Machine identities for automated workloads — no human credentials
1 controls use Service Principals for implementation.
See how Service Principals compares to other access control approaches with our detailed comparison table.