Edge Component environment variables reference
The following sections list and describe the environment variables available for Edge Components:
Agent Controller environment variables
Section titled “Agent Controller environment variables”Here is a list of all available environment variables for configuring the Agent Controller installer:
AEMBIT_AGENT_CONTROLLER_ID Required
Section titled “AEMBIT_AGENT_CONTROLLER_ID ”Default - not set
OS-AllRequired if not using AEMBIT_DEVICE_CODE.
The Agent Controller ID, available in your tenant’s administrative console for each Agent Controller.
This ID is utilized for Trust Provider: Trust Providers validate Client Workload identities through workload attestation, verifying identity claims from the workload's runtime environment rather than relying on pre-shared secrets.Learn more registration. You must provide either this or the AEMBIT_DEVICE_CODE
environment variable.
Example:01234567-89ab-cdef-0123-456789abcdef
AEMBIT_DEVICE_CODE Required
Section titled “AEMBIT_DEVICE_CODE ”Default - not set
OS-AllRequired if not using AEMBIT_AGENT_CONTROLLER_ID.
The device code for the Agent Controller. Generate this code in your tenant’s administrative console for
code-based registration.
You must provide either this or the AEMBIT_AGENT_CONTROLLER_ID environment variable.
Example:123456
AEMBIT_TENANT_ID Required
Section titled “AEMBIT_TENANT_ID ”Default - not set
OS-AllThe Aembit Tenant: Aembit Tenants serve as isolated, dedicated environments within Aembit that provide complete separation of administrative domains and security configurations.Learn more ID that the Agent Controller will register with.
Example:123abc
AEMBIT_HTTP_PORT_DISABLED
Section titled “AEMBIT_HTTP_PORT_DISABLED”Default - false
When true, turns off HTTP support in Agent Controller, restricting communication to HTTPS only.
When false, Agent Controller accepts HTTP traffic.
HTTP traffic uses port 5000 for virtual machine installations and port 80 for container-based deployments.
Example:true
AEMBIT_KERBEROS_ATTESTATION_ENABLED
Section titled “AEMBIT_KERBEROS_ATTESTATION_ENABLED”Default - not set
OS-AllWhen true, enables Kerberos-based attestation.
For Linux: You must set KRB5_KTNAME with the Agent Controller keytab path.
If you have Kerberos installed, KRB5_KTNAME defaults to /etc/krb5.keytab.
For Windows: Agent Controller inherits Kerberos information from the user it runs as.
Example:true
AEMBIT_LOG_LEVEL
Section titled “AEMBIT_LOG_LEVEL”Default - information
Set the Agent Controller log level.
The supported levels include fatal, error, warning, information, debug, verbose. The log level value is case
insensitive.
See Log level reference for
details.
Example:verbose
AEMBIT_MANAGED_TLS_HOSTNAME
Section titled “AEMBIT_MANAGED_TLS_HOSTNAME”Default - not set
OS-AllThe hostname Agent Proxy uses to connect to the Agent Controller. If set, Aembit uses its own PKI for Agent Controller TLS.
This is mutually exclusive with TLS_PEM_PATH and TLS_KEY_PATH.
Example:aembit-agent-controller.example.com
AEMBIT_METRICS_ENABLED
Section titled “AEMBIT_METRICS_ENABLED”Default - true
Enable Prometheus metrics. Agent Controller turns this on by default.
Example:true
AEMBIT_STACK_DOMAIN
Section titled “AEMBIT_STACK_DOMAIN”Default - useast2.aembit.io
The cloud stack to connect to. Don’t set this value unless directed by your Aembit representative.
HTTP_PROXY
Section titled “HTTP_PROXY”Default - not set
OS-All v1.30.3384Specifies an HTTP proxy for Agent Controller outbound HTTP connections.
When set, Agent Controller routes outbound HTTP traffic through the specified proxy.
This includes connections to Aembit Cloud for registration and token management.
Both HTTP_PROXY and http_proxy are honored.
