Main Points
- Keyless/Passwordless
- Based on well-known protocols
- Independent on PAM platform
- Server-side authorization
- Independent on shared account(s) (Accountless)
- Simple integration to exist infrastructure
- Short-lived access
- Critical component(s) rotation












