<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>non-human identity Archives - IDPro</title>
	<atom:link href="https://idpro.org/tag/non-human-identity/feed/" rel="self" type="application/rss+xml" />
	<link>https://idpro.org/tag/non-human-identity/</link>
	<description>The Professional Organization for Digital Identity Management</description>
	<lastBuildDate>Thu, 26 Feb 2026 18:57:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://idpro.org/wp-content/uploads/2023/07/cropped-idpro_stickerA-circle-100-32x32.jpg</url>
	<title>non-human identity Archives - IDPro</title>
	<link>https://idpro.org/tag/non-human-identity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Threat of Recovery</title>
		<link>https://idpro.org/the-threat-of-recovery/</link>
		
		<dc:creator><![CDATA[Elizabeth Garber]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 18:50:48 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[non-human identity]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2968</guid>

					<description><![CDATA[<p>Users make mistakes. It behooves us as stewards of a user’s data to ensure compromise does not occur, but at the same time ensure that if the user does what humans do and makes a mistake that they are able to recover gracefully.</p>
<p>The post <a href="https://idpro.org/the-threat-of-recovery/">The Threat of Recovery</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Users make mistakes.&nbsp; They&#8217;ll forget the credentials they used to register for a service, the email or username they may have used, or even the name of the actual service they registered for in the first place.&nbsp; They&#8217;ll use other people&#8217;s emails thinking they own them, lock themselves out putting in the same exact password that failed repeatedly, and outsmart themselves by using bad information (such as a fake birthday) during registration and then promptly forget it.&nbsp;&nbsp;</p>



<p>Users also make well-intentioned decisions.&nbsp; They might need to log into a service from a place thousands of miles away from where they normally do in order to change plans.&nbsp; They might try to perform what would otherwise be a valid operation during a time that they simply have never been logged on over years of steady use.&nbsp; They might need to force an old device, now in the hands of an abuser, to be logged out of the service – and do so rapidly.&nbsp;&nbsp;</p>



<p>Users entrust us with their data.&nbsp; For a given CIAM service, compromise of an account created by a user may disclose PII, allow for adverse financial transactions to occur on behalf of the user, use the service in a manner that the user may find objectionable or otherwise is against terms of service, and so on.&nbsp; It behooves us as stewards of a user’s data to ensure compromise does not occur, but at the same time ensure that if the user does what humans do and makes a mistake that they are able to recover gracefully.</p>



<p><br>With all of that in mind, there comes a point where the actions of a well-intentioned but clumsy user may look not unlike a threat actor who has compromised a user&#8217;s account.&nbsp; It becomes extremely difficult to determine the reality of the situation without having significant context.&nbsp; A prudently designed system might restrict or otherwise lock users who demonstrate suspicious activity – likewise, a user who suspects their account may be compromised (because they can&#8217;t log in suddenly, for instance) may wish to take some actions to prove the account is theirs and kick out anyone else who may be using the account.</p>



<p>A well-designed service should offer a set of mechanisms by which a user may attempt to regain logical access.&nbsp; Today, these account recovery flows are often highly automated, requiring specific information or actions from the user and minimal intervention from support staff for the service.&nbsp; This becomes a blessing and a curse, as a savvy attacker may be able to lock out a user and then leverage the account to perform nefarious deeds.</p>



<p>We are then faced with a monstrous task.&nbsp; How then should we model account recovery so that it rebuffs attackers?&nbsp; It turns out that recently some interesting answers were shared on this very topic.&nbsp; During the summer of 2025, Sid Rao and Gabriela Sonkeri gave a talk at Black Hat titled <em>Lost &amp; Found: The Hidden Risks of Account Recovery in a Passwordless Future</em> that offers an auditing framework for account recovery called the ARTHA framework.</p>



<p>The repository that contains the ARTHA framework can be found at https://github.com/Nokia-Bell-Labs/Account-Recovery-Threat-Heuristic-Auditing-Framework .&nbsp; The auditing process is across 9 separate test cases, which test the following:</p>



<ul class="wp-block-list">
<li>Account creation</li>



<li>Account state specific tests (how can we recover from different paths in an account recovery flow?)</li>