Example:http://proxy.example.com:8080
HTTPS_PROXY
Section titled “HTTPS_PROXY”Default - not set
OS-All v1.30.3384Specifies an HTTPS proxy for Agent Controller outbound HTTPS connections.
When set, Agent Controller routes outbound HTTPS traffic through the specified proxy.
This includes connections to Aembit Cloud for registration and OAuth.
Both HTTPS_PROXY and https_proxy are honored.
Example:http://proxy.example.com:8080
NO_PROXY
Section titled “NO_PROXY”Default - not set
OS-All v1.30.3384A comma-separated list of hosts or domains that should bypass the proxy.
Use this to exclude cloud metadata endpoints and other local services from proxy routing.
Both NO_PROXY and no_proxy are honored.
Supported patterns:
Aembit guarantees the following patterns match:
- Specific IP addresses (for example,
169.254.169.254) - Specific hostnames (for example,
metadata.google.internal)
Other patterns may cause unexpected behavior. For more information or help, contact Aembit Support.
Example:169.254.169.254,fd00:ec2::254,metadata.google.internal
SERVICE_LOGON_ACCOUNT
Section titled “SERVICE_LOGON_ACCOUNT”Default - not set
OS-WindowsWhen set, this runs the Agent Controller as a different user which is useful for High Availability deployments. The name you provide must be the fully qualified sAMAccount name.
Example:myDomain\MyServiceAccount$
TLS_PEM_PATH
Section titled “TLS_PEM_PATH”Default - not set
OS-AllThe path to your TLS certificate file. Allows you to specify your own TLS key and certificate to use with Agent Controller TLS.
Pair this with TLS_KEY_PATH. It’s mutually exclusive with AEMBIT_MANAGED_TLS_HOSTNAME.
Example:C:\aembit.crt, /etc/ssl/certs/aembit.crt
TLS_KEY_PATH
Section titled “TLS_KEY_PATH”Default - not set
OS-AllThe path to your TLS private key file. Allows you to specify your own TLS key and certificate to use with Agent Controller TLS.
Pair this with TLS_PEM_PATH. It’s mutually exclusive with AEMBIT_MANAGED_TLS_HOSTNAME.
Example:C:\aembit.key, /etc/ssl/private/.aembit.key
Agent Proxy environment variables
Section titled “Agent Proxy environment variables”Here is a list of all available environment variables for configuring the Agent Proxy installer:
AEMBIT_AGENT_CONTROLLER Required
Section titled “AEMBIT_AGENT_CONTROLLER ”Default - not set
OS-AllThe location (scheme, host, and port) of the Agent Controller that the Agent Proxy should use.
Example:http://agentcontroller.local:5000
AEMBIT_AWS_MAX_BUFFERED_PAYLOAD_BYTES Deprecated
Section titled “AEMBIT_AWS_MAX_BUFFERED_PAYLOAD_BYTES ”Deprecated. This variable has no effect. Previously, this variable set the maximum size in bytes that Agent Proxy buffers when processing AWS S3 uploads with streaming signed payloads. It’s safe to remove from your configuration.
AEMBIT_CLIENT_WORKLOAD_PROCESS_IDENTIFICATION_ENABLED
Section titled “AEMBIT_CLIENT_WORKLOAD_PROCESS_IDENTIFICATION_ENABLED”Default - false
Enable process-based Client Workload: Client Workloads represent software applications, scripts, or automated processes that initiate access requests to Server Workloads, operating autonomously without direct user interaction.Learn more identification, including Process Command Line, Process Name, Process Path, and Process User Name.
Example:false
AEMBIT_DEBUG_MAX_CAPTURED_PACKETS_PER_DEVICE
Section titled “AEMBIT_DEBUG_MAX_CAPTURED_PACKETS_PER_DEVICE”Default - not set
OS-LinuxThe maximum number of network packets that Agent Proxy monitors per IPv4 network device.
