Skip to content

Secure Secrets & Non-Human Identities. Your Way.

Start free or customize an enterprise solution tailored to your needs.

Pure SaaS or Hybrid SaaS:
Choose the Deployment That Works for You

Pure SaaS delivers the simplicity and scalability of a fully cloud-managed solution for rapid deployment and minimal operational overhead. 

Hybrid SaaS combines all the benefits of SaaS with the added control of on-premise gateways and Zero-Knowledge encryption, enabling you to control your secrets and identity data within your private infrastructure while meeting compliance and regulatory requirements.

Feature Pure SaaS Hybrid SaaS
Deployment & Management Fully cloud-managed On-premise gateways included
Infrastructure No infrastructure maintenance Low maintenance, advanced control
Scalability Cloud-native scalability Scalable, with customer- controlled environments
Control Cloud-managed Zero-Knowledge, full organizational control
Starter Tier Inclusion Included 1 gateway included for exploration
Ideal For Fast, maintenance-free, cloud-native use cases Compliance-heavy, highly controlled environments

Need more information? Learn more about how we price our products. 

Pricing Units and Plans

Pricing Units

Clients 

Definition

Clients are human users, applications, or servers that initiate a remote session with Akeyless services. Multiple instances of the same application count as a single client. A single user with multiple authentication methods is also counted once. For more details on client counting, refer to Akeyless Clients.

How We Count

  • Monthly Tracking: The total number of distinct clients is counted at the end of each month.
  • Annual Quota: Unused monthly client capacity can be carried over and applied toward the annual quota (monthly quota × 12).
  • Overage & True-Ups: If usage is projected to exceed or has reached the annual client quota, Akeyless will notify the Customer in writing. Any overage is invoiced at the end of the 12-month contract period based on actual usage.

HSM Integration  

Definition

HSM Integration refers to connecting the Akeyless Gateway with an external Hardware Security Module (HSM) for storing or protecting the Customer Fragment and obtaining entropy for encryption/decryption operations.

How We Count

  • Annual Tracking: Each distinct integration between the Akeyless Gateway and an external HSM is counted on an annual basis.
  • Overage & Invoicing: If the total number of HSM integrations exceeds the purchased quota, a written notification is sent. Overage fees are invoiced at the end of the contract year.

Connectors

Definition

A Connector is an object in the Akeyless Platform used to synchronize and manage secrets stored in external vaults (e.g., AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, Kubernetes Secrets, HashiCorp Vault).

How We Count

  • Monthly Tracking: Each distinct Connector object in the Akeyless Platform is counted monthly.
  • Notifications & Reconciliation: Customers approaching or exceeding the purchased quota may receive a notification. Final usage is reconciled at the end of the contract year.

Certificates   

Definition

A Certificate refers to any digital certificate (e.g., SSL/TLS, code-signing, client authentication) that is managed through the Akeyless Certificate Lifecycle Management (CLM) service.

How We Count

  • Annual Tracking: The count is based on valid (non-expired) certificates in the platform over the contract year.
  • Quota Utilization: Customers purchase an annual package of X certificates. The maximum number of active certificates at any point during the year must not exceed this quota.
  • Overage & Notification: If usage surpasses the purchased quota, Akeyless issues a written notification. Overage fees are calculated and invoiced at the end of the contract year, based on the highest peak usage of valid certificates.

1. Transactions 

Definition

A Transaction is a discrete interaction involving the creation, retrieval, management, or usage of cryptographic keys and associated encryption/decryption operations. Examples include key generation, key retrieval, key rotation, key deletion, encryption operations, decryption operations, and access control modifications.

How We Count

  • Monthly Tracking: The total number of transactions is counted at the end of each month.
  • Annual Quota: Unused monthly transactions carry over toward the annual quota (monthly quota × 12).
  • Overage & True-Ups: Akeyless notifies the Customer upon reaching the annual transaction quota. Any overage is invoiced at the end of each 12-month contract period based on actual consumption.

 

2. KMIP/TDE Applications 

Definition

KMIP/TDE Applications are software applications, databases, or services that integrate with Akeyless via the Key Management Interoperability Protocol (KMIP) or by leveraging Transparent Data Encryption (TDE) features. Each unique integration or deployment—such as a separate database server configured to use Akeyless TDE—counts as one application.