<li>How recovery works with multiple recovery methods in play</li>



<li>Session termination</li>



<li>The usage of MFA in the flow</li>



<li>Interchangeability of authentication factors / recovery channels</li>
</ul>



<p>On top of the framework, the slides from the presentation (<a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Rao-Lost-and-Found-The-Hidden-Risks-Of-Account-Recovery-In-a-Passwordless-Future.pdf">https://i.blackhat.com/BH-USA-25/Presentations/US-25-Rao-Lost-and-Found-The-Hidden-Risks-Of-Account-Recovery-In-a-Passwordless-Future.pdf</a>) are also rich with content and should be given a read over.&nbsp; For instance, from the session termination perspective a major design flaw is that sessions are allowed to remain in-place after an account recovery action has been performed.&nbsp; The slides give a fantastic diagram for this, as we can see below.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="419" src="https://idpro.org/wp-content/uploads/2026/02/image-1024x419.png" alt="" class="wp-image-2972" srcset="https://idpro.org/wp-content/uploads/2026/02/image-1024x419.png 1024w, https://idpro.org/wp-content/uploads/2026/02/image-300x123.png 300w, https://idpro.org/wp-content/uploads/2026/02/image-768x314.png 768w, https://idpro.org/wp-content/uploads/2026/02/image.png 1186w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The team also gives a solid list of best practices that should be considered.&nbsp; The team goes into far more detail through the slide deck (which, again, is fantastic) but their slide on the ideal recovery flow is particularly salient here.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="492" src="https://idpro.org/wp-content/uploads/2026/02/image-1-1024x492.png" alt="" class="wp-image-2973" srcset="https://idpro.org/wp-content/uploads/2026/02/image-1-1024x492.png 1024w, https://idpro.org/wp-content/uploads/2026/02/image-1-300x144.png 300w, https://idpro.org/wp-content/uploads/2026/02/image-1-768x369.png 768w, https://idpro.org/wp-content/uploads/2026/02/image-1.png 1181w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Given the increasingly automated and human-detached processes that make up account recovery, we as practitioners need to understand the choices we are making as part of that process to extract the enterprise from assisting directly with account recovery.&nbsp; This means we need to build trust from the start, communicate meaningfully with the user about account state, and ensure that recovery actions are meaningful through session termination and communication back to the user.</p>



<p><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em></p>



<h2 class="wp-block-heading"><br>Author</h2>



<p><img decoding="async" width="150" height="150" src="blob:https://idpro.org/6f9d29c0-14f1-4e25-897d-037990d0a125"> </p>



<p><a href="https://www.linkedin.com/in/rusty-%F0%9F%94%8F-unicode-breaks-things-deaton-a3584483/">Rusty Deaton</a> has been in Identity and Access Management for over a decade. He began in technology as a technical support engineer for a Broker-Dealer and has since worked across many industries, carrying forward a passion for doing right by people. When not solving problems, he loves to tinker with electronics and read. He currently works as Federal Principal Architect for Radiant Logic.ghts on identity security through his blog at <a href="https://iam.ninja/">iam.ninja</a> and engages with the IAM community on LinkedIn. When he&#8217;s not deep in security design, you&#8217;ll find him playing pickleball, writing about personal finance, stargazing, or playing tabletop board games.</p>



<figure class="wp-block-gallery has-nested-images columns-5 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="auto, (max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="600" height="600" data-id="2390" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-2390" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1270" src="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png" alt="" class="wp-image-1270" srcset="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png 600w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</figure>



<p></p>
<p>The post <a href="https://idpro.org/the-threat-of-recovery/">The Threat of Recovery</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Machine Identity at Scale: Why Traditional IAM Can&#8217;t Keep Up</title>
		<link>https://idpro.org/machine-identity-at-scale-why-traditional-iam-cant-keep-up/</link>
		
		<dc:creator><![CDATA[Elizabeth Garber]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 23:21:58 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[non-human identity]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2934</guid>

					<description><![CDATA[<p>Machine identities are different from human identities and require different governance. This post explores the implications.</p>
<p>The post <a href="https://idpro.org/machine-identity-at-scale-why-traditional-iam-cant-keep-up/">Machine Identity at Scale: Why Traditional IAM Can&#8217;t Keep Up</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We&#8217;ve all been there. Your security team just deprovisioned an employee. Five minutes: done. The access review is clean, the audit trail is perfect, and compliance is satisfied.</p>



<p>Now try deprovisioning the 200 service accounts, API keys, container identities, and AI agents they created over the past years. Most of us can&#8217;t even find them all, let alone revoke them systematically.</p>



