# awscli-keyring **Repository Path**: mirrors_elastic/awscli-keyring ## Basic Information - **Project Name**: awscli-keyring - **Description**: AWS CLI Keyring - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-08-08 - **Last Updated**: 2025-09-20 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # AWS CLI Keyring AWS command line credentials from OS X Keychain, or anything else [Keyring](https://pypi.python.org/pypi/keyring) supports. ## Usage Install with pip/setuptools: ``` $ pip install awscli-keyring ``` Turn it on and add some credentials: ``` $ aws configure set plugins.keyring awscli_keyring $ aws keyring add AWS Access Key ID [None]: ... AWS Secret Acess Key [None]: ... $ aws ec2 describe-instances { ... } ``` This will change your config like: ``` # ~/.aws/config [plugins] keyring = awscli_keyring [default] keyring = true ``` If you already have credentials, it will use them as defaults, but will not remove them from your configuration. We encourage you to rotate your credentials, put the new ones in keyring and remove the old ones. You can also add keyring credentials for different profiles: ``` $ aws --profile work keyring add AWS Access Key ID [None]: ... AWS Secret Acess Key [None]: ... $ aws --profile work ec2 describe-instances { ... } ``` Which adds the keyring flag to the profile configuration: ``` # ~/.aws/config # ... [profile work] keyring = true ``` If you need to see the credentials, or use other command line tools that require credentials in your env, use show. Adding `--export` will prefix each line with `export`. ``` $ aws keyring show AWS_ACCESS_KEY_ID="..." AWS_SECRET_ACCESS_KEY="..." $ eval "$(aws keyring show --export)" $ env | grep AWS AWS_ACCESS_KEY_ID="..." AWS_SECRET_ACCESS_KEY="..." # now do whatever... then close your shell. ```