Network Identity Attestor: Network Identity Attestor is an Aembit Edge component deployed in VMware vSphere environments that verifies VM identity through the vCenter API and issues signed attestation documents for workload authentication.Learn more is an Aembit Edge: Aembit Edge represents components deployed within your operational environments that enforce Access Policies by intercepting traffic, verifying identities, and injecting credentials just-in-time.Learn more Component. It provides strong, cryptographically verifiable identity for Workload: Any non-human entity (application, service, automation, etc.) that needs to access resources.Learn more running in VMware vSphere environments. Network Identity Attestation acts as a bridge between your VMware infrastructure and Aembit. It enables secure, identity-based workload authentication and authorization.
The problem Network Identity Attestor solves
Section titled “The problem Network Identity Attestor solves”In cloud environments, workloads (like VMs or containers) can use cloud-native metadata services to prove their identity. VMware vSphere doesn’t natively provide a similar, secure attestation mechanism for VMs. Network Identity Attestor: Network Identity Attestor is an Aembit Edge component deployed in VMware vSphere environments that verifies VM identity through the vCenter API and issues signed attestation documents for workload authentication.Learn more fills this gap by allowing workloads to prove they’re legitimate VMs running in your vSphere environment.
How Network Identity Attestor works
Section titled “How Network Identity Attestor works”Deploy the Network Identity Attestor Edge Component as a dedicated VM within your vSphere environment. Deploy at least one instance per L2 Network Segment: A Layer 2 (L2) network segment is a portion of a network where devices communicate using MAC addresses at the data link layer. Devices on the same L2 segment can directly reach each other without routing. MAC addresses must be unique within this boundary for the network to be fully functional.Learn more(opens in new tab). Its main responsibilities are:
-
Listening for Attestation Requests - The service exposes a secure HTTPS endpoint on the network. Workload VMs (running the Aembit Agent Proxy) send attestation requests to this endpoint.
-
Validating the Request - When the service receives a request, it:
- Extracts the MAC Address: A Media Access Control (MAC) address is a unique hardware identifier assigned to a network interface card (NIC). In virtualized environments, the hypervisor assigns virtual MAC addresses to VMs, which Network Identity Attestor uses to verify VM identity.Learn more(opens in new tab) of the requesting VM from the network connection.
- Uses the vCenter: VMware vCenter Server is a centralized management platform for VMware vSphere environments that provides VM lifecycle management, monitoring, and APIs for querying VM metadata such as UUIDs and MAC addresses.Learn more(opens in new tab) API to look up the VM associated with that MAC address.
- Retrieves relevant VM metadata (such as VM name, UUID, etc.).
-
Generating an Attestation Document: An attestation document is a cryptographically signed JSON document containing workload metadata (such as VM name, UUID, and MAC address) that proves a workload's identity. Aembit Cloud verifies the signature to authenticate the workload.Learn more - The service constructs a signed document containing:
- VM metadata (name, UUID, IP, MAC address)
- Timestamps (issuedAt, expiresAt)
- A digital signature using a customer-managed signing certificate
-
Returning the Attestation Document - The service returns the signed document to the requesting workload VM. The Aembit Agent Proxy includes this document in its authentication flow with Aembit Cloud: Aembit Cloud serves as both the central control plane and management plane, making authorization decisions, evaluating policies, coordinating credential issuance, and providing administrative interfaces for configuration.Learn more. Aembit Cloud uses this document for Trust Provider attestation (Access Policy: Access Policies define, enforce, and audit access between Client and Server Workloads by cryptographically verifying workload identity and contextual factors rather than relying on static secrets.Learn more enforcement).
-
Verification in Aembit Cloud - Aembit Cloud uses the public key from your signing certificate. Register this certificate in a Certificate Signed Attestation Trust Provider configured in your Access Policy. Aembit Cloud verifies the authenticity and integrity of the attestation document. If valid, Aembit Cloud authorizes the workload for access based on the Access Policy configuration.
Security model
Section titled “Security model”- Cryptographic Assurance - A private key that you manage signs the attestation document. Only services with access to this key can generate valid documents.
- Network Isolation - Deploy the service on the same L2 segment as the workloads it attests. This ensures MAC address integrity and prevents spoofing.
- Minimal Metadata Exposure - The attestation document includes only essential VM metadata. This minimizes information exposure.
- Certificate Management - You control the lifecycle of the signing certificate. You can rotate or revoke it as needed.
systemd-creds Usage
Section titled “systemd-creds Usage”The Network Identity Attestation installer uses systemd-creds to securely store sensitive values.
These values include vCenter API credentials, attestation signing certificates, and private keys.