<p>For every human identity we manage today, there are 50+ machine identities acting autonomously. Many organizations struggle to even inventory them, let alone govern them. And that&#8217;s not a failure of competence, it&#8217;s a failure of tools that were built for a different era. These identities authenticate millions of times per day, hold privileged access to production systems, and when they&#8217;re no longer needed, they don&#8217;t resign. They just linger, credentials intact, waiting to be exploited.</p>



<p>This isn&#8217;t a future problem. It&#8217;s happening right now &#8211; at a scale that traditional identity and access management was never designed to handle.</p>



<h2 class="wp-block-heading"><strong>The New Reality</strong></h2>



<p>Containers spin up and die in seconds. CI/CD pipelines authenticate to production databases without human intervention. AI agents make autonomous decisions about which APIs to call and what data to access. Microservices communicate through mutual TLS certificates that rotate every hour.</p>



<p>Each one of these actors needs identity, credentials, and permissions. Each one can be compromised. Each one should be governed.</p>



<p>But traditional IAM systems were built for people who go through onboarding, work for years, and eventually leave. They weren&#8217;t built for identities that are born from automation pipelines, live for minutes, and vanish before anyone notices. While we strive for modern, ephemeral identity models, the reality for many of us is a sprawling landscape of legacy API keys and hardcoded secrets that can&#8217;t be rotated overnight.</p>



<p>Human identities emerge from HR systems and follow predictable business events: hiring, role changes, departures. Machine identities emerge from code deployments and follow automation events: pipeline runs, scaling operations, terminations. Traditional governance operates in human time with quarterly reviews and monthly reconciliation. Machine identities operate in machine time, where entire lifecycles complete in minutes.</p>



<h2 class="wp-block-heading"><strong>A Day in the Life of a Workload Identity</strong></h2>



<p>To understand why traditional governance fails for machine identities, let&#8217;s follow a single workload through its entire lifecycle.</p>



<p><strong>8:00 AM</strong> : A developer deploys a new version of the payment processing service. Kubernetes receives the deployment manifest and begins orchestration.</p>



<p><strong>8:00:30</strong> : The cluster issues a service account token with a 30-minute lifespan. This token is cryptographically bound to the specific pod, namespace, and service account. It&#8217;s not a password. It&#8217;s a certificate that proves the workload&#8217;s identity.</p>



<p><strong>8:01:00</strong> : The payment processor container starts. It presents its certificate to the database, which validates the signature and establishes a mutual TLS connection. In an ideal implementation, there are no API keys stored in config files, no secrets passed through environment variables. The identity is embedded in the runtime itself. While many of us are still working to eliminate hardcoded credentials from legacy systems, this represents the direction we&#8217;re heading.</p>



<p><strong>8:15:00</strong> : The token automatically rotates. The workload doesn&#8217;t notice. The old certificate expires, a new one is issued, and connections seamlessly transition. This happens transparently, with no service interruption.</p>



<p><strong>8:30:00</strong> : Another rotation. This service will rotate credentials 48 times in a single day, far more frequently than any human would change their password.</p>



<p><strong>8:45:00</strong> : Traffic decreases. Kubernetes scales the deployment down. The pod receives a termination signal and begins graceful shutdown.</p>



<p><strong>8:45:10</strong> : The pod terminates. The certificate expires. The identity ceases to exist.</p>



<p><strong>Total lifespan: 45 minutes.</strong></p>



<p><strong>Traditional IAM review cycle: 90 days.</strong></p>



<p>By the time a human reviewer would look at this access, the identity has been created, used, rotated dozens of times, and deleted. And this story repeats thousands of times per day across modern cloud environments.</p>



<h2 class="wp-block-heading"><strong>The Authentication Gap</strong></h2>



<p>Machine identities don&#8217;t authenticate the way humans do.</p>



<p>There are no passwords to remember or forget. No MFA prompts. No browser redirects to an identity provider. The entire concept of &#8220;logging in&#8221; doesn&#8217;t apply.</p>



<p>Instead, workloads use certificates and cryptographic attestation. They prove their identity through mutual TLS, where both sides of every connection verify each other before exchanging data. Federation is handled through cryptographic trust between certificate authorities, not user-facing protocols like SAML or OIDC.</p>



