14 , identity
Identity commands are used to verify workload identity, attest principals, and enforce trust boundaries before policy execution.
Identity is the root input to governance. Without strong identity, policy has no reliable subject to evaluate. An action that appears to come from support-bot could actually be spoofed by an untrusted process, a stale container image, or a compromised host. Faramesh treats identity as a first-class precondition, not a logging attribute.
In production, identity ties together five things: principal name, workload attestation, trust bundle, environment (tenant/org), and cryptographic proof chain. If any of these fail verification, the action is denied before rule matching. This prevents policy confusion attacks where an untrusted workload tries to inherit trusted permissions.
Validate a workload or principal identity document.
Print identity context for the current daemon/client environment.
Create an identity attestation for downstream trust checks.
Update trust state for a principal to constrain what it may execute.
Need help? Use any of these support options.