How We Count

  • Monthly Tracking: Each distinct KMIP client connected to the Akeyless KMIP server, as well as each database instance using Akeyless TDE, is counted.
  • Notifications & Reconciliation: If monthly usage nears or exceeds the purchased quota, Akeyless may issue a notification. At the end of the annual billing cycle, total usage is reconciled against the annual quota.

3. Tokenizers 

Definition

A Tokenizer is an instance of Akeyless’s data tokenization engine, dedicated to protecting sensitive data by replacing it with format-preserving tokens.

How We Count

  • Monthly Tracking: The platform counts each Tokenizer object at the end of each month.
  • Notifications & Reconciliation: If monthly usage nears or exceeds the purchased quota, a notification may be sent. Final usage is reconciled against the annual purchase at the end of the billing cycle.

 

4. Cloud Accounts (Cloud KMS Orchestrator) 

Definition

A Cloud Account is any individual public cloud account,  such as an AWS account, an Azure subscription, or a Google Cloud project,  that is connected to and orchestrated by the Akeyless Cloud KMS Orchestrator. Each unique cloud account identifier counts as one Cloud Account.

How We Count

  • Monthly Tracking: The platform counts the total number of cloud accounts that have keys synced to them each month.
  • Notifications & Reconciliation: Any usage nearing or exceeding the quota may prompt a notification. Annual reconciliation is conducted at the end of the billing cycle.

Clients 

Definition

Clients are human users, applications, or servers that initiate a remote session with Akeyless services. Multiple instances of the same application count as a single client. A single user with multiple authentication methods is also counted once. For more details on client counting, refer to Akeyless Clients.

How We Count

  • Monthly Tracking: The total number of distinct clients is counted at the end of each month.
  • Annual Quota: Unused monthly client capacity can be carried over and applied toward the annual quota (monthly quota × 12).
  • Overage & True-Ups: If usage is projected to exceed or has reached the annual client quota, Akeyless will notify the Customer in writing. Any overage is invoiced at the end of the 12-month contract period based on actual usage.

Plan Limits

Plan Limits FREE ENTERPRISE
Clients
5
V
MAIN FEATURES
Static Secret
500
V
Dynamic Secret
5
V
Rotated Secret
5
V
Universal Secret Connector
1
V
Plugins for SM (K8S, etc)
V
V
Secret Sharing
V
V
Personal Folder
V
V
Browser Extensions
V
V
Mobile App
V
V
Target
3
V
OIDC App
1
V
SSH Cert Issuer
1
V
PKI Cert Issuer
1
V
Encryption Key (DFC/Classic)
1
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
V
V
API-Key-based authentication
V
V
Kubernetes authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Internal Caching
X
V
HSM Integration
X
V
Plan Limits FREE ENTERPRISE
Clients
5
V
MAIN FEATURES
Universal Secret Connector
1
V
Encryption Key (DFC/Classic)
1
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
V
V
API-Key-based authentication
V
V
Kubernetes authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Internal Caching
X
V
Plan Limits FREE ENTERPRISE
Managed Certificates
5
V
MAIN FEATURES
Cert Issuer (SSH/PKI)
1
V
CAs integrations
1
V
Certificate
5
V
Certificate Auto Renewal
X
V
Certificate Provisioning
X
V
Certificate Discovery
X
V
ACME Protocol
X
V
Encryption Key (DFC/Classic)
X
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
V
V
API-Key-based authentication
V
V
Kubernetes authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Internal Caching
X
V
HSM Integration
X
V
Plan Limits FREE ENTERPRISE
Transaction
1K per day
V
MAIN FEATURES
Encryption Key (DFC/Classic)
5
V
Encryption Operation
Limited
V
Multi-Cloud KMS
5
V
Tokenization
1
V
Code Signing
1
V
KMIP/TDE
1
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
V
V
API-Key-based authentication
V
V
Kubernetes authentication
X
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Internal Caching
X
V
HSM Integration
X
V
Plan Limits FREE ENTERPRISE
Users
5
V
MAIN FEATURES
Static Secret
5
V
Dynamic Secret
5
V
Rotated Secret
5
V
Password Sharing
V
V
Personal Folder
V
V
Browser Extensions
V
V
Mobile App
V
V
Target
3
V
Session Management
V
V
Session Recordings
X
V
Desktop application
X
V
SSH Cert Issuer
1
V
PKI Cert Issuer
1
V
Encryption Key (DFC/Classic)
X
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
API-Key-based authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
X
V
Kubernetes authentication
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V