<p>When a container needs to access a database, it doesn&#8217;t send a username and password. It presents a certificate that was issued by a trusted authority, signed with keys that prove it&#8217;s running in the expected namespace, with the expected service account, in the expected cluster.</p>



<p>This is fundamentally different from human authentication. And it requires a fundamentally different approach to governance.</p>



<h2 class="wp-block-heading"><strong>The Path Forward: Four Principles for Machine-Speed Governance</strong></h2>



<p>Here are four principles for machine-speed governance:</p>



<h3 class="wp-block-heading"><strong>1. Assume Ephemerality</strong></h3>



<p>We need to shift our thinking from long-lived credentials to ephemeral ones. API keys that last for years represent security debt waiting to be exploited. The target state is credentials that expire in hours, not months, with certificate-based identity and automatic rotation built into the system.</p>



<p>When credentials are short-lived by default, compromise windows shrink dramatically. An attacker who steals a token has minutes to use it, not months. And when credentials rotate automatically, there&#8217;s no human process to fail or forget.</p>



<h3 class="wp-block-heading"><strong>2. Automate Continuous Verification</strong></h3>



<p>If we&#8217;re relying on humans to provision, rotate, or revoke machine credentials at scale, we&#8217;re fighting a losing battle. The volume and velocity simply outpace what manual processes can handle.</p>



<p>Governance must be embedded directly into deployment pipelines. When a service is deployed, identity is provisioned automatically. When it&#8217;s scaled, credentials are issued on demand. When it&#8217;s terminated, access is revoked immediately. No tickets. No approval workflows. No waiting.</p>



<p>And authentication isn&#8217;t a login event anymore – it&#8217;s every API call, every database query, every service-to-service interaction. Traditional security says &#8220;authenticate once at the perimeter, then trust inside the network.&#8221; That model collapses when workloads are distributed across clouds, data centers, and edge locations. Modern identity requires continuous verification, where every request is independently validated against current policy. This is the foundation of Zero Trust: never trust, always verify.</p>



<p>This doesn&#8217;t mean humans aren&#8217;t involved. It means we shift from executing tasks to defining policies that govern automated systems.</p>



<h3 class="wp-block-heading"><strong>3. Trace to Humans</strong></h3>



<p>Every machine identity must map back to a responsible person or team. This is about metadata ownership, not manual management.</p>



<p>When a container is compromised, someone needs to answer for it. When a service account is over-privileged, someone needs to justify why. This doesn&#8217;t mean humans approve every credential, it means every automated system that creates identities has a clear owner, and that owner is responsible for the policies that govern what those identities can do.</p>



<p>In practice, this means tracking which team owns each service, which cost center it belongs to, and who has authority to change its access policies. Governance without accountability is theater.</p>



<h2 class="wp-block-heading"><strong>What This Looks Like in Practice</strong></h2>



<p>Modern machine identity management uses workload identity frameworks like SPIFFE to provide cryptographic identities for every service, issued automatically, rotated transparently, and scoped precisely.</p>



<p>Authorization moves from role-based access control to policy engines that evaluate context. Not just &#8220;does this service have database access&#8221; but &#8220;is this service running in the expected environment, from the expected namespace, with the expected signature, requesting access to data it&#8217;s authorized to see.&#8221;</p>



<p>Observability links every action back to an identity. When a database query runs, logs capture not just what happened, but which workload identity issued it, under what policy, with what context. This makes forensics possible and accountability real.</p>



<p>And reconciliation happens continuously. Instead of quarterly reviews where humans click &#8220;approve&#8221; on screens full of cryptic entitlements, automated systems compare what&#8217;s deployed in runtime environments against what&#8217;s recorded in identity systems, flagging drift immediately.</p>



<h2 class="wp-block-heading"><strong>The Stakes</strong></h2>



<p>Breaches increasingly target machine identities because they&#8217;re easier than phishing humans. An exposed API key or leaked certificate provides direct access to production systems without triggering MFA prompts or alerting security teams trained to watch for suspicious user behavior.</p>



<p>Compliance frameworks are catching up. Regulators who once focused exclusively on human access now ask questions about service accounts, API credentials, and workload identities. Every identity, regardless of type, must be governed with the same rigor.</p>



<p>The organizations that solve this problem unlock safe, scalable automation. They can deploy faster, scale larger, and move with confidence because they know exactly what&#8217;s running, with what identity, under what authority.</p>



