Skip to content

Akeyless Platform allows you to use your existing Ping Identity roles to authenticate to Akeyless. This way, Akeyless can authenticate the machines and provide back the Akeyless-owned token for further use. Once the user has the token, and based on their prescribed privileges, they can perform various operations within Akeyless, such as creating static secrets, connecting via SSH, and fetching dynamic secrets. This way, you can offer your organization resources with password-less access to credentials kept in the Akeyless.