Non-human identities authenticate machine-to-machine communication. The big challenge now is to secure their elements and processes, and integrate them with human identity info.
First seen on darkreading.com
Jump to article: www.darkreading.com/identity-access-management-security/vendors-attackers-chase-potential-of-non-human-identities