<h2 class="wp-block-heading"><strong>The Question Isn&#8217;t Whether</strong></h2>



<p>Human identity management took decades to mature. We don&#8217;t have decades this time. The machines are already running.</p>



<p>The question for identity professionals isn&#8217;t whether to govern machine identities, we know the answer. It&#8217;s how quickly we can evolve our tools, processes, and mental models to match the reality we&#8217;re already operating in. Because the invisible majority isn&#8217;t waiting for our permission to grow. It&#8217;s already here, at machine speed, at cloud scale, with access to everything that matters.</p>



<p>The only choice is whether we govern it or get left behind.</p>



<h2 class="wp-block-heading">About the Author:</h2>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="407" height="461" src="https://idpro.org/wp-content/uploads/2026/01/image-4.png" alt="" class="wp-image-2935" srcset="https://idpro.org/wp-content/uploads/2026/01/image-4.png 407w, https://idpro.org/wp-content/uploads/2026/01/image-4-265x300.png 265w" sizes="auto, (max-width: 407px) 100vw, 407px" /></figure>



<p>Prithvi Poreddy is a Product Leader specializing in Identity Security, IAM, and AI-driven Governance. He works at the intersection of Identity, Risk, and Intelligent Automation, helping enterprises build secure and scalable identity foundations.</p>



<p><br>Prithvi has led IAM initiatives at organizations including Meta, Lime, Deloitte, and World Bank, building scalable access models and advising C-suite teams on identity modernization. He is an active contributor to the Cloud Security Alliance&#8217;s Identity Management working group and the MCP security group, where he focuses on AI agent security and authentication challenges.</p>



<p><br>His current focus is AI-driven identity governance, designing frameworks for autonomous agent identities, and aligning human and machine access models. He shares his thoughts on identity security through his blog at&nbsp;<a href="https://iam.ninja/">iam.ninja</a>&nbsp;and engages with the IAM community on LinkedIn. When he&#8217;s not deep in security design, you&#8217;ll find him playing pickleball, writing about personal finance, stargazing, or playing tabletop board games.</p>



<figure class="wp-block-gallery has-nested-images columns-5 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="auto, (max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="110" height="110" data-id="2896" src="https://idpro.org/wp-content/uploads/2025/11/image.png" alt="" class="wp-image-2896"/></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1270" src="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png" alt="" class="wp-image-1270" srcset="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png 600w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</figure>



<p></p>
<p>The post <a href="https://idpro.org/machine-identity-at-scale-why-traditional-iam-cant-keep-up/">Machine Identity at Scale: Why Traditional IAM Can&#8217;t Keep Up</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Understanding Non-Human Identities (NHI) Part 3: Access Governance</title>
		<link>https://idpro.org/understanding-non-human-identities-nhi-part-3-access-governance/</link>
		
		<dc:creator><![CDATA[Elizabeth Garber]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 19:55:11 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[non-human identity]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2927</guid>

					<description><![CDATA[<p>The final article in this Non-Human Identity series explores how NHIs interact with systems. It focusses on access, permissions, and the dual nature of “access to” and “access by.”</p>
<p>The post <a href="https://idpro.org/understanding-non-human-identities-nhi-part-3-access-governance/">Understanding Non-Human Identities (NHI) Part 3: Access Governance</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Following the article about <a href="https://idpro.org/understanding-non-human-identities-nhi-part-2-lifecycle/">NHI’s and their lifecycle</a> , this final article in the series explores how non-human identities interact with systems. It focusses on access, permissions, and the dual nature of “access to” and “access by.”</p>



<h2 class="wp-block-heading"><strong>Access and NHIs</strong></h2>



<p>There are some interesting observations to be made about access control and NHIs. And missing these views leads to misunderstanding NHI Access Control and results in conflicting advice and practices. Access control and NHI’s have at least 2 different aspects: Access to the component and Access by the component. And these different views can be evaluated in this visualization:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="853" height="112" src="https://idpro.org/wp-content/uploads/2026/01/image.png" alt="" class="wp-image-2928" srcset="https://idpro.org/wp-content/uploads/2026/01/image.png 853w, https://idpro.org/wp-content/uploads/2026/01/image-300x39.png 300w, https://idpro.org/wp-content/uploads/2026/01/image-768x101.png 768w" sizes="auto, (max-width: 853px) 100vw, 853px" /></figure>



