External Vault Integration (Enterprise feature)
For users already using external vault services, Insomnia now supports integration with the following vault service providers:
By integration with external vaults, Insomnia will retrieve the secret values from the external vault automatically when sending requests.
- Navigate to the Preferences page and select the Cloud Credentials tab. Click Add Credentials, choose AWS, and enter your temporary security credentials.

- Open the AWS Secrets Manager from the context menu.

- Fill the information needed for retrieving the secrets, like
secret name
, secret version
and secret type
- Navigate to the Preferences page and select the Cloud Credentials tab. Click Add Credentials, choose GCP, and select your local service account key file to authenticate with GCP.

- Open the GCP Secrets Manager from the context menu.

- Fill the information needed for retrieving the secrets, like
secret name
and secret version
.
- Navigate to the Preferences page and select the Cloud Credentials tab. Click Add Credentials, choose HashiCorp, and enter your credentials.
-
For HashiCorp vault server environment choose On-Premises. You can input either AppRole or Token for authentication.

- For HashiCorp cloud vault environment choose Cloud. You should input the service principal Client Id and Client Secret.

- Open the HashiCorp Vault from the context menu.

-
When filling the information needed, we will show different config form based on the HashiCorp environment.
For cloud environment, filling the information needed: input Organization Id
, Project Id
, App Name
, Version and Secret Name
.
For vault server environment, Insomnia supports retrieving secrets from KV secret engine for version v1 & v2, so users must choose the secret engine version
then filling the information.
- Navigate to the Preferences page and select the Cloud Credentials tab. Click Add Credentials, choose Azure.
- You will be redirected to your browser to authorize Insomnia to access your Azure account. After authorization, you will be redirected back to Insomnia, where a new credential will be added. The credential’s name will be your Azure account username.
- Open the Azure Key Vault from the context menu.

- Fill the information needed for retrieving the secrets, like
Secret Identifier
.
External Vault Secrets Cache Mechanism
By default, all secrets retrieved from cloud vault services are stored in memory for 30 minutes. Insomnia will automatically fetch the secret again if the cache expires or does not exist. Users can configure the cache duration and manually reset the cache in the Cloud Credentials tab within the Preferences page.