Example:2000
AEMBIT_DOCKER_CONTAINER_CIDR
Section titled “AEMBIT_DOCKER_CONTAINER_CIDR”Default - not set
OS-LinuxSupports Client Workloads running in Docker Compose on a Virtual Machine. This environment variable specifies the Docker Compose network CIDR that Agent Proxy handles.
Example:100.64.0.0/10
AEMBIT_ENV_VAR_ALLOWLIST
Section titled “AEMBIT_ENV_VAR_ALLOWLIST”Default - not set (empty)
OS-All v1.31.4764A comma-separated list of environment variable names that Agent Proxy may capture for use in dynamic claims. By default, the allowlist is empty, so Agent Proxy captures no custom environment variables.
If Aembit Cloud requests an environment variable that’s not on this list, Agent Proxy logs a warning
(requested env variable <name> is not in allow list) and omits the variable from the response.
The credential request still proceeds, but without that claim value.
Allowlist matching is case-sensitive.
On Windows, OS-level environment variable lookups are typically case-insensitive, so a process may resolve
my_var from a system-level MY_VAR.
Aembit’s allowlist match itself is still case-sensitive and must match the exact case Agent Proxy sees.
For platform-specific guidance on injecting environment variables into Agent Proxy process, see Configure custom environment variables.
Example:CORPORATE_APP_ID,WEBSITE_HOSTNAME,AWS_LAMBDA_FUNCTION_NAME
AEMBIT_HTTP_IDLE_TIMEOUT_SECS
Section titled “AEMBIT_HTTP_IDLE_TIMEOUT_SECS”Default - 3600
Specifies the idle timeout, in seconds, for HTTP/1.1 connections handled by the Agent Proxy. Agent Proxy closes the connection if it doesn’t receive data within the duration set by this environment variable.
Example:900
AEMBIT_HTTP_SERVER_PORT
Section titled “AEMBIT_HTTP_SERVER_PORT”Default - 8000
Specifies the port the Agent Proxy uses to manage HTTP traffic directed to it via the http_proxy and https_proxy
environment variables.
If this port conflicts with any Client Workload ports, it can be overridden with this environment variable.
Example:8080
AEMBIT_KERBEROS_ATTESTATION_ENABLED
Section titled “AEMBIT_KERBEROS_ATTESTATION_ENABLED”Default - not set
OS-LinuxEnable Kerberos-based attestation. This value isn’t set by default. To enable it, set this value to true.
Example:true
AEMBIT_LOG_LEVEL (Replaces AEMBIT_LOG)
Section titled “AEMBIT_LOG_LEVEL (Replaces AEMBIT_LOG)”Default - info
Set the Agent Proxy log level. The supported levels include error, warn, info, debug, trace, off. The log
level value is case insensitive.
See Log level reference for
details.
Example:debug
AEMBIT_METRICS_ENABLED
Section titled “AEMBIT_METRICS_ENABLED”Default - true
Enable Prometheus metrics. Defaults to true.
Example:true
AEMBIT_METRICS_PORT
Section titled “AEMBIT_METRICS_PORT”Default - 9099
The port where Agent Proxy exposes Prometheus metrics.
Example:9099
AEMBIT_PASS_THROUGH_TRAFFIC_BEFORE_REGISTRATION
Section titled “AEMBIT_PASS_THROUGH_TRAFFIC_BEFORE_REGISTRATION”Default - true
When set to true, Agent Proxy operates in Passthrough mode. Connections proceed without credential injection until Aembit Cloud: Aembit Cloud serves as both the central control plane and management plane, making authorization decisions, evaluating policies, coordinating credential issuance, and providing administrative interfaces for configuration.Learn more registration completes. When set to false, incoming Client Workloads can’t connect until after registration completes. On Kubernetes this has the effect of delaying pod startup.
Example:false
AEMBIT_POST_START_MAX_WAIT_SEC Kubernetes only
Section titled “AEMBIT_POST_START_MAX_WAIT_SEC ”Default - 60
The maximum number of seconds you permit the Agent Proxy postStart lifecycle hook to run before failing Client Workload
pod deployment.
See Delaying pod startup until the Agent Proxy has registered.
