The Akeyless Dev Hub

If you're looking for help with the only zero-trust, SaaS, unified platform for secrets management - you've come to the right place.

This is our documentation and updates center.


Authentication Methods Introduction

In AuthN and AuthZ: Concepts we saw that Authentication Methods represent machine identities or human identities.

Instead of authenticating identities itself, in most cases, Akeyless integrates with 3rd party identity providers that provide tokens of authentication.

  • For machine access, Akeyless supports:
    -- Cloud identities (CSP IAM) such as AWS IAM, Azure AD, and GCP.
    -- On-prem machines using Akeyless Universal Identity ™.

  • For human access, Akeyless supports LDAP, SAML, OpenID , and JWT, which are used by known identity providers such as Okta, Azure AD, and others.

  • Akeyless also supports the use of API Keys for authentication of both human and machine identities.

Updated 23 days ago

Authentication Methods Introduction

Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.