Skip to content

IDC Spotlight: Securing the Enterprise with Modern Secrets Management – Download Now

Akeyless Clients

An Akeyless Client is  a unique identity, such as an application, user, or machine, which consumes secrets and/or authenticates itself through the Akeyless Platform. Registration and reception of the same uniquely identified client are counted as one client per month.

More about Akeyless Clients

An Akeyless client represents any identity authenticated to the Akeyless platform. Thus, a client can represent a “user,” that is, a human who logs into the service to consume policies or secrets. Every user who logs into the service while using authentication is considered a “client.” Similarly, every application, service, or any other machine-based system that authenticates to the Akeyless service is also considered a client.

There can be many different types of clients that authenticate and communicate with Akeyless Platform, using one of the below authentication methods:

For machine access, Akeyless supports:

For human access, Akeyless supports

Akeyless also supports the use of API Keys for authentication of both human and machine identities.

How do clients work in Akeyless?

When a client authenticates to the Akeyless Platform, whether that client is a user, application or server, it is associated with a unique entity within the Management Console and is reported to the identity system (IDP) via the different authentication methods listed above (Authentication List).  Every client entity is created or verified during authorization. 

How are Clients Counted?

The Akeyless Platform ensures that entities are not counted more than once. Upon authentication for the first time during a billing period, Akeyless creates a unique entity for each human, application, service, or CI/CD pipeline.

Consider, for instance, an application called App-A that needs a secret from Akeyless. Since App-A is associated with a specific entity via a unique identifier within Akeyless, Akeyless knows whenever Application-A authenticates and authorizes, and will not count App-A more than once.

What Unique Identifiers does Akeyless Use?

For human users, a unique identifier is usually an email, username, or UPN. Whenever a user logs in with a token, SAML, OIDC, OAuth2.0, JWT, or LDAP Identity Providers issue sub-claims containing details that uniquely identify the user. A sub-claim includes a key holding the unique identifier value configured for the user, and distinguishes between different users from within the same organization.

For machines, a unique identifier is usually an access ID. Whenever a machine logs in with that identifier it contains details that uniquely identify the machine, distinguishing between different machines from within the same organization.

For Kubernetes, a unique identifier will require Access_ID, Config and namespace.

Authentication methods and how they are reported

Authentication MethodsName reported by auth method
Machine Authentication
AWS IAMAccess_ID
Azure ADAccess_ID
GCPAccess_ID
Akeyless Universal Identity™Token / Comment
Kubernetes AuthAccess_ID x Config x namespace
API KeyAccess_ID
Certificate based AuthenticationUnique Identifier – Common_Name, Organizational_Unit
Human Authentication
LDAP/sUnique Identifier – Username, Email Address, or UPN
SAMLUnique Identifier – Username, Email Address, or UPN
OIDC Unique Identifier – Username, Email Address, or UPN
OAuth 2.0/JWTUnique Identifier – Username, Email Address, or UPN
API KeyAccess_ID