Documentation Index
Fetch the complete documentation index at: https://docs.alterauth.com/llms.txt
Use this file to discover all available pages before exploring further.
What Are Managed Secrets?
Managed Secrets let you (the developer) store API keys, service tokens, and other credentials for services where you already have the credentials. No end-user OAuth flow is needed — you store the secret in the Developer Portal and get back agrant_id to use with vault.request().
Application code never sees the raw secret. A call to vault.request(..., grant_id=grant_id) is all that is needed and the SDK injects the credential as the correct auth header automatically.
When to Use Managed Secrets
Use managed secrets when:- You already have the credential (API key, service token, access key)
- The credential is per-service, not per-user (shared across the backend)
- No end-user authorization is needed
- You want centralized credential management instead of scattering API keys across environment variables
How It Works
Store Secret in Developer Portal
Add the API key, service token, or credentials via the Developer Portal’s Managed Secrets tab. Choose the credential type (Bearer Token, API Key, Basic Auth, or AWS SigV4).
Get the grant_id
Each stored secret gets a
grant_id (UUID). Save this in application code, config, or environment variables.Call vault.request()
Use the same
vault.request() method you use for OAuth — just pass the secret’s grant_id.Quick Example
Credential Types
| Type | Header Injected |
|---|---|
| Bearer Token | Authorization: Bearer <token> |
| API Key | Custom header (e.g., X-API-Key: <key>) |
| Basic Auth | Authorization: Basic <base64(user:pass)> |
| AWS SigV4 | AWS Signature Version 4 (computed automatically) |
Key Features
- Write-only storage — secret values can never be read back, only used via
vault.request() - Same security as OAuth — AES-256-GCM encryption, policy enforcement, full audit logging
- No token refresh needed — you manage credential rotation by re-storing in the portal
- Connection cloning — clone connections with optional TTL for time-limited access
- Policy enforcement — time-based and IP-based access rules, same as OAuth
- Full audit trail — every secret usage logged with actor identity, method, URL, and reason
Supported Managed Secret Providers
Alter Vault includes pre-configured templates for 30+ services across monitoring, communication, marketing, developer tools, and more. See the Managed Secret Providers section in the sidebar for the full list and setup guides.Custom Secrets (Any API)
Not limited to pre-configured templates — you can store credentials for any API or service. In the Developer Portal, select Custom when adding a managed secret to configure:- Any credential type (Bearer Token, API Key, Basic Auth, or AWS SigV4)
- Custom header name (e.g.,
X-Custom-Auth,Api-Token) - Custom injection format (e.g.,
Token {token},Key {token}) - Additional injection rules for multi-header or query parameter authentication
Next Steps
Setup Guide
Detailed setup, policies, and audit logging
Developer Portal
Store and manage secrets in the portal
OAuth Connections
For end-user authorized third-party access
Quickstart
Step-by-step managed secrets integration