<p><strong>Figure 1:</strong> Access to and access by an NHI</p>



<p>In this illustration, an actor logs in to a component interactively. The actor has an account and authorizations to match. Accounts and authorizations are dependent on the J-M-L-process and probably Role Based Access Control.</p>



<p>The component in turn, logs into a resource, probably using a resource account and authorizations. Since the login is automated, the secret to login with is probably configured in the component. In this pattern, the component could be an application that gives access to the actor, and the application will login to the resource (potentially a database server) with a service account. The component could also be a camera, or a device.</p>



<p>This simple pattern shows two views on access: Access to the component and access by the component.</p>



<h2 class="wp-block-heading"><strong>Permissions</strong></h2>



<p>As we discussed before, NHIs, Non-human Identities, are managed in the change management process and these identities belong to components, such as servers, robots (and RPA’s), devices, services and what not. And these components have a purpose in life. They perform tasks. And to do so, they need to have the correct permissions.&nbsp;</p>



<p>Relevant here is that from a governance perspective, we must have the possibility to validate what actions the component has performed. It must be traceable; it must be recognizable: this task or transaction has been performed by this component. This is in fact where the concept of NHI is born: the component needs an identity, it needs an account and it needs authorizations in order to perform the tasks.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="535" height="171" src="https://idpro.org/wp-content/uploads/2026/01/image-1.png" alt="" class="wp-image-2929" srcset="https://idpro.org/wp-content/uploads/2026/01/image-1.png 535w, https://idpro.org/wp-content/uploads/2026/01/image-1-300x96.png 300w" sizes="auto, (max-width: 535px) 100vw, 535px" /></figure>



<p><strong>Figure 2: </strong>NHI needs access</p>



<p>So, the NHI is an identifier to grant authorizations to and to enable logging, monitoring and traceability of transactions performed by the NHI in the resource.</p>



<p>Authorizations granted will be defined following the Least Privilege principle: grant at most the authorizations that are minimally required to perform a task. Nothing more, nothing less. And the permissions needed are given based on the functional requirements of the tasks to be performed.&nbsp;</p>



<p>In creating the change and during development of any component that will need an NHI, all relevant stakeholders must be contacted to give their views on granting permissions to the NHI. If the NHI belongs to a camera, it needs the authorization to access the network (an IP address), and it needs the permissions to store video images on a server and perhaps it even needs the permissions to send a notification to facility management. And so, the stakeholders are facility management, network management, server management, security management and probably also a privacy officer. All stakeholders have to define the least privileged authorizations.</p>



<p>That’s the easy part of access control: the NHI needs access to the systems it connects to and it needs the authorizations to perform the tasks that it was implemented for.</p>



<h2 class="wp-block-heading"><strong>Login to the NHI</strong></h2>



<p>But there’s a second viewpoint to NHIs: actors who need access to the NHI. In the camera example: who can use the pan and zoom functions of the camera?</p>



<p>An example of this type of access is a component like an RPA. The RPA has access to resources. The authorizations to the resource are custom authorizations, least privilege dependent on the purpose of the RPA. The second view is: who has access to the RPA. The RPA is developed and configured by an admin or operator who can either configure the code of the RPA or change the config files to comply with the functional requirements. Since the actions change the behavior of the RPA, special authorizations and logging and monitoring are required to manage access.</p>



<p>And here the picture becomes cloudy. There can be lots of stakeholders who need access.</p>



<p>First there is the operator, the actor who manages and configures the NHI. An NHI must be managed. There is a config. Either in a config file or in the database or even in the connector. And perhaps this operator must log in to the component. There may be an internal admin account in the component. Yes, we covered that: a server has an admin account, and the server has an identity. And the admin account will be found on the network. Just like the server will be found.</p>



<p>Let’s have a look at this same camera: it has an IP address and perhaps a DHCP-name and there must be one or more accounts that can be accessed. There is the admin-account and perhaps an operator account, potentially a read-only account and, speaking of cameras, a backdoor account to upload malware…</p>



<p>And there may be an on-board webserver, with again an NHI, an account and permissions. It never ends&#8230;</p>



