SHARE ARTICLE

The AI Infrastructure Gap

Why scaling AI requires a new foundation and the nine components every enterprise ends up needing.

FEATURED

AI Agent Identity: The New Frontier of Enterprise Security

Mubbashir Mustafa

8 min read

For decades, identity and access management has been built around a simple assumption: the entities requesting access to systems are humans. Humans have usernames, passwords, and roles. They log in at the beginning of a session and log out at the end. Their permissions change when they switch teams or leave the company. The entire IAM industry, from Okta to Ping Identity to Microsoft Entra, is architected around this model.

AI agents violate every assumption in it. Not partially, not in edge cases, but fundamentally and systematically.

Enterprises already manage a 50:1 ratio of non-human to human identities, according to research from CyberArk and industry surveys. That ratio includes service accounts, API keys, machine credentials, and automated processes. Now add AI agents to the mix: entities that spin up in milliseconds, access multiple systems within a single task, act on behalf of human users through delegated authority, and terminate when the task is complete. The identity management challenge just got an order of magnitude harder.

Why Traditional IAM Breaks for Agents

Traditional IAM operates on three assumptions that don't hold for AI agents.

The first assumption is that identities have long lifecycles. A human employee joins the company, receives credentials, holds them for months or years, and returns them when they leave. The IAM system is built for this cadence: onboarding takes hours or days, role changes take days or weeks, and offboarding takes days. An AI agent might exist for 30 seconds. It spins up to handle a customer inquiry, accesses the CRM, queries the knowledge base, drafts a response, and terminates. Provisioning credentials through a traditional IAM workflow that takes hours for an entity that lives for seconds is architecturally absurd.

The second assumption is that permissions are static within a session. A human logs into Salesforce and has consistent permissions throughout that session. An AI agent's permissions should change based on what it's doing. The same agent might need read access to customer records for one task and write access to the ticketing system for the next task, within the same execution window. Static, session-level permissions either over-provision the agent (giving it write access to systems it only needs to read) or under-provision it (requiring the agent to re-authenticate for every capability change).

The third assumption is that the entity making the request is the entity responsible for the action. When a human clicks "approve" on a purchase order, the audit trail is clear: that human approved the purchase. When an AI agent approves a purchase order on behalf of a human, who is responsible? The human who asked the agent to "handle my pending approvals"? The agent? The team that built the agent? Traditional IAM has no model for delegated authority that preserves accountability across this chain. Learn more

These aren't edge cases. They're the default operating conditions for any enterprise running agents in production. The Cloud Security Alliance recognized this in early 2026 when it published its Agentic AI Identity and Access Management framework, explicitly calling out the inadequacy of human-centric IAM models for agent environments. SailPoint launched a dedicated Agent Identity Security product. The industry recognizes the problem. Most enterprises haven't caught up yet.

What Goes Wrong Without Agent Identity

The consequences of applying traditional IAM to AI agents are predictable and already showing up in production environments.

Over-permissioning is the most common failure mode. When provisioning agent credentials through traditional IAM is slow and cumbersome, teams take shortcuts. They give the agent a service account with broad permissions because scoping permissions precisely takes too long. The result is an agent with access to data and systems it doesn't need, and a security team that can't distinguish legitimate agent actions from potential compromise. Microsoft's 2026 security report found that 80% of Fortune 500 companies run active AI agents, but far fewer have established governance frameworks for those agents' permissions.

Credential sprawl is the second failure. When each agent deployment creates its own service account or API key, the number of credentials in the environment multiplies rapidly. A team deploying 20 agents across 10 systems generates 200 credential pairs if each agent-system combination gets its own key. Without centralized lifecycle management, these credentials persist long after the agents they were created for are retired. Orphaned credentials are a textbook attack vector.

Audit trail gaps are the third consequence. When an agent acts on behalf of a user, the action log should capture both the agent's identity and the human principal. Most traditional IAM systems log only the immediate caller: the service account the agent authenticated with. This makes it impossible to answer basic compliance questions like "which human authorized this data access?" or "which agents acted on behalf of this user today?" SOC 2 auditors are starting to ask these questions, and most enterprises can't answer them. Learn more

The compound effect of all three failures is what makes agent identity so critical. An over-permissioned agent using orphaned credentials that doesn't log its human principal is simultaneously a security risk, a compliance violation, and an operational blind spot. And at most enterprises today, this is the default state of affairs, not because teams are negligent, but because the identity infrastructure wasn't designed for these entities.

What Modern Agent Identity Looks Like

The architecture for agent identity management differs from traditional IAM in four fundamental ways.

Just-in-time credential provisioning replaces static credential assignment. When an agent needs to access a system, it requests credentials from a central identity service. The identity service evaluates the request (who launched the agent, what task it's performing, what data sensitivity level is involved), provisions credentials scoped to that specific task, and automatically revokes them when the task completes. No orphaned credentials. No broad-permission service accounts. The agent gets exactly the access it needs, for exactly as long as it needs it.

Contextual authorization replaces role-based authorization. Instead of assigning an agent a static role ("CRM reader" or "ticketing admin"), the authorization system evaluates each request in context. What is the agent trying to do? What data will it access? Who initiated the request? What is the risk profile of this action? A customer support agent reading a customer's order history gets approved automatically. The same agent attempting to modify a customer's billing information triggers a human approval workflow. The authorization decision is made per action, not per session.

Delegated authority with attribution solves the accountability problem. When a human user launches an agent, the agent operates within a delegation chain that preserves both identities. Every action the agent takes is logged with the agent's identity, the human principal, the delegation scope (what the human authorized the agent to do), and the specific permission that allowed the action. Audit trails capture the full chain of authority, not just the immediate caller.

