Developer Guide

The API Key Manager
Built for Real Developer Workflows

Stop hunting through .env files and Notion docs for that Stripe test key. A proper API key manager keeps every credential encrypted, labeled, and one click away — wherever you are in your browser.

🔐 Add to Chrome — Free Learn more at apilocker.dev
The Problem

What Is an API Key Manager — and Why Do You Need One?

An API key manager is a dedicated tool for storing, organizing, and retrieving API credentials. The emphasis is on dedicated: general-purpose password managers and text files are not API key managers, even though developers use them for this job constantly.

Here's the thing about API keys: they're not website passwords. You might have 3 different OpenAI keys — one for production, one for staging, one for a side project. They expire (or should). They're scoped to specific services. And you typically need them while you're on that provider's dashboard, not when you're logging into some app.

A real API key manager solves a specific set of problems:

None of these are things a password manager or .env file handles particularly well. That's the gap a dedicated API key manager fills.

How It Works

How API Locker Works as Your API Key Manager

Three things happen automatically, in seconds.

🔐
Store once, encrypted
Paste your API key into API Locker, give it a label (e.g. "OpenAI — Production"), and pick the provider. The key is encrypted with AES-256-GCM using your master password before it ever touches storage. Your plaintext key never leaves your device on the free plan.
🎯
Smart site detection
When you navigate to platform.openai.com, API Locker detects you're on OpenAI and automatically surfaces your stored OpenAI keys. No searching, no copy-pasting from another tab. The right keys appear in the extension popup the moment you land on that page.
📋
One-click copy
Click the key you want. It's copied to clipboard. Done. The extension works across 32+ provider dashboards out of the box — OpenAI, Anthropic, Stripe, GitHub, AWS, Google Cloud, Twilio, and more. You can add any custom provider manually.
Expiry warnings
Set an expiry date on any key and API Locker will warn you before it expires. No more discovering in production that a key you thought was fine actually rotated 30 days ago.
Comparison

API Key Manager vs. The Alternatives

Let's be honest about the tradeoffs. You have real options here and each one fits a different context.

Approach Encryption at rest Works while on provider site Multiple keys per provider Expiry tracking Cross-machine
.env files No No Sort of No No
Password manager (1Password, Bitwarden) Yes No Workaround No Yes
Plain text / Notion / Slack No No Sort of No Yes
Cloud secrets manager (AWS SSM, Vault) Yes No Yes Depends Yes
API Locker (browser extension) Yes — AES-256 Yes Yes + labels Yes Yes (Pro)

The key insight: cloud secrets managers like HashiCorp Vault or AWS Secrets Manager are excellent for application-level secret management — your CI/CD pipelines, deployed services, team access control. They're the right tool when your code needs to fetch a secret at runtime.

API Locker fills a different slot: your personal developer workflow. When you're sitting at your browser, spinning up a new project, testing an API call in a dashboard, or rotating a key — that's where API Locker shines. It's the missing piece between your cloud secrets infrastructure and your day-to-day development.

Common Mistakes

What Developers Get Wrong About API Key Management

😬
Storing keys in Notion or Google Docs
Cloud docs are convenient but they're not encrypted at rest for you — the provider holds the keys. If your account is compromised, every API key in that doc is exposed. This is one of the most common sources of credential leaks.
🚫
One key for everything
Using the same OpenAI key for your production app, your side project, and your local experiments means a single leak takes everything down. Scoped keys with separate labels let you revoke surgically.
📁
Relying entirely on .env files
.env files are per-project. When you start a new project, where do you get the key from? Usually from another .env file, or from memory, or from a Slack DM you sent yourself. That's where a central API key manager pays off.
♾️
Never rotating keys
API keys should have a lifespan. A key that has been alive for 2 years has had 2 years of exposure — in your shell history, old laptop backups, emails. Set expiry dates and rotate on a schedule.
Free on Chrome Web Store

Ready to Stop Managing API Keys by Hand?

Install API Locker in 30 seconds. Your keys are encrypted and organized before your next coffee.

🔐 Add to Chrome — Free