Non-Human Identity

Learn latest technology and knowledge

microservices

Identity Propagation in Microservices: Securing Non-Human Identities

Learn how to securely propagate non-human identities (NHI) across microservices for robust authentication and authorization.

By Lalit Choda 11 min read
Read full article
hardware attestation

Hardware-Attested Workload Launch: Securing Non-Human Identities

Explore how hardware-attested workload launch enhances security for non-human identities, machine identities, and workload identities.

By Lalit Choda 10 min read
Read full article
service mesh

Service Mesh Identity Propagation for Non-Human Identities

Learn how service mesh identity propagation enhances security for non-human identities (NHIs) like workloads and machines within microservice architectures.

By Lalit Choda 11 min read
Read full article
HSMaaS

Hardware Security Module as a Service (HSMaaS) for Non-Human Identity

Explore how Hardware Security Module as a Service (HSMaaS) enhances Non-Human Identity, Machine Identity, and Workload Identity security in cloud environments.

By Lalit Choda 11 min read
Read full article
workload identity

Dynamic Trust Negotiation for Workloads: Securing Non-Human Identities

Explore dynamic trust negotiation for workloads, enhancing security in non-human identity management. Learn how to implement and benefit from adaptive trust models.

By Lalit Choda 11 min read
Read full article
Non-Human Identity

Non-Human Identity (NHI) in Blockchain: Securing the Future of Machine-to-Machine Interactions

Explore the intersection of Non-Human Identity (NHI) and blockchain technology, focusing on machine identity, workload identity, and the future of secure M2M interactions.

By Lalit Choda 11 min read
Read full article
certificate authority proxy

Automated Certificate Authority Proxy: Securing Non-Human Identities

Learn how automated certificate authority proxies enhance security and streamline certificate management for non-human identities in modern IT environments.

10 min read
Read full article
workload attestation

Attesting Workload Source: Securing Non-Human Identities

Learn how to attest workload source and improve Non-Human Identity security. Explore hardware roots of trust, remote attestation, and workload orchestration.

By Lalit Choda 10 min read
Read full article
workload persona

Workload Personas: Securing Non-Human Identities

Understand workload personas and how they enhance security for non-human identities (NHIs) in modern infrastructure.

11 min read
Read full article
Prev
13 / 29
Next