Aembit is a cloud-native, non-human identity and access management platform that provides secure, seamless access management for workloads across diverse environments. It simplifies how organizations control and authorize access between client and Server Workloads, ensuring that only the right workloads can access critical resources at the right time.
Aembit shifts the focus away from long-term credential management by enabling automated, secure access management for workloads connecting to services. By concentrating on managing access rather than secrets, Aembit provides a flexible and security-first approach to non-human identity across a wide range of infrastructures.
In this guide
Section titled “In this guide”This quickstart guide provides a practical introduction to Aembit’s capabilities. Here’s what you’ll do:
-
Set up a sandbox environment with pre-configured client and Server Workloads using Docker Desktop with Kubernetes.
-
Deploy workloads and configure a secure Access Policy between the client and server.
-
Gain practical experience managing automated, secure access between workloads.
Estimated Time to Complete: ~15 minutes (if prerequisites are already installed).
By completing this quickstart guide, you will have practical experience creating an example of Aembit’s capabilities—ensuring quick results as you implement access management in a real-world environment. Once you are comfortable with these foundational steps, Aembit offers the flexibility to manage access for more complex and scalable workloads across a range of infrastructure setups.
Before you begin
Section titled “Before you begin”Before starting Aembit’s quickstart guide, you must complete the following prerequisites:
-
Sign up with Aembit and you can access your Aembit tenant at
https://<tenant-ID>.aembit.io
.
Sign up with Aembit
Section titled “Sign up with Aembit”Visit the Sign Up page to create an account and set up your tenant for accessing the platform.
A tenant in Aembit is your organization’s dedicated workspace within the platform.
It isolates your workloads, access policies, and configurations, ensuring secure and efficient management of your
environment. Your tenant ID is a unique identifier for your workspace and is used to access your tenant at
https://<tenant-ID>.aembit.io
.
Look for a welcome email from Aembit. It may take a few minutes; check your Junk or Spam folders if you do not see it.
Install Docker Desktop and enable Kubernetes
Section titled “Install Docker Desktop and enable Kubernetes”Docker Desktop includes Docker Engine and Kubernetes, making it easy to manage your containerized applications.
-
Download and install Docker Desktop from the official Docker website for your operating system.
Once installed, open Docker Desktop.
-
Enable Kubernetes by going to Settings -> Kubernetes in Docker Desktop and toggling the Enable Kubernetes switch to the On position.
Install Helm
Section titled “Install Helm”Helm deploys the pre-configured sandbox client and Server Workloads for this quickstart guide. A basic understanding of Helm commands will be helpful for deploying the sandbox workloads.
Select one of the following tabs for your operating system to install Helm:
-
Download the latest Helm version for Windows.
-
Run the installer and follow the on-screen instructions.
-
Once installed, open a Command Prompt or PowerShell terminal and verify the installation by running:
Terminal window helm versionExpected Output:
Terminal window version.BuildInfo{Version:"v3.x.x", GitCommit:"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", GitTreeState:"clean", GoVersion:"go1.x.x"}
-
Use Homebrew to install Helm:
Terminal window brew install helm -
Verify the installation:
Terminal window helm versionExpected Output:
Terminal window version.BuildInfo{Version:"v3.x.x", GitCommit:"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", GitTreeState:"clean", GoVersion:"go1.x.x"}
-
Download and install the latest Helm binary:
Terminal window curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/main/scripts/get-helm-3chmod 700 get_helm.sh./get_helm.sh -
Verify the installation:
Terminal window helm versionExpected Output:
Terminal window version.BuildInfo{Version:"v3.x.x", GitCommit:"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", GitTreeState:"clean", GoVersion:"go1.x.x"}
With these prerequisites complete, you are ready to deploy the sandbox workloads and configure secure access between workloads.
Deploying workloads
Section titled “Deploying workloads”Make sure that your environment is ready for deployment by verifying the following:
With these steps in place, you are ready to deploy the workloads.
Install applications
Section titled “Install applications”-
From your terminal, add the Aembit Helm chart repo by running:
Terminal window helm repo add aembit https://helm.aembit.io -
Deploy both the client and Server Workloads:
Terminal window helm install aembit-quickstart aembit/quickstart \-n aembit-quickstart \--create-namespace
Verify deployments
Section titled “Verify deployments”After deploying the applications, verify that everything is running correctly using the following commands:
-
Check the Helm release status:
Terminal window helm status aembit-quickstart -n aembit-quickstartExpected Output:
Terminal window NAME: aembit-quickstartLAST DEPLOYED: Wed Jan 01 10:00:00 2025NAMESPACE: aembit-quickstartSTATUS: deployedREVISION: 1TEST SUITE: None -
List all resources in the namespace:
Terminal window kubectl get all -n aembit-quickstartExpected Output:
Terminal window NAME READY STATUS RESTARTS AGEpod/aembit-quickstart-client-abcdef 1/1 Running 0 1mpod/aembit-quickstart-server-abcdef 1/1 Running 0 1mNAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGEservice/aembit-quickstart-client NodePort 10.109.109.55 <none> 8080:30080/TCP 1mservice/aembit-quickstart-server NodePort 10.109.104.236 <none> 9090:30090/TCP 1m
These outputs help you confirm that the workloads and services have been deployed correctly and are functioning as expected.
Interacting with the applications
Section titled “Interacting with the applications”In this section, you are going to interact with the pre-configured applications. This interaction will demonstrate that the Client Workload can connect to the Server Workload but lacks the credentials to authenticate to it.
-
With the client and Server Workloads running, open the Client Workload
-
Click the Get Data button.
You will receive a failure response since you have not deployed Aembit Edge, nor has Aembit injected the necessary credentials for the Client Workload to access the Server Workload yet.
In the next sections, you will deploy Aembit Edge. Making it so that Aembit will automatically acquire and inject the credential on behalf of the Client Workload so it can then access the Server Workload.
Deploying Aembit Edge
Section titled “Deploying Aembit Edge”With your workloads deployed, it’s time to integrate Aembit Edge into your system.
Aembit Edge consists of components that customers install within their environment. These components form the core of Aembit’s Workload IAM functionality.
Proceed with deploying Aembit Edge into your environment.
Create a new Agent Controller
Section titled “Create a new Agent Controller”The Agent Controller is a helper component that facilitates the registration of other Aembit Edge Components.
-
In your Aembit tenant, go to Edge Components from the left nav menu.
-
From the top ribbon menu, select Deploy Aembit Edge.
-
Select Kubernetes from the list of Environments.
-
In the Prepare Edge Components section, click to New Agent Controller. You will see the Agent Controller setup page displayed.
-
Enter a name, such as
Quickstart Agent Controller
(or another user-friendly name). -
Add an optional description for the controller.
-
For now, ignore the Trust Provider section, as you don’t need it for this quickstart guide.
-
Click Save.
Once saved, your newly created Agent Controller will auto-select in the list of available Agent Controllers.
This reveals the Install Aembit Edge Helm Chart section.
Deploy the Aembit Edge
Section titled “Deploy the Aembit Edge”As part of Aembit Edge, the Agent Proxy is automatically injected within the Client Workload pod. It manages workload identity and securely injects credentials for communication with Server Workloads.
-
In the Install Aembit Edge Helm Chart section, make sure that the Agent Controller you just created is selected in the dropdown menu.
-
In the New Agent Controller section, click Generate Code to generate a Device Code.
The Device Code is a temporary one-time-use code, valid for 15 minutes, that you use during installation to authenticate the Agent Controller with your Tenant.
Make sure you complete the next steps promptly before the code expires.
-
Since you already installed the Aembit Helm repo, go ahead and install the Aembit Helm chart.
From your terminal, run the following command, making sure to replace:
-
<tenant>
with your tenant ID (Find this in the Aembit website URL:<tenant>.aembit.io
) -
<deviceCode>
with the code you generated in the Aembit web UI
Terminal window helm install aembit aembit/aembit \--create-namespace \-n aembit \--set tenant=<tenant>,agentController.deviceCode=<deviceCode>Aembit Edge is now deployed in your Kubernetes cluster!
-
-
Check the current state of quickstart Client pod to confirm it is running without the Agent Proxy container.
The
READY
column for thepod/aembit-quickstart-client-abcdef
should display1/1
, indicating only the Client Workload container is running.Terminal window kubectl get all -n aembit-quickstartExpected Output:
Terminal window NAME READY STATUS RESTARTS AGEpod/aembit-quickstart-client-abcdef 1/1 Running 0 1mpod/aembit-quickstart-server-abcdef 1/1 Running 0 1m -
Restart the quickstart Client pod to include the Agent Proxy in the deployment:
Terminal window kubectl delete pods -l app=aembit-quickstart-client -n aembit-quickstart --grace-period=0 --force -
After the pod restarts, verify that the
aembit-quickstart-client
pod now includes two containers: the Client Workload container and the Agent Proxy container.After the pod restarts, check its state again.
READY
column for theaembit-quickstart-client
pod should now display2/2
, indicating that both the Client Workload container and the Agent Proxy container are running successfully.Terminal window kubectl get all -n aembit-quickstartExpected Output:
Terminal window NAME READY STATUS RESTARTS AGEpod/aembit-quickstart-client-abcdef 2/2 Running 0 1mpod/aembit-quickstart-server-abcdef 1/1 Running 0 1mThis step confirms that the Agent Proxy has been injected within the Client pod, enabling Aembit to securely manage credentials for communication between Client and Server Workloads.
Configuring an Access Policy
Section titled “Configuring an Access Policy”Access Policies define the conditions for granting Client Workloads access to Server Workloads. Aembit evaluates access by verifying if the workloads match the Access Policy, the Client’s identity is authenticated by a Trust Provider, and all conditions are met.
