Non-Human Identities: What are they anyway?

In today’s complex IT environments, non-human identities (NHI) are part of every organization’s environment. With that said, it’s a nebulous term that covers a number of different concepts.
At SPIRL we focus on the workload identity portion of NHI. Workloads are dynamic software tasks that run in containers or a set of microservices. Machine identities, on the other hand, represent physical assets like servers, appliances and IoT devices. Although both fall under NHI, workload and machine identities differ greatly in characteristics and management needs.

Why Managing Both the Same Way Falls Short

Many organizations try to manage all non-human identities with the same tools. This overlooks differences in scale, rate of change, availability, the nature of what’s being identified, and more. It leads to a series of fragile solutions glued together that do not deliver on business goals. 

The most obvious difference between these two is that machine identities are usually tied to long-lived physical devices. Workload identities, on the other hand, are often short-lived because they represent software entities that can scale up or down in real time. While there are many differences, the most important are:

Scale, Speed, and Availability

Workload identities scale quickly with thousands of instances needing immediate availability, while machine identities change more gradually as physical devices are deployed or removed.

Fundamental Differences in Identity

Workload identities are temporary and context-based, tied to software tasks, whereas machine identities are persistent and linked to physical hardware.

Credential Management Needs

Workload identities need short-lived, dynamic credentials for scalability, while machine identities use long-term, hardware-linked credentials. Managing both similarly can lead to credential sprawl and inconsistent practices.

The Federation Challenge with Workloads

Unlike human or machine identities, workload identities also face unique challenges due to their interconnectivity. Workloads often require authenticated interactions across different services in different trust domains.

Complex Trust Relationships

Workloads often interact across infrastructure boundaries or use third-party services, requiring federated trust management and token exchange.

Complex Policy Enforcement

Workloads come and go quickly, needing a naming system that supports easy-to-understand policies while handling high change rates.

Scale and Rate of Change

The high volume and ephemeral nature of workload identities require a massively scalable approach, unlike the slower-moving credentials of machines.

Availability

With workload credentials often valid for only minutes or hours, issuance and management systems must be designed for exceptional fault tolerance, performance, and durability.

Key Differences in Managing Workload vs. Machine Identities

Workload Identity

Machine Identity

Purpose

Workload

Represents software-based entities performing tasks in real time

Machine Identity

Represents physical devices connected to the network

Nature of Identity

Workload

Ephemeral, context-dependent, tied to software processes

Machine Identity

Persistent, device-dependent, tied to specific hardware

Scale and Rate of Change

Workload

High volume, rapid, and dynamic

Machine Identity

Lower volume, slower changes, typically managed as assets

Availability Requirement

Workload

Very high availability. Duration is often measured in minutes so every outage is potentially felt

Machine Identity

Moderate availability. Duration is often measured in months or years. Outages may be missed entirely due to the infrequent nature of enrollment

Credential Management

Workload

Short-lived credentials, issued and refreshed dynamically

Machine Identity

Long-term credentials, often device-bound or integrated into asset management

Management Focus

Workload

Automation and orchestration integration for scalability

Machine Identity

Process or device management solution

Federation Requirements

Workload

Often requires cross-domain trust federation, multi-cloud and hybrid

Machine Identity

Seldom need to authenticate cross-domain