Skip to content
We’ve expanded to support VM-based workloads.
Read about it!
Product
Use Cases
Blog
About Us
Pricing
Product
Use Cases
Blog
About Us
Pricing
START FOR FREE
Product
Use Cases
Blog
About Us
Pricing
Menu
Product
Use Cases
Blog
About Us
Pricing
Blog
Product Updates
Industry Insights
Best Practices
Company & Team News
Resources
Menu
Product Updates
Industry Insights
Best Practices
Company & Team News
Resources
X
Blog
Product Updates
Industry Insights
Best Practices
Company & Team News
Resources
Menu
Product Updates
Industry Insights
Best Practices
Company & Team News
Resources
Tag: authentication
Resources
SPIFFE and SPIRE: Your Questions Answered
Explore how the specifications impact secrets management and workload identity and access management practices across distributed environments....
Kevin Sapp
shareicon
Facebook
Twitter
LinkedIn
Oct 2023
7
min read
Best Practices
There is No MFA for Machines: Do This Instead
Policy-based access control and posture-based conditional access are far better options to bolster secure workload-to-workload communication....
Apurva Davé
shareicon
Facebook
Twitter
LinkedIn
Oct 2023
5
min read
Industry Insights
Aembit vs. SPIFFE/SPIRE
This article briefly describes SPIFFE and SPIRE and explains how Aembit differs from them....
Victor Ronin
shareicon
Facebook
Twitter
LinkedIn
Feb 2023
4
min read
Product Updates
Aembit vs. Secrets Managers
This article discusses some key differences between Aembit and secrets managers and how Aembit can provide a better access solution...
Victor Ronin
shareicon
Facebook
Twitter
LinkedIn
Dec 2022
4
min read
Industry Insights
Authenticate to Microsoft Graph API using OAuth 2.0 Client Credentials
This article will help you understand how to authenticate a workload with the Microsoft Graph REST API using the OAuth...
Kevin Sapp
shareicon
Facebook
Twitter
LinkedIn
Sep 2022
3
min read