You can integrate your AWS Bedrock models with Arato by adding your AWS credentials. Arato uses these credentials to authenticate with Bedrock on your behalf.
Step 1 - Obtain AWS Credentials
You will need an Access Key ID and Secret Access Key (and optionally a Session Token, if you are using temporary credentials).
There are two common ways to obtain these credentials:
Option A: IAM User Access Keys
Sign in to the AWS Management Console (https://console.aws.amazon.com/).
Go to IAM → Users.
Select your IAM user.
Under the Security credentials tab, click Create access key.
Copy the generated Access Key ID and Secret Access Key.
Note your Region (e.g.
us-east-1) where Bedrock is available.
Option B: Temporary Session Credentials (AWS SSO / Access Portal)
If you are using AWS SSO or federated login, you may need temporary credentials:
Log in via your organization’s AWS access portal.
Retrieve the Access Key ID, Secret Access Key, and Session Token by clicking the Access keys from the AWS access portal page, or alternatively using the CLI:
aws sts get-session-token
Copy the output values for use in Arato.
Step 2. Format the Credentials as JSON
Arato expects the credentials in a JSON object inside the API Key field.
Use one of the following formats:
Permanent IAM User Keys:
{
"region": "us-east-1", "accessKeyId": "AKIA********XG", "secretAccessKey": "i********p8"
}Temporary Session Keys:
{
"region": "us-east-1", "accessKeyId": "AKIA********XG", "secretAccessKey": "i********p8", "sessionToken": "IQoJb********rI"
}
Step 3. Add the Key in Arato
Go to Settings → API Key Management in Arato.
Click Add a Key.
Select Bedrock as the Vendor.
Paste the full JSON string into the API Key box.
Enter a descriptive Key Name (e.g. “Bedrock Prod us-east-1”).
Optionally, add a description.
Click Save.
Notes & Best Practices
Keep your keys secure – do not share them publicly.
If possible, use temporary credentials for better security.
Make sure your IAM user or role has the necessary Bedrock permissions (e.g.
bedrock:InvokeModel*,bedrock:List*).Rotate your access keys regularly following AWS security best practices.