Authentication Methods Introduction
In AuthN and AuthZ: Concepts we saw that Authentication Methods represent machine identities or human identities.
Instead of authenticating identities itself, in most cases, Akeyless integrates with 3rd party identity providers that provide tokens of authentication.


-
For machine access, Akeyless supports:
-- Cloud identities (CSP IAM) such as AWS IAM, Azure AD, and GCP.
-- On-prem machines using Akeyless Universal Identity ™.
-- Kubernetes Auth. -
For human access, Akeyless supports LDAP, SAML, OIDC , and OAuth2.0/JWT, which are used by known identity providers such as Okta, Azure AD, and others.
-
Akeyless also supports the use of API Keys for authentication of both human and machine identities.
Global Settings
You can set a custom range of possible TTL for your tokens, to ensure they will meet your requirements. This range will impact all your authentication methods, where you can set, the minimum, default, and maximum allowed TTL for your tokens.
The default setting of your token TTL will affect all your authentication methods unless you have set a different TTL for a specific authentication method.
Updated 4 months ago