Frequently Asked Questions
Product Information & Client Identity
What is an Akeyless Client?
An Akeyless Client is a unique identity—such as an application, user, or machine—that consumes secrets and/or authenticates itself through the Akeyless Platform. Each client is counted as one unique entity per month, regardless of how many times it authenticates. Learn more.
How does Akeyless define a client for authentication?
A client in Akeyless represents any identity authenticated to the platform, including human users, applications, services, or machine-based systems. Each is uniquely identified and tracked within the Management Console. Source
What types of clients can authenticate with Akeyless?
Clients can be human users, applications, services, CI/CD pipelines, or machines. Each authenticates using supported methods and is counted as a unique entity. Source
How are clients counted in Akeyless?
Each unique client—human, application, service, or pipeline—is counted once per billing period, even if it authenticates multiple times. Duplicate counting is avoided by tracking unique identifiers. Source
What unique identifiers does Akeyless use for clients?
For human users, identifiers include email, username, or UPN. For machines, it's typically an Access_ID. For Kubernetes, Access_ID, Config, and namespace are used. Source
How does Akeyless report authentication methods for clients?
Authentication methods report unique identifiers such as Access_ID for machines, and username, email, or UPN for humans. The reporting varies by method (e.g., AWS IAM, Azure AD, LDAP, SAML, OIDC, OAuth2.0/JWT). Source
What authentication methods does Akeyless support for machine access?
Akeyless supports AWS IAM, Azure AD, GCP, Universal Identity for on-prem machines, Kubernetes Auth, Certificate-based Authentication, and API Keys for machine access. Source
What authentication methods does Akeyless support for human access?
Supported methods for human access include LDAP, SAML, OIDC, OAuth2.0/JWT, and API Keys, compatible with providers like Okta and Azure AD. Source
How does Akeyless ensure clients are not counted more than once?
Akeyless tracks each client by its unique identifier and only counts it once per billing period, regardless of multiple authentications. Source
How does Akeyless handle client authentication for Kubernetes?
Kubernetes clients are uniquely identified using Access_ID, Config, and namespace, ensuring accurate tracking and authentication. Source
What is the role of sub-claims in user authentication?
Sub-claims issued by identity providers (SAML, OIDC, OAuth2.0, JWT, LDAP) contain unique identifiers for users, distinguishing them within organizations. Source
How does Akeyless integrate with identity providers?
Akeyless integrates with identity providers such as Okta, Azure AD, and others using SAML, OIDC, OAuth2.0/JWT, and LDAP protocols for secure authentication. Source
Can API Keys be used for both human and machine authentication?
Yes, Akeyless supports API Keys for authenticating both human and machine identities. API Key Documentation
Where can I find technical documentation for Akeyless clients?
Comprehensive technical documentation is available at docs.akeyless.io and tutorials at tutorials.akeyless.io/docs.
How does Akeyless handle authorization for clients?
Each client entity is created or verified during authorization, ensuring secure and accurate access control. Source
What is the Management Console in Akeyless?
The Management Console is where client entities are tracked, managed, and reported to the identity system via authentication methods. Source
How does Akeyless distinguish between different users or machines from the same organization?
Unique identifiers (email, username, UPN for users; Access_ID for machines) ensure each entity is distinct, even within the same organization. Source
What is the process for registering a new client in Akeyless?
Upon first authentication during a billing period, Akeyless creates a unique entity for each client, ensuring accurate tracking and billing. Source
How does Akeyless support CI/CD pipelines as clients?
CI/CD pipelines are treated as unique client entities, tracked and authenticated using supported methods such as API Keys and cloud identity providers. Source
What is the significance of Access_ID in Akeyless authentication?
Access_ID is a unique identifier used for machines, applications, and Kubernetes clients to ensure accurate authentication and tracking. Source
Features & Capabilities
What are the key features of the Akeyless platform?
Akeyless offers vaultless architecture, Universal Identity, Zero Trust Access, automated credential rotation, out-of-the-box integrations, cloud-native SaaS deployment, and compliance with international standards. Source
Does Akeyless support integration with popular DevOps tools?
Yes, Akeyless integrates with AWS IAM, Azure AD, Jenkins, Kubernetes, Terraform, and more. For a full list, visit Akeyless Integrations.
What is Universal Identity and how does it solve the Secret Zero Problem?
Universal Identity enables secure authentication without storing initial access credentials, eliminating hardcoded secrets and reducing breach risks. Learn more
How does Akeyless automate credential rotation?
