Site icon Spherical Cow Consulting

Understanding NHIs: Key Differences Between Human and Non-Human Identities

A Cute Puppy Dog Is Looking Up With A Confused Curious Look On His Face, trying to understand NHIs

Non-Human Identities (NHIs) are finally making friends and influencing people—or at least they seem to be, given how much people are talking about them! This is great. People need to have a better sense of this brave new world of workloads, bots, and services. But this also means people need to have a better sense of what NHIs are not.

Whether you’re navigating workloads, APIs, or automated systems, the buzz around NHIs reflects their growing significance in everything from cloud computing to academic research. But as with any hot topic, there’s some confusion and waaaaaay too much marketing hype. I’ve written about NHIs before; today’s focus is on some of the main areas NHIs are different from human identities. The distinctions matter.

What NHIs Are Not

NHIs aren’t just API keys or OAuth tokens. Treating them as such would be like calling a password or a passkey a person’s digital identity—it oversimplifies their function and importance. Tokens, keys, and even credentials like X.509 certificates might help manage access, but they’re tools in the more extensive toolkit of workload identity management. (Natoma has published an interesting white paper on machine-to-machine authentication if you’re interested in more detail.)

NHIs represent software entities like batch processes, machine learning training models, or microservices operating independently of human identities. They operate at different speeds and have different selective disclosure requirements (yes, NHI use cases may include the need for selective disclosure). Proving who they are to access other systems or resources goes beyond simple authentication. Unlike human authentication, which often revolves around confirming a single user’s identity via passwords, passkeys, or biometrics, NHIs must establish trust and authorization in highly dynamic, machine-driven environments.

Comparing NHIs and Human Identities

Part of what makes understanding that NHIs are different is that, if you tilt your head just right, their requirements sound very familiar. They need to demonstrate their identity and the purpose and scope of their request. They benefit from cryptographic proofs, such as JSON Web Tokens (JWTs) or X.509 certificates, to securely bind their identity to a specific action. And, believe it or not, they have a lifecycle that must be managed. And let’s not forget they may need to cross trust boundaries in a federated workflow.

I’ll go into more detail next, but here’s the summary for those who want to get straight to the good stuff.

LayerHuman IdentitiesNon-Human Identities (NHIs)
Contextual ValidationRole-based access; occasional risk checksTask-specific; continuous granular checks
Cryptographic AssurancePasswords, passkeys, MFAJWTs, OAuth tokens, mTLS, certificates
Dynamic/Ephemeral IdentitiesPersistent, lifecycle-drivenTransient, task-driven
Cross-Boundary TrustSSO, federation (SAML, OIDC)Federated workload identities, SPIFFE

Contextual Validation

For Human Identities:

For NHIs:

Cryptographic Assurance

For Human Identities:

For NHIs:

Dynamic and Ephemeral Identities

For Human Identities:

For NHIs:

Cross-Boundary Trust

For Human Identities:

For NHIs:

A Better Way to Think About NHIs

If you’re still thinking that NHIs belong in your human identity systems, I’m just not sure what to tell you. I would say we can agree to disagree, but getting this wrong has implications for how everyone interacts online, so I will continue to make a stand on this hill. NHIs require a different approach to identity management, including:

Final Thoughts

Embracing NHIs means rethinking your identity systems and recognizing that traditional identity paradigms need to evolve. I know it’s hard work and requires even more resources for your IAM programs, but NHIs are not magic. They cannot bring security and efficiency to your organization without investment. There are vendors out there (I am not one of them) who can guide you through designing or redesigning your systems to account for NHIs. You’ve got this.

If you or your organization need support with standards development, let me know. With my experience across various SDOs, I’m here to help guide you through the complexities of Internet standards development.

Exit mobile version