider can be assigned to different projects based on requirements.Within the project, you have the option to either customize the vault provider for that specific project or use a provider configured at the team level.Learn more about specific providers:Link and Fetch Secrets#
1.
Click the button next to the environment menu in the upper-right corner of the project and select Vault Secrets.
2.
In the Value input box, configure the metadata for the secret stored in the external vault (e.g., engine, path, key). The required metadata varies depending on the vault provider.
3.
Click Fetch Secrets to retrieve the secret, which will be securely encrypted and stored on your local client.
Use Secrets#
Secrets can be used in any context where a variable is supported, following the syntax {{vault:key}}.Within a script, you can use await pm.vault.get("key") to retrieve the value of the secret. If you use console.log to print the value, it will be masked for security.Secret values are never shared with team members. However, variable names and metadata are shared to eliminate the need for reconfiguration. Team members can fetch the secrets using proper authorization, ensuring a balance between collaboration and privacy.
Advantages for Enterprises#
Secure Storage of Secrets: Vaults provide a secure way to store sensitive information such as API keys, passwords, certificates, and tokens, ensuring that they are protected against unauthorized access.
Access Control: Vaults allow organizations to define strict access control policies, ensuring that only authorized users or services can access particular secrets.
Encryption: Vaults often provide built-in encryption to protect data both at rest and in transit, adding an extra layer of security.
Auditing and Monitoring: Vaults offer auditing and monitoring capabilities to keep track of who accessed which secret and when, aiding in compliance and detection of unauthorized access.
Integration with Other Services: Vaults are designed to integrate seamlessly with other cloud services (including Apidog) and DevOps tools, facilitating secret management across environments.
Centralized Management: Vaults provide a centralized way to manage secrets across different applications, services, and environments, reducing management overhead.
Risk Reduction: By reducing the chance of credentials being hardcoded into applications or leaking into source code, vaults help mitigate the risk of credential exposure.
Prerequisites#