Once a managed-secret grant exists, calling it is identical to calling an OAuth grant — passDocumentation Index
Fetch the complete documentation index at: https://docs.alterauth.com/llms.txt
Use this file to discover all available pages before exploring further.
grant_id to vault.request(). The SDK looks up the secret, injects the right header, and forwards the call.
vault.request() — the default
Authorization: Bearer …, X-API-Key: …, Authorization: Basic …, or AWS SigV4 signature) based on the credential type configured in the portal.
Full request reference at SDK → Request.
vault.proxy_request() — when the call must run server-side
proxy_request() forwards the entire HTTP exchange through the Alter backend instead of from the SDK. The backend makes the upstream call with the credential injected; the SDK never touches it.
Use cases:
- The credential type requires server-side signing (AWS SigV4 with role assumption).
- Approval policies must apply to the call — see Agents → Approvals.
- Backend-side rate limiting / quota enforcement is required.
proxy_request() returns a PendingApproval — see Agents → Approvals.
vault.boto3_client() — AWS-native usage (Python only)
For AWS managed secrets that store IAM credentials, the Python SDK ships a boto3 bridge:
timeout= for per-call timeouts; pass reason= for an audit annotation.
The TypeScript SDK does not ship a boto3 equivalent. For AWS in Node, use proxy_request() with SigV4-typed managed secrets.
Adding context
Passcontext={...} per call to enrich the audit trail:
See also
- Overview
- Issuing grants
- SDK → Request — full
request(),proxy_request(),boto3_client()reference. - Agents → Approvals