AWS-Vault Guide: Install, Configure and Use It Securely

px Amazon Web Services Logo

AWS-Vault is a command-line utility for storing AWS IAM user credentials in your operating system’s secure backend and then creating short-lived sessions for the AWS CLI or Management Console. If you still rely on IAM-user bootstrap credentials for local development or admin work, AWS-Vault is a practical way to avoid leaving long-lived keys in plaintext files.

This page provides an overview of the TurboGeek AWS-Vault family. Use it to understand where AWS-Vault fits, how it works, and which platform-specific guide you should follow next.

Important: the original 99designs repository is marked abandoned. AWS-Vault is still widely referenced, but before you standardise on it you should review the latest release path or active fork and decide whether it is still the right choice compared with IAM Identity Center.

Choose your AWS-Vault path

What AWS-Vault does

  • Stores AWS IAM user access keys in the operating system’s secure backend instead of a plaintext credentials file.
  • Creates temporary sessions for AWS CLI usage through aws-vault exec.
  • Supports MFA and role assumption for safer day-to-day admin workflows.
  • Can open short-lived Management Console sessions with aws-vault login.

Supported install paths

AWS-Vault is commonly installed with Homebrew on macOS, Chocolatey or Scoop on Windows, and Homebrew on Linux or native package managers on selected Linux distributions. Use the platform guides above for the exact path you need rather than treating this page as a one-size-fits-all install tutorial.

Quick start

1. Store the bootstrap profile

Add the base IAM user profile to your secure backend:

aws-vault add dev

This stores the access key in the operating system’s secure store. The name dev is just an example.

2. Define a role profile

Add a role profile in ~/.aws/config that points back to the stored base profile:

[profile dev-admin]
source_profile = dev
role_arn = arn:aws:iam::123456789012:role/DeveloperAccess
mfa_serial = arn:aws:iam::123456789012:mfa/your.name
region = eu-west-2

3. Test CLI access

aws-vault exec dev-admin -- aws sts get-caller-identity

If MFA is configured, AWS-Vault will prompt for it before creating the session.

4. Open the AWS console

aws-vault login dev-admin

This opens a short-lived browser session for the selected profile.

When AWS-Vault fits best

  • You work mainly from the CLI and assume multiple roles across several AWS accounts.
  • You still have an IAM-user bootstrap credential but want to stop keeping it in plaintext files.
  • You want MFA and temporary sessions to be part of the normal developer workflow.

When IAM Identity Center is the better default

  • You need organisation-wide workforce access across many AWS accounts.
  • You want central lifecycle management with an external identity provider such as Microsoft Entra ID or Okta.
  • You want to avoid distributing long-lived IAM user access keys as a bootstrap approach.

Common issues to check

  • Profile not found: make sure the profile name used is in aws-vault exec or aws-vault login matches the profile names in your AWS config.
  • Access denied: verify the role trust policy and permissions attached to the assumed role, not just the bootstrap user.
  • Keyring prompts or failures: confirm your operating system’s secure backend is unlocked and available for the user running AWS-Vault.

Related AWS-Vault guides

Elsewhere On TurboGeek:  RDS SSL Certificate Rotation: Everything You Need to Know for a Smooth Transition

Want more of this kind of guide?

Use the blog and category routes to keep moving through the archive, or support TurboGeek if the site saves you time regularly.

Translate »