Skip to content

Aembit dynamically generates short-lived credentials for each request to a Server Workload, eliminating manual credential rotation and reducing the risk window if an attacker compromises credentials. This page explains how credential lifecycle management works across all Server Workload types.

Aembit generates credentials on-demand rather than storing long-lived secrets:

  • Credential lifespan: JWT-SVIDs are valid for 5 minutes by default
  • Automatic rotation: New credentials generated for each token request (typically every 1 hour when access tokens expire)
  • No manual intervention: Applications continue running without code changes or restarts
  • Zero downtime rotation: Transition from old to new credentials is seamless
  1. Your application requests access to a protected resource (for example, an OAuth token or API call)
  2. Aembit generates a new credential (JWT-SVID or other type) signed with current cryptographic material
  3. The target service validates the credential and issues an access token or grants access
  4. Your application receives the response and continues operating
  5. Process repeats when the access token expires or the application makes a new request
Diagram

The following table compares credential lifetimes and rotation methods:

Credential TypeTypical LifetimeRotation MethodDowntime During Rotation
Static client secret (traditional)1-2 yearsManual (update code/config and restart app)Yes (during restart)
Aembit JWT-SVID5 minutesAutomatic (generated per request)No (seamless transition)
OAuth access token1 hourAutomatic (app requests new token)No (handled by SDK)

The 5-minute JWT-SVID lifespan limits the window of compromise. Even if an attacker intercepts a JWT-SVID, it expires before the attacker can reuse it for future requests.

If you suspect a credential compromise (for example, unauthorized API access detected), follow these steps:

1. Immediate action: Disable the Server Workload

Section titled “1. Immediate action: Disable the Server Workload”

Revoke the Server Workload in the Aembit console to stop credential generation immediately:

  1. Navigate to Workloads > Server Workloads
  2. Select the affected workload
  3. Click Disable

Disabling the Server Workload stops all new credential generation immediately. Existing tokens remain valid until they expire (typically within 5 minutes for JWT-SVIDs, 1 hour for OAuth access tokens).

Identify the scope of the compromise by reviewing logs in both Aembit and the target service:

Aembit logs -

  • Navigate to Activity > Audit Logs
  • Filter by Server Workload name
  • Look for: Unusual access patterns, unexpected IP addresses, off-hours activity

Target service logs (example: Entra ID) -

  • Navigate to Azure Active Directory > Sign-in logs
  • Filter by Application (client) ID
  • Look for: Failed authentications, unusual locations, unexpected user agents

Based on your investigation findings:

  • If isolated to Aembit: Re-enable the Server Workload after confirming you eliminated the threat
  • If target service credentials compromised: Rotate or regenerate credentials in the target service (for example, delete and recreate an Entra ID application registration)
  • If broader compromise: Follow your organization’s incident response procedures

4. Prevent recurrence: Review security posture

Section titled “4. Prevent recurrence: Review security posture”

After remediation, strengthen your security configuration:

  • Verify least-privilege permissions on the Server Workload
  • Enable conditional access policies in the target service (if supported)
  • Configure IP address restrictions where applicable
  • Review Access Conditions in Aembit to add time-based or location-based restrictions

Aembit logs all credential generation events for compliance and security monitoring.

What Aembit logs -

  • Timestamp of credential generation
  • Server Workload name
  • Client Workload identity
  • Credential type issued
  • Success or failure status

Where to view logs -

  • Aembit Tenant: Reporting > Audit Logs
  • For detailed event information, see Audit Logs

Log retention -

  • Default: 90 days
  • Configurable up to 1 year for compliance requirements

SIEM integration - Export logs to your Security Information and Event Management (SIEM) system using Aembit’s log stream integration. See Log Streams for configuration details.

Configure alerts in your monitoring system for the following conditions:

Alert ConditionRecommended ThresholdIndicates
Failed credential requests>5 failures in 10 minutesAuthentication misconfiguration or attack
Access from unexpected locationsAny non-allowlisted regionPotential credential theft
Access outside business hoursAny off-hours access (if applicable)Unauthorized access attempt
Server Workload configuration changesAny changePotential privilege escalation
Credential generation rate spike>200% of baselineCredential stuffing attack

For access authorization event details, see Access Authorization Events.