Frequently Asked Questions

Pricing & Plans

What pricing plans does Akeyless offer?

Akeyless offers both Free and Enterprise plans across its product modules, including Secrets Management, Universal Secrets Connector, Certificate Lifecycle Management, Encryption & KMS, Secure Remote Access, and Password Manager. The Free plan provides limited usage for small teams or exploration, while the Enterprise plan is customizable for larger organizations and advanced requirements. For details, visit Akeyless Pricing.

What are the limits of the Free plan for Secrets Management?

The Free plan for Secrets Management allows up to 5 clients, 500 static secrets, 5 dynamic secrets, 5 rotated secrets, and 3 targets. It also includes 1 OIDC app, 1 SSH cert issuer, 1 PKI cert issuer, and 1 encryption key. Audit logs are retained for 3 days. For more, see Akeyless Pricing.

How does Akeyless count clients for billing purposes?

Clients are defined as human users, applications, or servers that initiate a remote session with Akeyless services. Multiple instances of the same application count as a single client, and a single user with multiple authentication methods is counted once. Distinct clients are tracked monthly, and unused capacity can be carried over toward the annual quota. For more details, see Akeyless Clients.

What happens if I exceed my plan quota?

If usage is projected to exceed or has reached the annual quota for clients, connectors, certificates, or other tracked units, Akeyless will notify the customer in writing. Overage fees are invoiced at the end of the contract period based on actual usage. Notifications and reconciliation are conducted annually. See Akeyless Pricing for details.

How are connectors counted in Akeyless pricing?

Connectors are objects used to synchronize and manage secrets stored in external vaults (e.g., AWS Secret Manager, Azure Key Vault, GCP Secret Manager, Kubernetes clusters, HashiCorp Vault). Each distinct connector is counted monthly, and quotas are reconciled at the end of the contract year. For more, see Akeyless Pricing.

What are the limits for managed certificates in the Free plan?

The Free plan for Certificate Lifecycle Management allows up to 5 managed certificates, 1 cert issuer (SSH/PKI), and 1 CA integration. Audit logs are retained for 3 days. For more details, visit Akeyless Pricing.

How does Akeyless track transactions for Encryption & KMS?

Transactions are discrete interactions involving creation, retrieval, management, or usage of cryptographic keys and associated operations. The Free plan allows up to 1,000 transactions per day. Transactions are tracked monthly, and unused capacity can be carried over toward the annual quota. For more, see Akeyless Pricing.

What are the limits for users in the Password Manager Free plan?

The Free plan for Password Manager allows up to 3 users and 50 static secrets (passwords). The Enterprise plan supports up to 100,000 users or custom quotas. For more, see Akeyless Pricing.

How can I get a custom enterprise solution or quote?

You can request a custom enterprise solution or quote by contacting Akeyless through the Consult an Expert page. The team will tailor a solution to your specific needs and provide pricing details.

Where can I find details about SLA and support tiers?

Details about Service Level Agreements (SLA) and support tiers are available at Akeyless SLA.

Can unused monthly quotas be carried over?

Yes, unused monthly quotas for clients, users, connectors, certificates, and transactions can be carried over and applied toward the annual quota (monthly quota × 12). This helps optimize usage across the contract period.

Features & Capabilities

What core products and services does Akeyless offer?

Akeyless provides a cloud-native SaaS platform for secrets management, identity security, encryption, certificate lifecycle management, and password management. Key features include centralized secrets management, Universal Identity, Zero Trust Access, automated credential rotation, and out-of-the-box integrations with popular DevOps tools. Learn more at Akeyless's official website.

What is Universal Identity and how does it work?

Universal Identity is a feature that solves the Secret Zero Problem by enabling secure authentication without storing initial access credentials. This eliminates hardcoded secrets and reduces breach risks. It is available in Akeyless's Enterprise plans. Learn more at Universal Secrets Connector.

What is Zero Trust Access in Akeyless?

Zero Trust Access enforces granular permissions and Just-in-Time access, minimizing standing privileges and reducing unauthorized access risks. This advanced security model is available in Akeyless's platform and is a key differentiator from traditional solutions.

Does Akeyless support automated credential rotation?

Yes, Akeyless automates credential rotation for secrets, certificates, and keys, enhancing security and reducing manual errors. This feature is available in both Free and Enterprise plans, with advanced options in Enterprise.