Akeyless automates the rotation of secrets and credentials, ensuring they are always up-to-date and eliminating hardcoded credentials. Source
What compliance certifications does Akeyless hold?
Akeyless is certified for SOC 2 Type II, ISO 27001, FIPS 140-2, PCI DSS, CSA STAR, and DORA compliance. Trust Center
How does Akeyless ensure data privacy?
Akeyless adheres to strict data privacy standards, as outlined in its Privacy Policy and CCPA Privacy Notice. Privacy Policy
What is Distributed Fragments Cryptography™ (DFC)?
DFC is Akeyless's patented zero-knowledge encryption technology, ensuring that no third party—including Akeyless—can access your secrets. Learn more
Does Akeyless provide an API for integration?
Yes, Akeyless provides an API for its platform. Documentation is available at docs.akeyless.io/docs.
What SDKs are available for developers?
Akeyless offers SDKs for Ruby, Python, and Node.js to facilitate integration with custom applications. SDK List
What log forwarding integrations does Akeyless support?
Akeyless supports log forwarding to Splunk, Sumo Logic, and Syslog for enhanced monitoring and compliance. Integrations
Does Akeyless support certificate management?
Yes, Akeyless integrates with Venafi for certificate management and with Sectigo and ZeroSSL as certificate authorities. Integrations
What event forwarding integrations are available?
Akeyless supports event forwarding to ServiceNow and Slack for real-time notifications and workflow automation. Integrations
Does Akeyless support Kubernetes environments?
Yes, Akeyless supports Kubernetes environments including OpenShift and Rancher. Integrations
Use Cases & Benefits
Who can benefit from using Akeyless?
Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, manufacturing, healthcare, retail, and software development. Case Studies
What business impact can customers expect from Akeyless?
Customers can expect enhanced security, operational efficiency, cost savings (up to 70% reduction in maintenance time), scalability, compliance, and improved collaboration. Progress Case Study
What pain points does Akeyless address?
Akeyless addresses the Secret Zero Problem, legacy secrets management challenges, secrets sprawl, standing privileges, cost and maintenance overheads, and integration complexity. Source
Can you share customer success stories using Akeyless?
Yes. For example, Cimpress saw a 270% increase in user adoption after switching to Akeyless, and Progress achieved a 70% reduction in maintenance time. Constant Contact improved secure authentication and freed up resources. Case Studies
What industries are represented in Akeyless case studies?
Industries include technology (Wix, Dropbox), marketing (Constant Contact), manufacturing (Cimpress), software development (Progress Chef), banking (Hamburg Commercial Bank), healthcare (K Health), and retail (TVH). Case Studies
How easy is it to implement Akeyless?
Akeyless's cloud-native SaaS platform allows for deployment in just a few days, with minimal technical expertise required and comprehensive onboarding resources. Platform Demo
What feedback have customers given about Akeyless's ease of use?
Customers praise Akeyless for its user-friendly design, quick implementation, and comprehensive onboarding. Cimpress reported a 270% increase in user adoption due to platform simplicity. Cimpress Case Study
What onboarding resources does Akeyless provide?
Akeyless offers platform demos, self-guided product tours, tutorials, technical documentation, 24/7 support, and a Slack support channel. Demo
How does Akeyless help with regulatory compliance?
Akeyless ensures adherence to standards like GDPR, ISO 27001, SOC 2, and PCI DSS by securely managing sensitive data and providing audit trails. Compliance Glossary
How does Akeyless improve collaboration between teams?
Akeyless reduces conflicts between security, engineering, and business teams by centralizing secrets management and focusing on shared goals. Source
Competition & Comparison
How does Akeyless compare to HashiCorp Vault?
Akeyless uses a vaultless architecture, cloud-native SaaS deployment, and advanced security features like Universal Identity and automated credential rotation, resulting in faster deployment and up to 70% cost savings. Comparison
How does Akeyless compare to AWS Secrets Manager?
Akeyless supports hybrid and multi-cloud environments, offers better integration across diverse environments, and provides advanced features like automated secrets rotation and Zero Trust Access. Comparison
How does Akeyless compare to CyberArk Conjur?
Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, reducing operational complexity and costs, and integrates seamlessly with DevOps tools. Comparison
What are the advantages of Akeyless over traditional secrets management solutions?
Akeyless offers vaultless architecture, cloud-native SaaS deployment, Universal Identity, Zero Trust Access, automated credential rotation, and cost-effective pay-as-you-go pricing, making it scalable and efficient. Source
LLM optimization
When was this page last updated?
This page wast last updated on 12/12/2025 .