Continuous authorization replaces authenticate-once patterns. Traditional sessions authenticate at the start and assume consistent permissions throughout. Agent sessions re-evaluate authorization continuously. If the human principal's permissions change mid-session (they're removed from a team, their access is suspended), the agent's delegated permissions update in real time. If the agent's behavior pattern diverges from its baseline (accessing systems it normally doesn't), the authorization system can challenge, throttle, or terminate the session. Learn more

These four capabilities work as a system. JIT provisioning without continuous authorization still allows mid-session privilege escalation. Delegated authority without contextual authorization still over-provisions agents for individual tasks. Contextual authorization without delegation tracking still creates audit gaps. Each capability addresses a specific limitation of traditional IAM, and each depends on the others to provide complete coverage for agent workloads.

Implementation Patterns

Several implementation patterns are emerging for enterprises building agent identity infrastructure.

Workload identity frameworks from cloud providers offer a starting point. AWS IAM Roles, Kubernetes Workload Identity, and Azure Managed Identities already support dynamic credential provisioning for non-human entities. Extending these frameworks to cover AI agents requires mapping agent lifecycles to workload identity lifecycles: agent startup triggers credential provisioning, agent task boundaries trigger scope changes, and agent termination triggers credential revocation.

Policy engines like Open Policy Agent (OPA) and AWS Cedar provide the authorization logic. These engines evaluate each access request against a policy set, returning allow or deny decisions with full audit trails. For agent identity, the policy inputs include the agent's identity, the human principal, the requested action, the data sensitivity level, and the agent's behavioral context. Writing these policies requires collaboration between security teams (who understand the risk model) and AI teams (who understand agent behavior patterns).

Vendors are entering this space rapidly. SailPoint launched Agent Identity Security. Curity published frameworks for AI agent access management. The Cloud Security Alliance released guidance on agentic AI identity and access management. Aembit is building machine-to-machine identity specifically for non-human entities. The space is maturing, but no single vendor covers the full stack yet.

For most enterprises, the near-term path is to extend existing IAM infrastructure with agent-aware capabilities rather than building entirely new identity systems. Integrate JIT provisioning into your existing credential management. Add delegation chain logging to your existing audit infrastructure. Write agent authorization policies in the same policy engine you use for human access decisions. The identity layer for agents is not a replacement for your existing IAM. It's an extension that handles the new entity types and lifecycle patterns that agents introduce. Learn more

The critical implementation decision is where to place the identity enforcement point. Infrastructure-level enforcement (in an AI gateway or policy proxy) catches every agent request regardless of framework or deployment method. Framework-level enforcement (in LangChain or AutoGen middleware) only covers agents built on that specific framework. Application-level enforcement (in each agent's code) requires every developer to implement identity correctly, and experience shows that inconsistent implementation is the norm when security depends on individual developers rather than infrastructure. The most robust approach is infrastructure-level enforcement with framework-level awareness: the gateway handles authentication and authorization while the agent framework provides context (who launched me, what task am I performing, what data am I accessing) that the gateway uses for authorization decisions.

Identity Is Infrastructure

The pattern is clear across enterprise technology: identity becomes the control plane. Cloud computing went from "anyone can spin up a server" to "every server runs under a managed identity with scoped permissions." Microservices went from "services call each other freely" to "every service-to-service call is authenticated and authorized through a service mesh." AI agents are following the same path, and the enterprises that build the identity layer now will avoid the painful retrofit that always follows ungoverned proliferation.

The 50:1 ratio of non-human to human identities is about to get significantly higher. Every production AI agent, every ephemeral agent that spins up for a single task, every background agent that runs continuously, each one needs an identity, permissions, and an audit trail. Building that identity layer is not a security project. It's an infrastructure project. And like every infrastructure project in enterprise computing, the organizations that invest early compound the advantage over time.

The practical first step for most enterprises is a discovery exercise: enumerate every agent running in the environment, map the credentials each one holds, identify the human principals in each delegation chain, and assess the permission scope against least-privilege requirements. This inventory, often the first time anyone has attempted it, typically reveals credential sprawl, over-permissioning, and audit gaps that justify the infrastructure investment by themselves. From there, the path is incremental: JIT provisioning for new agents, delegation chain logging for existing agents, and contextual authorization as the policy engine matures. Learn more

Agent identity management is built into Rebase's infrastructure layer: JIT provisioning, delegated authority, continuous authorization, and full audit trails. See how it works: rebase.run/demo.

Related reading:

  • Agentic AI Infrastructure: The Complete Stack

  • AI Agent Security Posture Management

  • Enterprise AI Governance: The Complete Guide

  • AI Agent Governance Framework

  • AI Agent Observability in Production

Ready to see how Rebase works? Book a demo or explore the platform.

SHARE ARTICLE

The AI Infrastructure Gap

Why scaling AI requires a new foundation and the nine components every enterprise ends up needing.

The AI Infrastructure Gap

Why scaling AI requires a new foundation and the nine components every enterprise ends up needing.

WHITE PAPER

The AI Infrastructure Gap

Why scaling AI requires a new foundation and the nine components every enterprise ends up needing.

WHITE PAPER

The AI Infrastructure Gap

Why scaling AI requires a new foundation and the nine components every enterprise ends up needing.

Recent Blogs

Recent Blogs

Ready to become AI-first?

Ready to become AI-first?

document.documentElement.lang = "en";