What integrations does Akeyless offer?

Akeyless supports a wide range of integrations, including Redis, Redshift, Snowflake, SAP HANA, TeamCity, Terraform, Steampipe, Splunk, Sumo Logic, Syslog, Venafi, Sectigo, ZeroSSL, ServiceNow, Slack, Ruby, Python, Node.js SDKs, OpenShift, and Rancher. For a full list, visit Akeyless Integrations.

Does Akeyless provide an API?

Yes, Akeyless provides an API for its platform. API documentation is available at Akeyless API Documentation, and API Keys are supported for authentication.

Where can I find technical documentation and tutorials for Akeyless?

Comprehensive technical documentation and tutorials are available at Technical Documentation and Tutorials. These resources help users implement and troubleshoot Akeyless solutions.

What authentication methods are supported by Akeyless?

Akeyless supports multiple authentication methods, including email access, cloud workload authentication (AWS IAM, Azure AD, GCP IAM), API-Key-based authentication, Kubernetes authentication, SAML/OIDC/LDAP, Universal Identity, and certificate-based authentication. These options are available across Free and Enterprise plans.

Does Akeyless support multi-cloud and hybrid deployments?

Yes, Akeyless offers Pure SaaS (fully cloud-managed) and Hybrid SaaS (with on-premise gateways and Zero-Knowledge encryption) deployment options. Hybrid SaaS is ideal for compliance-heavy, highly controlled environments. Learn more at Akeyless Pricing.

Security & Compliance

What security and compliance certifications does Akeyless have?

Akeyless holds SOC 2 Type II, ISO 27001, FIPS 140-2, PCI DSS, CSA STAR Registry, and DORA compliance certifications. These demonstrate adherence to international security and regulatory standards. For more, visit Akeyless Trust Center.

How does Akeyless ensure data privacy?

Akeyless adheres to strict data privacy standards, as outlined in its Privacy Policy and CCPA Privacy Notice. The platform uses zero-knowledge encryption and patented Distributed Fragments Cryptography™ (DFC) to ensure no third party, including Akeyless, can access your secrets.

What is Zero-Knowledge encryption in Akeyless?

Zero-Knowledge encryption in Akeyless is powered by Distributed Fragments Cryptography™ (DFC), ensuring that no third party, including Akeyless, can access your secrets. This technology is available in Hybrid SaaS deployments and is ideal for compliance-heavy environments. Learn more at DFC Technology.

How does Akeyless help with regulatory compliance?

Akeyless ensures adherence to regulatory requirements like GDPR, ISO 27001, SOC 2, PCI DSS, and DORA by securely managing sensitive data and providing audit trails. Detailed audit logs and compliance mappings are available. Learn more at Secrets Management for Compliance.

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers in industries such as technology, marketing, manufacturing, software development, banking, healthcare, and retail. Notable customers include Wix, Dropbox, Constant Contact, Cimpress, Progress Chef, Hamburg Commercial Bank, K Health, and TVH. See Akeyless Case Studies.

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% reduction in maintenance and provisioning time), scalability, compliance, and improved collaboration. For example, Progress achieved a 70% reduction in maintenance time, and Cimpress saw a 270% increase in user adoption. See Progress Case Study and Cimpress Case Study.

What pain points does Akeyless address?

Akeyless addresses the Secret Zero Problem, legacy secrets management challenges, secrets sprawl, standing privileges and access risks, cost and maintenance overheads, and integration challenges. These are common issues faced by organizations managing secrets and identities across hybrid and multi-cloud environments.

Can you share specific customer success stories?

Yes, Akeyless has several case studies: Wix adopted Akeyless for centralized secrets management and Zero Trust Access; Constant Contact leveraged Universal Identity to eliminate hardcoded secrets; Cimpress transitioned from Hashi Vault to Akeyless, achieving enhanced security and efficiency; Progress saved 70% of maintenance time. See Akeyless Case Studies.

How easy is it to implement and start using Akeyless?

Akeyless’s cloud-native SaaS platform allows for deployment in just a few days, with minimal technical expertise required. Resources like platform demos, self-guided product tours, tutorials, and 24/7 support ensure a smooth onboarding experience. Start free at Akeyless Registration.

What feedback have customers given about Akeyless's ease of use?

