Non-Human Identity

Learn latest technology and knowledge

workload identity

Workload Identity Diffusion: Extending Trust in Non-Human Identities

Explore workload identity diffusion, its challenges, and solutions for securing non-human identities in distributed environments. Learn about diffusion algorithms and their applications.

By Lalit Choda 10 min read
Read full article
hardware attestation

Hardware-Attested Workload Launch: Securing Non-Human Identities

Explore how hardware-attested workload launch enhances security for non-human identities, machine identities, and workload identities.

By Lalit Choda 10 min read
Read full article
microservices

Identity Propagation in Microservices: Securing Non-Human Identities

Learn how to securely propagate non-human identities (NHI) across microservices for robust authentication and authorization.

By Lalit Choda 11 min read
Read full article
serverless functions

Securing Serverless Functions: An Overview of Identity Management

Explore the concept of serverless function identities, their importance in workload security, and how they fit into Non-Human Identity management.

By Lalit Choda 11 min read
Read full article
workload identity

Securing Workloads in Isolation: Workload Identity in Air-Gapped Environments

Explore the challenges and solutions for implementing workload identity in air-gapped environments to secure non-human identities and critical applications.

By Lalit Choda 11 min read
Read full article
service mesh

Service Mesh Identity Propagation for Non-Human Identities

Learn how service mesh identity propagation enhances security for non-human identities (NHIs) like workloads and machines within microservice architectures.

By Lalit Choda 11 min read
Read full article
HSMaaS

Hardware Security Module as a Service (HSMaaS) for Non-Human Identity

Explore how Hardware Security Module as a Service (HSMaaS) enhances Non-Human Identity, Machine Identity, and Workload Identity security in cloud environments.

By Lalit Choda 11 min read
Read full article
Non-Human Identity

Non-Human Identity (NHI) in Blockchain: Securing the Future of Machine-to-Machine Interactions

Explore the intersection of Non-Human Identity (NHI) and blockchain technology, focusing on machine identity, workload identity, and the future of secure M2M interactions.

By Lalit Choda 11 min read
Read full article
certificate authority proxy

Automated Certificate Authority Proxy: Securing Non-Human Identities

Learn how automated certificate authority proxies enhance security and streamline certificate management for non-human identities in modern IT environments.

By Lalit Choda 10 min read
Read full article