A non-human identity (NHI) is any digital identity that represents a system, service, or automated process—rather than a person—and uses credentials to authenticate and access resources.
‍
Human identity governance has a long history—provisioning, deprovisioning, MFA, role-based access control, access reviews. NHIs exist largely outside that history. They weren't designed for the same lifecycle. An API key doesn't go through onboarding. A service account doesn't trigger an HR offboarding workflow when the team that created it disbands. An OAuth token granted three years ago for an integration that's no longer in use doesn't expire on its own. The governance tooling and processes built for human identities simply don't extend to NHIs by default.
‍
The scale of the problem compounds the governance challenge. In most organizations, NHIs significantly outnumber human users—sometimes by an order of magnitude. Each integration between SaaS applications, each automation workflow, each CI/CD pipeline, each AI agent creates one or more NHIs that need credentials to function. Those credentials accumulate faster than anyone inventories them.
‍
The NHI landscape is diverse:
The governance principles that apply to NHIs are the same as those for human identities—least-privilege access, lifecycle management, regular access reviews—but the implementation is different.
‍
Discovery is the first requirement. Most organizations don't have a complete inventory of their NHIs, particularly the OAuth tokens and API keys created informally through SaaS integrations. You can't review access you don't know exists.
‍
From discovery, the key governance actions are: right-sizing permissions to the minimum required for each NHI's function, establishing credential rotation policies for API keys and service account passwords, and ensuring that when a human identity is offboarded, the NHIs that depended on it are also reviewed and decommissioned.
‍
See how Nudge Security discovers and governs non-human identities across your SaaS environment →