Skip to content

Aembit offers a variety of authentication methods and schemes to secure access to Server Workloads. These configurations define how Credential Providers inject credentials into application protocols. This page details the supported authentication methods and helps you choose the right one for your needs.

When you configure access between Client Workloads and Server Workloads, two key elements dictate how Aembit injects credentials into a request:

  • Authentication Method - Specifies the general type of authentication in use—for example, HTTP authentication or a database-specific protocol.
  • Authentication Scheme - Defines the specific implementation of the method. For example, the Bearer scheme for HTTP authentication specifies how the credential appears in the HTTP headers.

These elements work together to determine how the Client Workload authenticates to the Server Workload. Additionally, some combinations of authentication methods and schemes may require extra configuration, such as specifying the name of the HTTP header that carries the credential.

Aembit supports combinations of methods and schemes to meet diverse protocol and workload requirements.

Most authentication methods rely on a single credential that a Credential Provider generates, ensuring broad compatibility. However, some methods use two-part credentials (for example: a username and password), which restricts them to Credential Providers that supply such data.

Additionally, some authentication schemes depend on specific Credential Providers. While you may use them with others, they typically target a particular provider.

Selecting the appropriate method and scheme is essential to ensure the Client Workload can successfully authenticate to the Server Workload. Consider the following:

  • Server Workload Requirements - What methods does the Server Workload support?
  • Security Considerations - What level of security do you need?
  • Credential Provider Capabilities - Which providers can generate the required credentials?

Aembit includes method/scheme recommendations for common Server Workloads in Server Workload guides. If your Server Workload doesn’t appear in those guides, use the following guidance to choose and configure an appropriate method and scheme.

Supported authentication methods and schemes

Section titled “Supported authentication methods and schemes”

The following table lists all supported combinations of authentication methods and schemes, along with their compatible application protocols and credential providers:

Auth MethodAuth SchemeApplication ProtocolsCredential ProviderDescriptionSpecification
HTTP AuthenticationBasicHTTPUsername & PasswordEncodes username:password in Base64 and sends it in the HTTP Authorization header.The ‘Basic’ HTTP Authentication Scheme
HTTP AuthenticationBearerHTTPAny single-valueSends a Bearer token in the HTTP Authorization header.Bearer Token Usage
HTTP AuthenticationHeaderHTTPAny single-valueInjects credentials into a user-defined HTTP header as part of HTTP authentication flow.n/a
HTTP AuthenticationAWS Signature v4HTTPAWS STS FederationSigns the HTTP request using AWS Signature v4.Create a signed AWS API request
API KeyHeaderHTTPAny single-valueInjects API key credentials into a user-defined HTTP header for API-based authentication.n/a
API KeyQuery parameterHTTPAny single-valueInjects credentials into a user-defined HTTP query parameter.n/a
Password AuthenticationPasswordMySQL, Postgres, Amazon Redshift, RedisUsername & PasswordInjects credentials according to protocol-specific requirements. Applies only to protocols with a single auth method.n/a
JWT Token AuthenticationSnowflake JWTSnowflakeJWTModifies the body of an HTTP request to /session/v1/login-request, injecting USERNAME and TOKEN.n/a