Example:100
AEMBIT_PRIVILEGED_KEYTAB
Section titled “AEMBIT_PRIVILEGED_KEYTAB”Default - false
Set the configuration flag to enable the Agent Proxy to access a Kerberos principal located in a keytab file with
root-only read permissions.
Mandatory if AEMBIT_KERBEROS_ATTESTATION_ENABLED is enabled.
Example:true
AEMBIT_RESOURCE_SET_ID
Section titled “AEMBIT_RESOURCE_SET_ID”Default - not set
OS-AllAssociates Agent Proxy with a specific Resource Set.
Example:de48ebc2-3587-4cc6-823b-46434991e896
AEMBIT_SIGTERM_STRATEGY
Section titled “AEMBIT_SIGTERM_STRATEGY”Default - immediate
The strategy used by Agent Proxy to handle the SIGTERM signal.
Supported values are immediate, which exits immediately, and sigkill, which ignores the SIGTERM signal and waits
for a SIGKILL.
For details on configuring the AEMBIT_SIGTERM_STRATEGY environment variable and termination strategies, see Agent
Proxy Termination
Strategy.
Example:sigkill
AEMBIT_STEERING_ALLOWED_HOSTS
Section titled “AEMBIT_STEERING_ALLOWED_HOSTS”Default - not set
OS-LinuxA list of comma-separated hostnames for which Agent Proxy should proxy traffic.
Example:graph.microsoft.com,google.com
CLIENT_WORKLOAD_ID
Section titled “CLIENT_WORKLOAD_ID”Default - not set
OS-AllAssociate Agent Proxy with the specified Client Workload Id. Aembit uses this in conjunction with Aembit Client Id configuration.
Example:7e75e718-7634-480b-9f7b-a07bb5a4f11d
HTTP_PROXY
Section titled “HTTP_PROXY”Default - not set
OS-All v1.31.4670Specifies an upstream HTTP proxy for Agent Proxy outbound HTTP connections.
When set, Agent Proxy routes outbound HTTP traffic through the specified proxy.
Both HTTP_PROXY and http_proxy are honored on Linux via reqwest’s system-proxy support.
Example:http://proxy.example.com:8080
HTTPS_PROXY
Section titled “HTTPS_PROXY”Default - not set
OS-All v1.31.4670Specifies an upstream HTTPS proxy for Agent Proxy outbound HTTPS connections.
When set, Agent Proxy routes outbound HTTPS traffic through the specified proxy.
Both HTTPS_PROXY and https_proxy are honored on Linux via reqwest’s system-proxy support.
Agent Proxy supports only the http scheme for the proxy URL.
For example, HTTPS_PROXY=https://proxy.example.com:8080 is not valid.
Example:http://proxy.example.com:8080
K8S_NAMESPACE
Section titled “K8S_NAMESPACE”Default - not set
Kubernetes onlyThe Kubernetes namespace where Agent Proxy runs.
The Aembit Helm chart sets this automatically via the Kubernetes downward API
(fieldRef: metadata.namespace in the chart’s webhook template).
When set, this variable is always available for use in
dynamic claims,
regardless of whether it appears in AEMBIT_ENV_VAR_ALLOWLIST.
Example:my-namespace
K8S_POD_NAME
Section titled “K8S_POD_NAME”Default - not set
Kubernetes onlyThe Kubernetes pod name where Agent Proxy runs.
The Aembit Helm chart sets this automatically via the Kubernetes downward API
(fieldRef: metadata.name in the chart’s webhook template).
When set, this variable is always available for use in
dynamic claims,
regardless of whether it appears in AEMBIT_ENV_VAR_ALLOWLIST.
Example:my-app-pod-12345
KUBERNETES_PROVIDER_ID
Section titled “KUBERNETES_PROVIDER_ID”Default - not set
Kubernetes onlyA customer-defined identifier for the Kubernetes cluster where Agent Proxy runs.
Used by integrations such as the
Wiz access conditions integration
and available for use in
dynamic claims,
regardless of whether it appears in AEMBIT_ENV_VAR_ALLOWLIST.
