Authentication Methods Introduction
In Authentication & Authorization we saw that Authentication Methods represent machine identities or human identities.
Instead of authenticating identities itself, in most cases, Akeyless integrates with 3rd party identity providers that provide tokens of authentication.
For machine access, Akeyless supports:
- Cloud identities (CSP IAM) such as AWS IAM, Azure AD, and GCP.
- On-prem machines using Akeyless Universal Identity ™.
- Kubernetes Auth.
- Certificate based Authentication.
- API Keys
For human access, Akeyless supports:
which are used by known identity providers such as Okta, Azure AD, and others.
Under your account settings in the console, you will find a tab titled Authentication Settings. Currently, this tab allows you to customize the expiration limits (TTL) and default for authentication methods that are time-sensitive.
You can set a custom range of possible TTL for your tokens, setting the minimum, default, and maximum allowed TTL for your tokens.
The default setting of your token TTL will affect all your authentication methods unless you have set a different TTL for a specific authentication method.
For an authentication method to have the necessary permissions to perform actions, you will need to attach it to a matching role.
To learn more about this, please go to Access Roles & RBAC.
Updated 17 days ago