How to Install AWS-Vault on Windows
AWS-Vault helps you keep AWS access keys out of plaintext files by storing them in Windows Credential Manager and minting short-lived sessions when you need the AWS CLI or Management Console.
This guide shows a clean Windows workflow for installing AWS-Vault, adding a base profile, assuming a role, and testing access. For the broader overview and sibling guides, start with AWS-Vault Guide: Install, Configure and Use It Securely.
Important: the original 99designs repository is marked abandoned. Before you standardise on AWS-Vault, review the current releases or active fork and compare it with IAM Identity Center for your organisation.
Prerequisites
- A Windows workstation where you can install command-line tools.
- An AWS IAM user or bootstrap profile that can assume the role you want to use.
- AWS CLI v2 is installed and available on your path.
- MFA is enabled for the account if your organisation requires it.
Install AWS-Vault on Windows
The upstream project documents Chocolatey and Scoop as the main Windows package manager options:
choco install aws-vaultscoop install aws-vaultAfter installation, open a new PowerShell or Command Prompt window and verify the binary is available:
aws-vault --versionAdd a base profile
Create a base profile that stores your long-lived access key in Windows Credential Manager instead of a plaintext credentials file:
aws-vault add devYou will be prompted for the AWS access key ID and secret access key for that bootstrap IAM user.
Configure a role profile
Edit %UserProfile%\.aws\config and add a role profile that points back to the stored base profile:
[profile dev-admin]
source_profile = dev
role_arn = arn:aws:iam::123456789012:role/DeveloperAccess
mfa_serial = arn:aws:iam::123456789012:mfa/your.name
region = eu-west-2This keeps the reusable long-lived key in the Windows secure store while the role profile uses temporary credentials for day-to-day work.
Test AWS CLI access
Run a simple STS call through AWS-Vault to confirm your role configuration works:
aws-vault exec dev-admin -- aws sts get-caller-identityIf MFA is configured, AWS-Vault will prompt for the token before creating the session.
Open the AWS Management Console
To launch a short-lived console session in your browser, run:
aws-vault login dev-adminThis is useful when you want browser access without manually copying credentials into the console.
Windows-specific tips
- AWS-Vault uses Windows Credential Manager by default, so protect your local Windows account with a strong password and full-disk encryption.
- If PowerShell cannot find
aws-vaultit after installation, close the shell and start a new session so the path updates are picked up. - Use
aws-vault listto see stored profiles andaws-vault remove devto delete one you no longer use.
When to choose IAM Identity Center instead
If your organisation already uses Microsoft Entra ID, Okta, or another central identity provider for workforce access, IAM Identity Center is often the better long-term default. AWS-Vault is most useful for local developer and administrator workflows that still rely on IAM-user bootstrap credentials and role assumption.

Recent Comments