In this quickstart guide, we have omitted configuring a Trust Provider to simplify your first walkthrough. However, Trust Providers are a critical component in securing all production deployments. They enable Aembit to authenticate workloads without provisioning long-lived credentials or secrets, ensuring that only trusted workloads are authenticated and authorized.
Once authorized, Aembit delivers the necessary credentials to the Agent Proxy, which are used to authenticate the Client workload to the Server Workload.
-
From your Aembit tenant, click Access Policies in the left nav menu.
-
Click + New to open the Create New Access Policy page.
Follow the steps in the following sections to configure each part of the Access Policy.
Configure a Client Workload
Section titled “Configure a Client Workload”Client Workloads are software applications that access services provided by Server Workloads. These could be custom apps, CI/CD pipelines, or scripts running without user intervention.
-
On the Access Policy page hover over the Client Workload section, click New, and on the Client Workload page:
-
Name - Quickstart Client (or another user-friendly name).
-
Client Identification - Kubernetes Pod Name Prefix
- Value -
aembit-quickstart-client
- Value -
-
-
Click Save.
Configure a Server Workload
Section titled “Configure a Server Workload”Server Workloads serve requests from Client Workloads and can include APIs, gateways, databases, and more. The configuration settings define the Service Endpoint and Authentication methods, specifying the networking details and how requests are authenticated.
-
On the Access Policy page hover over the Server Workload section, click New, and on the Server Workload page:
-
Name - Quickstart Server (or another user-friendly name).
-
Host -
aembit-quickstart-server.aembit-quickstart.svc.cluster.local
-
Application Protocol - HTTP
-
Transport Protocol - TCP
-
Port - 9090
-
Forward to Port - 9090
-
Authentication Method - HTTP Authentication
-
Authentication Scheme - Bearer
-
-
Click Save.
Configuring a Credential Provider
Section titled “Configuring a Credential Provider”Credential Providers supply the access credentials, such as OAuth tokens or API keys, that allow Client Workloads to authenticate with Server Workloads. Aembit can also request and manage tokens from third-party services.
-
From your web browser, go to the sandbox Server Workload.
-
Click Generate API Key.
This generates a unique API key you will use in later in this section.
-
Copy the API key.
-
After saving your Client Workload on Aembit UI, you will return to the Access Policy page. Hover over the Credential Provider section, click New, and on the Credential Provider page:
- Name - Quickstart API Key (or another user-friendly name)
- Credential Type - API Key
- API Key - Paste the API key you generated from the Server Workload
-
Click Save.
Finalizing the Access Policy
Section titled “Finalizing the Access Policy”Once you have configured the Client Workload, Server Workload, and Credential Provider, click Save & Activate to complete the process and activate the policy.
Testing the Access Policy
Section titled “Testing the Access Policy”To test your newly configured Access Policy, go to the sandbox Client Workload and click Get Data. Since the Access Policy has been activated and Aembit Edge installed the necessary credential into the request, you should see a successful response.
Congratulations! You’ve created a Access Policy that’s securing access between workloads!
With just a few steps, you have deployed workloads, configured an Access Policy, and successfully authenticated requests—all without the complexity of manual credential management.
This quickstart guide is just the foundation of all the features that Aembit has to offer. It supports powerful capabilities for scaling, securing, and managing workload identity across many environments, ensuring security and efficiency as your needs grow.
Troubleshoot
Section titled “Troubleshoot”If you encounter any issues or don’t see a successful response, the Aembit Web UI has a useful Troubleshooter that can help you identify potential problems:
-
Go to Access Policies and select the Access Policy you created for this quickstart guide.
-
Click Troubleshoot in the top corner.
This brings up the Troubleshooter with your Access Policy’s Client and Server Workloads already populated.
-
Inspect and make sure that the Access Policy Checks, Client Workload Checks, Credential Provider Checks and Server Workload Checks are Active (they have green checks).
-
For any sections that aren’t Active, go back to the respective section in the quickstart guide and double check your configurations.
Also, make sure all the Prerequisites are complete.
The Troubleshooter helps diagnose potential issues with your configuration. For more details, visit the Troubleshooter Tool page.
Still need help? Please submit a support request to Aembit’s support team.
What’s next?
Section titled “What’s next?”Now that you’ve completed the basics, it’s time to explore additional features and capabilities to get the most out of Aembit.
See Quickstart: Access Policy enhancements to learn how to:
-
Configure Trust Providers to enhance workload identity verification and strengthen access control.
-
Set Up Access Conditions to enforce time-based, geo-based, or custom rules for workload access.
-
Navigate Reporting Tools to review access events, track policy usage, and analyze workload behavior.
Following the Quickstart: Access Policy enhancements page helps you expand beyond the quickstart, guiding you toward features that enhance security, visibility, and scalability.