Non-Human Identity Articles

Latest insights and knowledge on Non-Human / Machine / Workload Identity Mgmt

hardware attestation

Hardware-Attested Workload Launch: Securing Non-Human Identities

Explore how hardware-attested workload launch enhances security for non-human identities, machine identities, and workload identities.

By AbdelRahman Magdy 13 min read
Read full article
microservices

Identity Propagation in Microservices: Securing Non-Human Identities

Learn how to securely propagate non-human identities (NHI) across microservices for robust authentication and authorization.

By AbdelRahman Magdy 8 min read
Read full article
workload identity

Securing Workloads in Isolation: Workload Identity in Air-Gapped Environments

Explore the challenges and solutions for implementing workload identity in air-gapped environments to secure non-human identities and critical applications.

By AbdelRahman Magdy 12 min read
Read full article
service mesh

Service Mesh Identity Propagation for Non-Human Identities

Learn how service mesh identity propagation enhances security for non-human identities (NHIs) like workloads and machines within microservice architectures.

By AbdelRahman Magdy 10 min read
Read full article
HSMaaS

Hardware Security Module as a Service (HSMaaS) for Non-Human Identity

Explore how Hardware Security Module as a Service (HSMaaS) enhances Non-Human Identity, Machine Identity, and Workload Identity security in cloud environments.

By AbdelRahman Magdy 10 min read
Read full article
Non-Human Identity

Non-Human Identity (NHI) in Blockchain: Securing the Future of Machine-to-Machine Interactions

Explore the intersection of Non-Human Identity (NHI) and blockchain technology, focusing on machine identity, workload identity, and the future of secure M2M interactions.

By AbdelRahman Magdy 11 min read
Read full article
workload persona

Workload Personas: Securing Non-Human Identities

Understand workload personas and how they enhance security for non-human identities (NHIs) in modern infrastructure.

By Lalit Choda 11 min read
Read full article
workload attestation

Attesting Workload Source: Securing Non-Human Identities

Learn how to attest workload source and improve Non-Human Identity security. Explore hardware roots of trust, remote attestation, and workload orchestration.

By AbdelRahman Magdy 13 min read
Read full article
certificate authority proxy

Automated Certificate Authority Proxy: Securing Non-Human Identities

Learn how automated certificate authority proxies enhance security and streamline certificate management for non-human identities in modern IT environments.

By Lalit Choda 11 min read
Read full article