Set this value through your Aembit Helm chart deployment by setting
agentProxy.env.KUBERNETES_PROVIDER_ID to your cluster identifier.
Example:arn:aws:eks:us-east-2:111122223333:cluster/my-cluster
NO_PROXY
Section titled “NO_PROXY”Default - not set
OS-All v1.31.4670A comma-separated list of hosts or domains that should bypass the upstream proxy.
Use this to exclude the Agent Controller, cloud metadata endpoints, and other local services from proxy routing.
Both NO_PROXY and no_proxy are honored on Linux via reqwest’s system-proxy support.
The NO_PROXY environment variable must contain all the following entries so that Agent Proxy
routes its traffic correctly. Aembit uses Instance Metadata Service (IMDS) addresses to attest
workloads on AWS, Azure, and GCP.
| Entry | Purpose |
|---|---|
169.254.169.254 | AWS, Azure, and GCP instance metadata |
fd00:ec2::254 | AWS instance metadata via IPv6 |
metadata.google.internal | GCP instance metadata |
fd20:ce::254 | GCP instance metadata via IPv6 |
You may need to include additional hosts, depending on your deployment.
Supported patterns:
Aembit guarantees the following patterns match:
- Specific IP addresses (for example,
169.254.169.254) - Specific hostnames (for example,
metadata.google.internal)
Other patterns may cause unexpected behavior. For more information or help, contact Aembit Support.
Example:aembit.io,169.254.169.254,fd00:ec2::254,metadata.google.internal
Agent Injector environment variables
Section titled “Agent Injector environment variables”AEMBIT_LOG_LEVEL (Replaces AEMBIT_LOG)
Section titled “AEMBIT_LOG_LEVEL (Replaces AEMBIT_LOG)”Default - info
Set the Agent Injector log level. The supported levels include error, warn, info (default value), debug,
trace, and off.
See Log level reference for details.
Example:warn
Aembit CLI environment variables
Section titled “Aembit CLI environment variables”Here is a list of all available environment variables for configuring the Aembit CLI:
AEMBIT_CLIENT_ID Required
Section titled “AEMBIT_CLIENT_ID ”Default - not set
OS-AllThis value represents the Edge SDK Client ID from your Aembit Trust Provider. Aembit automatically generates the Edge SDK Client ID when you configure a Trust Provider in your Aembit Tenant UI. To retrieve your Edge SDK Client ID, see Find your Edge SDK Client ID.
Example:aembit:useast2:a12bc3:identity:github_idtoken:63ab7be6-9785-4a14-be1c-2acf0253070b
AEMBIT_ENV_VAR_ALLOWLIST
Section titled “AEMBIT_ENV_VAR_ALLOWLIST”Default - not set (empty)
OS-All v1.31.4764A comma-separated list of environment variable names that Aembit CLI may capture for use in dynamic claims. By default, the allowlist is empty, so Aembit CLI captures no custom environment variables.
The CLI inherits the shell environment automatically; you only need to set the allowlist itself explicitly.
Example:CORPORATE_APP_ID,WEBSITE_HOSTNAME
AEMBIT_LOG_LEVEL
Section titled “AEMBIT_LOG_LEVEL”Default - warn
The log level to use for the Aembit CLI.
This controls the verbosity of the output from the CLI.
The supported levels include off, trace, debug, info, warn, error.
Example:debug
AEMBIT_RESOURCE_SET_ID
Section titled “AEMBIT_RESOURCE_SET_ID”Default - not set
OS-AllThe Resource Set to authenticate against and within which the Access Policy: Access Policies define, enforce, and audit access between Client and Server Workloads by cryptographically verifying workload identity and contextual factors rather than relying on static secrets.Learn more matching happens. This is useful for when you want to use a specific Resource Set for your credentials. You can find the Resource Set ID in your Aembit Tenant UI under the Resource Sets section.
Example:78bg7be6-9301-hj14-d51c-2acf02530y67