[GH-ISSUE #5235] [feature]: Ability to use AWS Profiles for AWS Signature #1997

Open
opened 2026-03-16 22:48:13 +03:00 by kerem · 2 comments
Owner

Originally created by @kirillmakhonin-brt on GitHub (Jul 9, 2025).
Original GitHub issue: https://github.com/hoppscotch/hoppscotch/issues/5235

Is there an existing issue for this?

  • I have searched the existing issues

Summary

I would like to have an ability to use AWS Profiles instead of Access Key and Secret Key for AWS Signature Authorization.

Why should this be worked on?

Huge companies are using AWS SSO and do not allow Access Key and Secret Key usage. It will help to adopt Hoppscotch across wider set of users.

Originally created by @kirillmakhonin-brt on GitHub (Jul 9, 2025). Original GitHub issue: https://github.com/hoppscotch/hoppscotch/issues/5235 ### Is there an existing issue for this? - [x] I have searched the existing issues ### Summary I would like to have an ability to use AWS Profiles instead of Access Key and Secret Key for AWS Signature Authorization. ### Why should this be worked on? Huge companies are using AWS SSO and do not allow Access Key and Secret Key usage. It will help to adopt Hoppscotch across wider set of users.
Author
Owner

@mcdgavin commented on GitHub (Feb 15, 2026):

Can I work on this?

<!-- gh-comment-id:3905264040 --> @mcdgavin commented on GitHub (Feb 15, 2026): Can I work on this?
Author
Owner

@mcdgavin commented on GitHub (Feb 18, 2026):

Lets define some acceptance criteria:

  • Should work for web or desktop
  • Don't impact existing key/secret manual entry
  • Should support:
    • Static ~/.aws/credentials files
    • Temporary permissions via STS AssumeRole
    • AWS SSO via cli login (aws sso login --profile)
    • Multiple profiles + profile switching

Does this cover it?

<!-- gh-comment-id:3918243313 --> @mcdgavin commented on GitHub (Feb 18, 2026): Lets define some acceptance criteria: - Should work for web or desktop - Don't impact existing key/secret manual entry - Should support: - Static ~/.aws/credentials files - Temporary permissions via STS AssumeRole - AWS SSO via cli login (aws sso login --profile) - Multiple profiles + profile switching Does this cover it?
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/hoppscotch#1997
No description provided.