All Announcements

🆕 Secret References

You can now point Portkey at credentials in AWS Secrets Manager, Azure Key Vault, or HashiCorp Vault instead of pasting keys in the product—using secret_mappings so values are fetched at runtime.

This means:

→ Sensitive material stays in vaults you already control and audit

→ Integrations and virtual keys reference secrets by mapping, not plaintext

→ Rotation and access policies live where your infra team expects them

Set it up for your org ->