Server Workloads represent the target services, APIs, databases, or applications that receive and respond to access requests from Client Workloads. They’re the “servers” in Aembit’s client-server access model, acting as the resource providers that Client Workloads need to consume services, data, or functionality from.
Server Workloads can be virtually any service that provides functionality to other systems—from modern cloud-native APIs and microservices to legacy on-premises databases, from third-party SaaS platforms like Snowflake and Stripe to AI services like OpenAI and Claude. The key characteristic is that they receive incoming requests and provide responses, making them the targets of access control policies.
The core challenge Server Workloads address is centralized access management—providing a unified way to define, configure, and manage access to diverse services regardless of their location, protocol, or authentication requirements. Instead of managing separate authentication configurations for each service, Aembit creates a logical abstraction that standardizes how Client Workloads access any target service.
How Server Workloads work
Section titled “How Server Workloads work”The following steps outline how Server Workloads function within Aembit’s access control flow:
-
Access Request - A Client Workload attempts to access a target service (the Server Workload), such as making an API call to a database or third-party service.
-
Server Workload Identification and Policy Lookup - Aembit Edge intercepts the outbound request and matches the destination (host and port) against configured Server Workload definitions. Aembit Cloud then locates the appropriate Access Policy that links the identified Client Workload to the target Server Workload, along with any required Trust Providers and Access Conditions.
-
Authentication Requirements - The Server Workload definition specifies what type of authentication the target service expects (such as Bearer tokens, API keys, or database credentials).
-
Credential Provisioning - Aembit obtains the required credentials from the configured Credential Provider, which knows how to generate or retrieve the specific authentication credentials that the target service expects.
-
Request Forwarding - Aembit Edge injects the obtained credentials into the Client Workload’s original request (such as adding HTTP headers or modifying connection parameters) and forwards the authenticated request to the actual target service.
-
Response Handling - The target service processes the authenticated request and returns its response, which Aembit Edge forwards back to the Client Workload transparently.
The following diagram illustrates this process:
Supported environments
Section titled “Supported environments”Aembit supports virtually any service as a Server Workload, regardless of location, protocol, or authentication method. Aembit’s flexibility allows organizations to centralize access control across their entire technology stack.
The Server Workload guides provide configuration examples for many common services, but this list isn’t exhaustive. You can configure Aembit to work with any service that accepts network requests.
Cloud Platforms and APIs
- AWS services - S3, Lambda, and other AWS APIs
- Microsoft Graph - Office 365 and Azure services
- Google Cloud services - BigQuery and other GCP APIs
Databases and Data Platforms
- Local databases - MySQL, PostgreSQL, Redis on-premises
- AWS databases - RDS, Redshift, and other managed databases
- Snowflake - Cloud data warehouse platform
- Databricks - Analytics and machine learning platform
Third-Party SaaS and APIs
- Financial services - Stripe, PayPal payment processing
- AI and ML platforms - OpenAI, Claude, Gemini APIs
- Developer tools - GitHub, GitLab, Slack APIs
- Security platforms - Okta, Beyond Identity, GitGuardian
CI/CD and DevOps
- Version control - Git repositories and CI/CD platforms
- Infrastructure tools - HashiCorp Vault, Key Management Service (KMS) services
- Monitoring platforms - PagerDuty, SauceLabs
Legacy and On-Premises Systems
- Any HTTP/HTTPS-based service or API
- Database servers using standard protocols (SQL, NoSQL)
- Custom applications and microservices
- Legacy systems accessible over TCP
Benefits of using Server Workloads
Section titled “Benefits of using Server Workloads”- Centralized Access Management - Provides a single point of control for managing access to diverse services across hybrid and multi-cloud environments.
- Abstraction from Implementation Details - Decouples access policies from specific service locations, authentication methods, or infrastructure changes.
- Standardized Authentication - Enables consistent authentication patterns regardless of the target service’s native authentication requirements.
- Simplified Credential Management - Eliminates the need for Client Workloads to store or manage service-specific credentials.
- Policy Resilience - Access policies remain stable even when services change locations, ports, or authentication methods.
- Audit and Compliance - Provides comprehensive logging of which workloads accessed which services and when, supporting security monitoring and compliance requirements.