<p>Anyway, there are accounts to log in to, to get access to the component, with a default factory (-reset) password for the admin account. Yes, these secrets live in the open.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="715" height="323" src="https://idpro.org/wp-content/uploads/2026/01/image-2.png" alt="" class="wp-image-2930" srcset="https://idpro.org/wp-content/uploads/2026/01/image-2.png 715w, https://idpro.org/wp-content/uploads/2026/01/image-2-300x136.png 300w" sizes="auto, (max-width: 715px) 100vw, 715px" /></figure>



<p><strong>Figure 3:</strong> DevOps and NHIs</p>



<h2 class="wp-block-heading"><strong>APIs anyone?</strong></h2>



<p>And now to make the issue even bigger:</p>



<p>Some components not only offer login features, but they may also have APIs to give access to inner application functions. And this gives us a second access problem: who can access the APIs? What controls do we need to enforce to secure the endpoints? And this is where the concept of access control based on keys and tokens is needed. A second secrets management point</p>



<p>&#8230; A second secrets management point of view. I will not dive deeper into this concept of API access and whether we need API gateways, policy enforcement points and policy management points to manage fine grained dynamic access to the component. But we need a trusted facility to manage secrets and sessions.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="853" height="262" src="https://idpro.org/wp-content/uploads/2026/01/image-3.png" alt="" class="wp-image-2931" srcset="https://idpro.org/wp-content/uploads/2026/01/image-3.png 853w, https://idpro.org/wp-content/uploads/2026/01/image-3-300x92.png 300w, https://idpro.org/wp-content/uploads/2026/01/image-3-768x236.png 768w" sizes="auto, (max-width: 853px) 100vw, 853px" /></figure>



<p><strong>Figure 4: </strong>NHIs and secrets</p>



<h2 class="wp-block-heading"><strong>Access Control Conclusion</strong></h2>



<p>There you have it: Access by the component requires an NHI identity and account, for granting authorizations and for auditability purposes. But the NHI is accessed too. Login to the NHI and API access to the NHI require different controls. And both concepts cannot be mixed. The NHI needs resources, hence it needs an identity, and the NHI is a resource, hence we will have to restrict access.</p>



<p><br>This access perspective completes the NHI picture. Lifecycle defines how NHIs come into being and are governed; access defines how they interact within systems,  both as consumers and as resources themselves. The takeaway is simple yet often overlooked: NHI access must be designed and audited in two directions. Treating them as human users oversimplifies the problem; treating them as governed, purpose-built components restores clarity and control.</p>



<h2 class="wp-block-heading">About the Author:</h2>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="400" height="400" src="https://idpro.org/wp-content/uploads/2025/10/andre-koot.png" alt="Headshot - Andre Koot" class="wp-image-2880" srcset="https://idpro.org/wp-content/uploads/2025/10/andre-koot.png 400w, https://idpro.org/wp-content/uploads/2025/10/andre-koot-300x300.png 300w, https://idpro.org/wp-content/uploads/2025/10/andre-koot-150x150.png 150w, https://idpro.org/wp-content/uploads/2025/10/andre-koot-320x320.png 320w" sizes="auto, (max-width: 400px) 100vw, 400px" /></figure>



<p>André Koot is principal IAM consultant at Dutch IAM consultancy and managed services company SonicBee (an IDPro partner). And member of the Advisory Board of IdNext.eu.&nbsp;He has over 30 years of infosec experience and over 20 years of experience as an IAM expert, acting as architect, auditor and program lead. For the last nine years he has taught a 4-day IAM training course. André contributes to the IDPro BoK as committee member, author, and reviewer.</p>



<figure class="wp-block-gallery has-nested-images columns-5 is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="auto, (max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="110" height="110" data-id="2896" src="https://idpro.org/wp-content/uploads/2025/11/image.png" alt="" class="wp-image-2896"/></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="2391" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer.png" alt="" class="wp-image-2391" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Active_BoK_Reviewer-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1984" src="https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge.png" alt="" class="wp-image-1984" srcset="https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge.png 600w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-300x300.png 300w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-150x150.png 150w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1270" src="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png" alt="" class="wp-image-1270" srcset="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png 600w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</figure>
<p>The post <a href="https://idpro.org/understanding-non-human-identities-nhi-part-3-access-governance/">Understanding Non-Human Identities (NHI) Part 3: Access Governance</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: idpro.org @ 2026-04-15 17:54:43 by W3 Total Cache
-->