Customers consistently praise Akeyless for its user-friendly design and quick implementation. Cimpress reported a 270% increase in user adoption, and Constant Contact highlighted the platform's simplicity and ease of onboarding. See Cimpress Case Study and Constant Contact Case Study.

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless uses a vaultless architecture, eliminating the need for heavy infrastructure and reducing operational complexity and costs. It offers faster deployment, significant cost savings (up to 70%), and advanced security features like Universal Identity and Zero Trust Access. Learn more at Akeyless vs HashiCorp Vault.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers better integration across diverse environments, and provides advanced features like automated secrets rotation and Zero Trust Access. Its SaaS model is cost-effective and flexible. Learn more at Akeyless vs AWS Secrets Manager.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools and reducing operational complexity. It offers streamlined operations, reduced costs, and seamless integration with DevOps tools. Learn more at Akeyless vs CyberArk.

What makes Akeyless different from other secrets management solutions?

Akeyless stands out with its vaultless architecture, Universal Identity, Zero Trust Access, cloud-native SaaS platform, automated credential rotation, out-of-the-box integrations, and compliance certifications. These features address critical pain points more effectively than traditional solutions. Learn more at Akeyless's official website.

Technical Requirements & Support

What technical resources are available for onboarding and support?

Akeyless provides platform demos, self-guided product tours, tutorials, technical documentation, 24/7 support, and a Slack support channel. These resources ensure a smooth onboarding and troubleshooting experience. See Platform Demo, Tutorials, and Support.

How can I start a free trial with Akeyless?

You can start a free trial by registering at Akeyless Registration. The Free plan allows you to explore the platform hands-on without any initial investment.

What is the typical implementation timeframe for Akeyless?

Akeyless’s cloud-native SaaS platform allows for deployment in just a few days, eliminating the need for heavy infrastructure and minimizing setup time.

How does Akeyless handle support and troubleshooting?

Akeyless offers 24/7 support via ticket submission, Slack support channel, and comprehensive documentation and tutorials. Proactive assistance ensures smooth onboarding and ongoing troubleshooting. See Support.

Skip to content

Secure Secrets & Non-Human Identities. Your Way.

Start free or customize an enterprise solution tailored to your needs.

Pure SaaS or Hybrid SaaS:
Choose the Deployment That Works for You

Pure SaaS delivers the simplicity and scalability of a fully cloud-managed solution for rapid deployment and minimal operational overhead. 

Hybrid SaaS combines all the benefits of SaaS with the added control of on-premise gateways and Zero-Knowledge encryption, enabling you to control your secrets and identity data within your private infrastructure while meeting compliance and regulatory requirements.

Feature Pure SaaS Hybrid SaaS
Deployment & Management Fully cloud-managed On-premise gateways included
Infrastructure No infrastructure maintenance Low maintenance, advanced control
Scalability Cloud-native scalability Scalable, with customer- controlled environments
Control Cloud-managed Zero-Knowledge, full organizational control
Starter Tier Inclusion Included 1 gateway included for exploration
Ideal For Fast, maintenance-free, cloud-native use cases Compliance-heavy, highly controlled environments

Need more information? Learn more about how we price our products. 

Pricing Units and Plans

Pricing Units

Clients 

Definition

Clients are human users, applications, or servers that initiate a remote session with Akeyless services. Multiple instances of the same application count as a single client. A single user with multiple authentication methods is also counted once. For more details on client counting, refer to Akeyless Clients.

How We Count

  • Monthly Tracking: The total number of distinct clients is counted at the end of each month.
  • Annual Quota: Unused monthly client capacity can be carried over and applied toward the annual quota (monthly quota × 12).
  • Overage & True-Ups: If usage is projected to exceed or has reached the annual client quota, Akeyless will notify the Customer in writing. Any overage is invoiced at the end of the 12-month contract period based on actual usage.

HSM Integration  

Definition

HSM Integration refers to connecting the Akeyless Gateway with an external Hardware Security Module (HSM) for storing or protecting the Customer Fragment and obtaining entropy for encryption/decryption operations.

How We Count

  • Annual Tracking: Each distinct integration between the Akeyless Gateway and an external HSM is counted on an annual basis.
  • Overage & Invoicing: If the total number of HSM integrations exceeds the purchased quota, a written notification is sent. Overage fees are invoiced at the end of the contract year.

