Credential Providers bridge the gap between authorized Client Workloads and the authentication requirements of target Server Workloads. They obtain the specific access credentials—such as API keys, OAuth tokens, temporary cloud credentials, or signed tokens—that Client Workloads need to authenticate successfully to Server Workloads.
Credential Providers function as an abstraction layer, decoupling Client Workloads from the complex authentication mechanisms required by diverse Server Workloads. Whether a target service requires AWS federation, OAuth 2.0 flows, JWT validation, or basic API keys, the Client Workload doesn’t need to implement the corresponding protocol logic.
Aembit invokes Credential Providers only after rigorous security checks: first, Trust Providers verify the Client Workload’s identity through attestation, and second, all Access Conditions must pass. This ensures that credentials are only dispensed to trusted and authorized requesters.
How Credential Providers work
Section titled “How Credential Providers work”The following steps outline how Aembit uses Credential Providers during the authorization process:
-
Request Access - A Client Workload initiates a request to access a Server Workload, which Aembit Edge intercepts.
-
Identity and Context Verification - Aembit first verifies the workload’s identity through Trust Providers and evaluates all Access Conditions.
-
Credential Provider Selection - Once all security checks pass, Aembit selects the appropriate Credential Provider based on the matched Access Policy configuration.
-
Backend Interaction - The Credential Provider interacts with the relevant backend system (AWS Security Token Service (STS), OAuth server, internal vault, etc.) to obtain the required access credential.
-
Credential Acquisition - The provider generates, retrieves, or manages the specific credential format needed by the target Server Workload.
-
Secure Transmission - Aembit Cloud securely transmits the obtained credential back to the Aembit Edge component that intercepted the original request.
-
Credential Injection - Aembit Edge modifies the original client request by injecting the credential (typically into HTTP headers) before forwarding it to the Server Workload.
The following diagram illustrates this process:
Supported provider types
Section titled “Supported provider types”Aembit offers multiple types of Credential Providers to accommodate the varied authentication mechanisms used by modern and legacy Server Workloads:
Local providers
Section titled “Local providers”Local Credential Providers store and manage credential values within the Aembit platform itself. When invoked, Aembit retrieves the pre-configured secret from its internal secure storage.
Supported local types:
- API Key - For services authenticating via static API keys.
- Username & Password - For services using traditional username/password authentication.
Common use cases:
- Legacy systems that don’t support modern authentication methods
- Basic APIs requiring static key-based authentication
- Bridging authentication for systems during modernization transitions
Remote providers
Section titled “Remote providers”Remote Credential Providers interact with external systems to dynamically generate or retrieve access credentials on behalf of Client Workloads. Aembit acts as a broker to these external credential authorities.
Cloud provider federations:
- AWS Security Token Service Federation - Uses AWS Workload Identity Federation via OIDC to obtain temporary AWS credentials
- Azure Entra Workload Identity Federation - Leverages OIDC federation to authenticate with Azure Entra ID
- Google Cloud Platform Workload Identity Federation - Integrates with GCP WIF via OIDC for short-lived tokens
Standards-based authentication:
- JSON Web Token (JWT) - Generates and signs JWTs according to specified configurations
- OAuth 2.0 Authorization Code - Implements the full OAuth Authorization Code flow with user consent
- OAuth 2.0 Client Credentials - Uses Client Credentials flow for machine-to-machine authentication
Platform-specific providers:
- Aembit Access Token - Generates OIDC ID tokens for authenticating to the Aembit API itself
- Vault Client Token - Authenticates to HashiCorp Vault via OIDC to retrieve Vault tokens
- Managed GitLab Account - Manages the credential lifecycle for GitLab service accounts
Common use cases:
- Accessing cloud services with temporary, scoped credentials
- Integrating with modern SaaS applications using OAuth 2.0
- Connecting to enterprise secrets management systems
- Authenticating to CI/CD platforms and development tools
Advanced configurations
Section titled “Advanced configurations”Aembit supports sophisticated configurations for complex scenarios:
- Multiple Credential Providers - Associate multiple providers with a single Access Policy for different authentication paths.
- OIDC Dynamic Claims - Customize token claims based on workload context.
- Vault Dynamic Claims - Use dynamic claims to configure HashiCorp Vault roles based on workload attributes.
- Integration Options - Extended integration capabilities for specialized platforms.
Benefits of using Credential Providers
Section titled “Benefits of using Credential Providers”-
Security Abstraction - Shields Client Workloads from complex authentication protocols, reducing the risk of implementation errors and credential exposure.
-
Dynamic Credential Management - Facilitates the use of short-lived, ephemeral credentials wherever possible, reducing the risk of credential compromise.
-
Simplified Development - Eliminates the need for developers to implement and maintain diverse authentication mechanisms in their applications.
-
Centralized Control - Provides a single point of configuration and management for access credentials across heterogeneous environments.
-
Zero-Touch Authentication - Enables “secretless” architectures where Client Workloads don’t need to handle credentials directly.
-
Policy-Driven Access - Ensures credentials are only issued after identity verification and policy compliance, enforcing least privilege access.
-
Operational Flexibility - Allows authentication method changes without modifying Client Workload code, supporting system modernization efforts.
-
Comprehensive Coverage - Supports both modern federated authentication and legacy systems, enabling unified access management across diverse infrastructures.