Access Policies are the central mechanism within Aembit. Access Policies define, enforce, and audit access between Non-Human Identities (NHI), such as applications, scripts, services, and infrastructure components.
The fundamental purpose of Access Policies is to govern workload-to-workload interactions. They do by cryptographically verifying workload identity and contextual factors, rather than relying on the distribution and management of static secrets. This approach aims to deliver granular, dynamic, and continuously verifiable control over NHI access, enhancing security posture and simplifying operations in complex, distributed environments.
This topic provides high-level details of Aembit Access Policies, focusing on their core components and the intricate interplay between the components during Access Policy evaluation.
Access Policy components
Section titled “Access Policy components”Click each link card to learn more details about each Access Policy component:
Aembit’s multi-component structure provides many advantages and separates concerns:
- Trust Providers handle identity verification
- Access Conditions handle context
- Credential Providers handle target authentication
- Access Policies orchestrate everything
This modularity allows Aembit to adapt to diverse environments and authentication protocols. See how Aembit evaluates Access Policies in the next section.
The Access Policy evaluation flow
Section titled “The Access Policy evaluation flow”The power of Aembit Access Policies lies in the coordinated interaction of its distinct components during an access attempt.
The following Access Policy evaluation flow diagram illustrates this process:
The following explains the Access Policy evaluation flow in detail:
-
Request Initiation & Interception - A Client Workload attempts to connect to a Server Workload. When you deploy Aembit Edge alongside your Client Workloads, it transparently intercepts this outgoing network request.
-
Identity Evidence Retrieval - Aembit Edge interacts with the local environment to retrieve identity evidence suitable for the configured Trust Provider by fetching a cached cloud metadata token or platform OIDC token. Aembit caches identity evidence to prevent Access Policies from failing if the external system goes down for a brief time.
Upon successful identification, Aembit Cloud identifies the specific Access Policy that governs the interaction between the now-verified Client Workload and the intended Server Workload.
-
Match request to an Access Policy - Aembit Edge sends the identity evidence to Aembit Cloud to match the requesting Client Workload and the Server Workload its requesting to access with an Access Policy. If no policy matches both workloads, Aembit denies the request.
-
Authentication via Trust Provider - If you’ve configured a Trust Provider, Aembit Cloud uses the appropriate Trust Provider associated with the identified Client Workload to perform cryptographic attestation, verifying the workload’s identity based on its environment. Aembit also caches the identity evidence from the Trust Provider it uses for attestation.
Aembit logs attestation events to its Authorization Log, which you can view in your Aembit Tenant UI.
-
Access Condition Check - If you’ve configured Access Conditions, Aembit Cloud evaluates any Access Conditions associated with the matched Access Policy. This may involve checking time constraints, geographic rules, or querying external systems (like Wiz) for security posture data. If using external systems, Aembit caches their security posture data for the same reasons as for Trust Provider identity evidence.
The Client Workload must meet all conditions for authorization to proceed.
-
Credential Provisioning Request - If Aembit verifies the Client Workload’s identity and it satisfies all Access Conditions, Aembit Cloud logs the Access Policy Authorization Event and then interacts with the Credential Provider.
Aembit requests an appropriate access credential required by the target Server Workload (like an OAuth token, a temporary AWS key via STS, or an Azure token via WIF).
-
Credential Injection & Request Forwarding - Aembit Cloud returns the policy decision (allow) and the freshly obtained access credential to Aembit Edge.
Finally, Aembit Edge injects the credential into the original Client Workload’s request (like adding an
Authorization: Bearer <token>
header) and forwards the modified request to the actual Server Workload endpoint.