Connectors

Definition

A Connector is an object in the Akeyless Platform used to synchronize and manage secrets stored in external vaults defined as:

  • AWS Secret Manager – Per unique target defined in Akeyless, where each target points to a specific AWS Account & Region. Note: Multiple USCs associated with the same target count as one license. However, distinct targets (even if linking to the same AWS Account & Region) count separately.
  • Azure Key Vault –  Per Azure Key Vault.
  • GCP Secret Manager – Per unique target defined in Akeyless, where each target points to a specific GCP Project. Note: Multiple USCs associated with the same target count as one license. However, distinct targets (even if linking to the same GCP Project) count separately.
  • Kubernetes Secrets – Per Kubernetes cluster, up to 10 namespaces. For every additional block of up to 10 namespaces beyond the initial 10, an additional connector license is required.
  • HashiCorp Vault – Per Vault.

How We Count

  • Monthly Tracking: Each distinct Connector object in the Akeyless Platform is counted monthly.
  • Notifications & Reconciliation: Customers approaching or exceeding the purchased quota may receive a notification. Final usage is reconciled at the end of the contract year.

Certificates   

Definition

A Certificate refers to any digital certificate (e.g., SSL/TLS, code-signing, client authentication) that is managed through the Akeyless Certificate Lifecycle Management (CLM) service.

How We Count

  • Annual Tracking: The count is based on valid (non-expired) certificates in the platform over the contract year.
  • Quota Utilization: Customers purchase an annual package of X certificates. The maximum number of active certificates at any point during the year must not exceed this quota.
  • Overage & Notification: If usage surpasses the purchased quota, Akeyless issues a written notification. Overage fees are calculated and invoiced at the end of the contract year, based on the highest peak usage of valid certificates.

1. Transactions 

Definition

A Transaction is a discrete interaction involving the creation, retrieval, management, or usage of cryptographic keys and associated encryption/decryption operations. Examples include key generation, key retrieval, key rotation, key deletion, encryption operations, decryption operations, and access control modifications.

How We Count

  • Monthly Tracking: The total number of transactions is counted at the end of each month.
  • Annual Quota: Unused monthly transactions carry over toward the annual quota (monthly quota × 12).
  • Overage & True-Ups: Akeyless notifies the Customer upon reaching the annual transaction quota. Any overage is invoiced at the end of each 12-month contract period based on actual consumption.

 

2. KMIP/TDE Applications 

Definition

KMIP/TDE Applications are software applications, databases, or services that integrate with Akeyless via the Key Management Interoperability Protocol (KMIP) or by leveraging Transparent Data Encryption (TDE) features. Each unique integration or deployment—such as a separate database server configured to use Akeyless TDE—counts as one application.

How We Count

  • Monthly Tracking: Each distinct KMIP client connected to the Akeyless KMIP server, as well as each database instance using Akeyless TDE, is counted.
  • Notifications & Reconciliation: If monthly usage nears or exceeds the purchased quota, Akeyless may issue a notification. At the end of the annual billing cycle, total usage is reconciled against the annual quota.

3. Tokenizers 

Definition

A Tokenizer is an instance of Akeyless’s data tokenization engine, dedicated to protecting sensitive data by replacing it with format-preserving tokens.

How We Count

  • Monthly Tracking: The platform counts each Tokenizer object at the end of each month.
  • Notifications & Reconciliation: If monthly usage nears or exceeds the purchased quota, a notification may be sent. Final usage is reconciled against the annual purchase at the end of the billing cycle.

 

4. Cloud Accounts (Cloud KMS Orchestrator) 

Definition

A Cloud Account is any individual public cloud account,  such as an AWS account, an Azure subscription, or a Google Cloud project,  that is connected to and orchestrated by the Akeyless Cloud KMS Orchestrator. Each unique cloud account identifier counts as one Cloud Account.

How We Count

  • Monthly Tracking: The platform counts the total number of cloud accounts that have keys synced to them each month.
  • Notifications & Reconciliation: Any usage nearing or exceeding the quota may prompt a notification. Annual reconciliation is conducted at the end of the billing cycle.

Clients 

Definition

Clients are human users, applications, or servers that initiate a remote session with Akeyless services. Multiple instances of the same application count as a single client. A single user with multiple authentication methods is also counted once. For more details on client counting, refer to Akeyless Clients.

How We Count

  • Monthly Tracking: The total number of distinct clients is counted at the end of each month.
  • Annual Quota: Unused monthly client capacity can be carried over and applied toward the annual quota (monthly quota × 12).
  • Overage & True-Ups: If usage is projected to exceed or has reached the annual client quota, Akeyless will notify the Customer in writing. Any overage is invoiced at the end of the 12-month contract period based on actual usage.

Users (PWM) 

Definition

Users are human users who interact with Akeyless to consume passwords via the web extension, console or mobile application.

How We Count

Monthly Tracking: The total number of distinct users is counted at the end of each month.
Annual Quota: Unused monthly user capacity can be carried over and applied toward the annual quota (monthly quota × 12).
Overage & True-Ups: If usage is projected to exceed or has reached the annual user quota, Akeyless will notify the Customer in writing. Any overage is invoiced at the end of the 12-month contract period based on actual usage

 

Plan Limits

For SLA and Support Tiers, click here.

Plan Limits FREE ENTERPRISE
Clients
5
V
MAIN FEATURES
Static Secret
500
V
Dynamic Secret
5
V
Rotated Secret
5
V
Plugins for SM (K8S, etc)
V
V
Secret Sharing
V
V
Browser Extensions
V
V
Target
3
V
OIDC App
1
V
SSH Cert Issuer
1
V
PKI Cert Issuer
1
V
Encryption Key (DFC/Classic)
1
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
V
V
API-Key-based authentication
V
V
Kubernetes authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Internal Caching
X
V
HSM Integration
X
V
Plan Limits FREE ENTERPRISE
Clients
5
V
MAIN FEATURES
Universal Secret Connector
1
V
Encryption Key (DFC/Classic)
1
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
V
V
API-Key-based authentication
V
V
Kubernetes authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Internal Caching
X
V
Plan Limits FREE ENTERPRISE
Managed Certificates
5
V
MAIN FEATURES
Cert Issuer (SSH/PKI)
1
V
CAs integrations
1
V
Certificate
5
V
Certificate Auto Renewal
X
V
Certificate Provisioning
X
V
Certificate Discovery
X
V
ACME Protocol
X
V
Encryption Key (DFC/Classic)
X
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
V
V
API-Key-based authentication
V
V
Kubernetes authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Internal Caching
X
V
HSM Integration
X
V
Plan Limits FREE ENTERPRISE
Transaction
1K per day
V
MAIN FEATURES
Encryption Key (DFC/Classic)
5
V
Encryption Operation
Limited
V
Multi-Cloud KMS
X
V
Tokenization
X
V
Code Signing
X
V
KMIP/TDE
X
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
V
V
API-Key-based authentication
V
V
Kubernetes authentication
X
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Internal Caching
X
V
HSM Integration
X
V
Plan Limits FREE ENTERPRISE
Users
5
V
MAIN FEATURES
Static Secret
5
V
Dynamic Secret
5
V
Rotated Secret
5
V
Password Sharing
V
V
Browser Extensions
V
V
Target
3
V
Session Management
V
V
Session Recordings
X
V
Desktop application
X
V
SSH Cert Issuer
1
V
PKI Cert Issuer
1
V
Encryption Key (DFC/Classic)
X
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
API-Key-based authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Advanced Secure Authentication (Universal Identity)
X
V
Cloud workload authentication (AWS IAM, Azure AD, GCP IAM)
X
V
Kubernetes authentication
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
V
Groups
V
V
AKEYLESS GATEWAY
Gateway Clusters
1 Cluster
V
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
V
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V
Plan Limits FREE ENTERPRISE
Users
3
Custom
MAIN FEATURES
Password (Static Secret)
50
100K or Custom
Password Sharing
V
V
Personal Folder
V
V
Browser Extensions
V
V
Mobile App
V
V
AUTHENTICATION METHODS (Identities)
Email Access
V
V
API-Key-based authentication
V
V
Authentication via SAML/OIDC/LDAP
X
V
Certificate-based authentication
X
V
AUTHORIZATIONS
Roles
V
Unlimited
Groups
V
Unlimited
AKEYLESS GATEWAY
Gateway Clusters
X
100 or Custom
AUDIT LOGGING & ANALYTICS
Audit Logs Retention
3 days
Custom
Event Center
V
V
Log/Event Forwarding
X
V
SECURITY & PERFORMANCE
Zero Knowledge Mode
X
V