During installation, the installer encrypts these secrets and embeds them into a systemd drop-in configuration file.
At runtime, systemd decrypts the credentials and provides them only to the Network Identity Attestation service process.
This approach encrypts secrets at rest and restricts access to the service only. It uses encryption keys protected by the system TPM 2.0-compatible vTPM device when available.
Deployment topology
Section titled “Deployment topology”- One Service per L2 Segment - MAC addresses are only unique and visible within a single L2 network. Each segment requires its own Network Identity Attestation instance.
- Integration with vCenter - The service requires read access to the vCenter API to look up VM details.
Provide credentials via a secure file using the
AEMBIT_VCENTER_CREDENTIALS_FILEenvironment variable, or omit the variable and the installer prompts for credentials during installation. - Customer-managed TLS required - Network Identity Attestor doesn’t support Aembit Managed TLS. You must provide customer-managed TLS certificates for Agent Controller, Network Identity Attestor, and Agent Proxy communication.
The following diagram shows Network Identity Attestation network topology:
Example attestation flow
Section titled “Example attestation flow”- A workload VM boots and starts the Aembit Agent Proxy.
- The Agent Proxy sends an attestation request to the Network Identity Attestation service.
- The service verifies the VM’s identity with vCenter API and signs a document.
- The Agent Proxy presents the signed document to Aembit Cloud.
- Aembit Cloud verifies the signature and VM metadata, then evaluates the Access Policy.
Benefits
Section titled “Benefits”- Automated, Secure Workload Onboarding - No manual secret distribution or static credential management.
- Strong Identity Assurance - Tied directly to your vSphere infrastructure and cryptographically verifiable.
- Seamless Integration - Works with Aembit’s Agent Proxy and Trust Provider model for end-to-end Workload Identity: A unique, verifiable identity assigned to a workload by Aembit.Learn more.
Limitations
Section titled “Limitations”- Requires vCenter API Access - The service must be able to query vCenter for VM metadata.
- L2 Network Boundaries - Each L2 segment needs its own service instance due to MAC address scoping.
- Certificate Management - You are responsible for securely managing and rotating the signing and TLS certificates.
Additional constraints for Network Identity Attestor
Section titled “Additional constraints for Network Identity Attestor”- One Network Identity Attestor instance per L2 network segment
- Deploy Network Identity Attestor on the same Layer 2 (L2) network segment as the workloads it attests.
- MAC address visibility and integrity are only guaranteed within an L2 segment.
- Deployments with multiple L2 segments require multiple Network Identity Attestor instances.
- vCenter API access required
- Network Identity Attestor requires credentials with read access to the vCenter API to validate VM identity and retrieve metadata.
- Attestation fails if vCenter is unavailable or credential configuration is incorrect.
- Support for only VMware environments
- Network Identity Attestor supports VMware vSphere environments specifically.
- It doesn’t support attestation for workloads running on other hypervisors or bare metal.
- Performance and Rate Limiting
- The performance of Network Identity Attestor is dependent on vCenter API responsiveness and rate limits.
- vCenter may throttle or delay high-frequency attestation requests if under load.
- MAC Spoofing Protection Required
- The security model assumes that the network segment enforces MAC spoofing protection.
- If MAC spoofing is possible, an attacker could impersonate another VM.
- Limited Metadata in Attestation Document
- The attestation document includes only essential VM metadata (name, UUID, IP, MAC).
- Additional custom attributes aren’t supported.
- VM identifiers only unique within a vCenter cluster
- The
instanceUuidandbiosUuididentifiers are only unique within a single vCenter cluster. - If you have multiple vCenter clusters, configure one Trust Provider per cluster to prevent ID collisions.
- Using a single Trust Provider with Network Identity Attestor certificates from multiple vCenter clusters can result in workloads being incorrectly identified.
- The
instanceUuidis the most reliable identifier for matching VMs, asbiosUuidis not guaranteed to be unique.
- The
- Private Release / Limited Availability
- Network Identity Attestor is a private release for select customers and not publicly available.
- Manual Registration in Aembit Cloud
- Manually register the public key from the signing certificate in the Aembit Cloud Trust Provider configuration.
- No Automatic Certificate Renewal
- Network Identity Attestor doesn’t automatically renew its signing or TLS certificates; handle this externally.
- No health check endpoint
- Network Identity Attestor doesn’t expose a health check endpoint.
- For monitoring, check the systemd service status and journal logs.
- If implementing load balancing, rely on TCP health checks or external monitoring.
- No Support for Dynamic Network Topologies
- Network Identity Attestor assumes static network topology.
- Dynamic changes (for example, VM migration across segments) may require manual reconfiguration.