Skip to content

This section covers the various methods available for identifying Client Workloads in Aembit. Proper identification is crucial for establishing trust and ensuring secure access between workloads.

The following pages describe the different identification methods available: