Signal Snapshot

Agent identity is starting to act as a control plane rather than a credential detail

Across primary sources published through March 2026 from Microsoft Entra Agent ID, Microsoft Purview, Amazon Bedrock AgentCore Identity and Policy, Google Cloud Agent Identity and AI Protection, NVIDIA NeMo Guardrails, MCP, A2A, Auth0, and Okta, AI agents are no longer being framed as mere variations of service accounts. The public materials point instead toward a stack in which agents get first-class principals, user-delegated authorization is layered on when needed, protocol-level authentication metadata is exposed for inter-system connections, and governance, data protection, and policy enforcement are treated as parts of the same control plane. The maturity levels are not identical across vendors, but the direction is clear: authentication and authorization for agents are moving out of hidden runtime configuration and into the platform surface.

4 directions

Converging design patterns

The source set groups cleanly into native identity, delegated authority, protocol auth, and governance overlay.

3 models

How principals are carried

The dominant patterns are agent-only, user-delegated, and agent-plus-user context.

36

Published sources

Official documentation and official announcements alone are enough to map the current stack.

1 takeaway

Identity changes the operating model

The key design question is no longer just which token is used, but whose authority the agent represents.

Why This Matters

Service accounts alone are too coarse for real agent delegation and accountability

Traditional app identities and service accounts can still authenticate API calls, but they are too blunt for modern agent workflows. Agents may run as background workloads, act on behalf of users in external SaaS products, and connect dynamically to other systems or other agents through protocols such as MCP and A2A. In that environment, the real requirement is not simply to hold a valid credential. It is to let both the downstream resource server and the audit layer understand whose authority is being exercised, how the permission was delegated, and how it can be revoked without rebuilding the whole integration. That is why the identity layer is becoming part of the control plane.

Shared service accounts tend to make privilege too broad

When multiple agents reuse the same credential, least privilege and revocation boundaries blur quickly. The move toward dedicated agent principals is a direct response to that problem.

User delegation alone hides the acting agent

If only a user token is visible, the downstream system may lose track of which agent actually performed the action. AWS and Google documentation both point toward models that preserve user context without dropping agent accountability.

Protocol-based connections need discoverable auth requirements

As dynamic connections increase, clients need a standard way to learn which auth scheme a server requires. That is why MCP and A2A put authentication metadata into the protocol surface rather than leaving it as hidden integration code.

Four Directions

The public material groups agent identity into four directions

1. Native per-agent identity

  • The platform issues a dedicated principal for the agent itself and ties ownership, lifecycle, and audit to that identity.
  • Microsoft Entra Agent ID, AWS AgentCore Identity, and Google Agent Identity all treat this layer explicitly.

2. Delegated user authority and tool access

  • The agent borrows user authority through consented connections, managed credentials, or token exchange.
  • Copilot Studio action auth, AWS 3LO and workload access tokens, Google delegated OAuth, and Auth0 user-on-behalf flows sit here.

3. Protocol-layer authorization

  • MCP and A2A make authentication requirements discoverable at the protocol level for dynamic server-to-agent and agent-to-agent connections.
  • MCP core auth, client credentials, enterprise-managed authorization, and A2A Agent Card security metadata are the clearest examples.

4. Governance and lifecycle overlay

  • This layer manages owners, publication boundaries, access reviews, secret handling, shadow-agent discovery, and runtime safety controls.
  • Microsoft Agent Registry and Purview, Google IAM plus AI Protection, Okta discovery and certification, and NVIDIA NeMo Guardrails point in this direction, though NVIDIA is more runtime-safety-centric than registry-centric.

Vendor Map

The most useful map is not by vendor name, but by whose authority is being exercised

Native per-agent identity

Principal: the agent itself

Grant method: a dedicated principal is issued at provisioning or deployment time

Policy enforcement point: Entra policy, IAM, AgentCore directory, or resource-level roles

Representative services: Microsoft Entra Agent ID, Microsoft Agent 365, Amazon Bedrock AgentCore Identity, Google Cloud Agent Identity

Delegated user authority

Principal: the user, or a combined agent-plus-user context

Grant method: OAuth consent, 3LO, managed connections, or token exchange

Policy enforcement point: scopes, connection policy, managed credentials, and downstream consent checks

Representative services: Copilot Studio action auth, AWS supported auth patterns, Google delegated access, Auth0 AI agent flows

Protocol-layer authorization

Principal: an agent client, an enterprise auth broker, or a service identity

Grant method: OAuth metadata discovery, client credentials, or enterprise-managed authorization

Policy enforcement point: the authorization server plus the downstream resource server

Representative services: MCP Authorization, MCP OAuth Client Credentials, MCP Enterprise-Managed Authorization, the A2A specification, and Auth0 for MCP

Governance overlay

Principal: a registered agent with an owner or sponsor

Grant method: registry publication, access review, secret and connection management, shadow-agent discovery, and runtime guardrail attachment

Policy enforcement point: registries, directories, audit logs, certification workflows, and guardrail runtimes

Representative services: Microsoft Entra Agent Registry and Purview, Google IAM and AI Protection, Okta AI agent discovery and certification, and NVIDIA NeMo Guardrails

How Permissions Are Granted

Downstream services grant access based on principal context, not just token possession

The key issue is not merely that an agent has a token. Downstream services decide access by looking at who the token was issued for, which consent or policy path produced it, and which validation rules the resource server applies. Across the source set, four recurring patterns appear.

1. Agent principal only

  • principal: the agent alone
  • token or credential source: JWTs, access tokens, or workload identities issued to the agent
  • resource server validation: issuer, audience, role, and IAM policy
  • control point: roles, policies, and resource bindings

This pattern fits background jobs and narrow automation, but it is not enough by itself for actions that require user intent.

2. User-delegated principal

  • principal: the user
  • token or credential source: OAuth-consented user tokens or managed connections
  • resource server validation: user scopes, consent, and app registration
  • control point: scopes, delegated permissions, and connection policy

This is natural for support and finance SaaS integrations, but it needs extra telemetry if the operator also wants to know which agent acted on the user's behalf.

3. Agent plus user context

  • principal: both the agent and the user
  • token or credential source: token exchange, workload access tokens, or delegated-flow audit records
  • resource server validation: user permission plus the identity of the calling workload or agent
  • control point: scopes and policy in two layers

This is the most operationally important pattern because it preserves delegation without losing accountability for which agent executed the action.

4. Central broker and registry

  • principal: an agent client registered in an enterprise control plane
  • token or credential source: an enterprise-managed auth server or managed connection broker
  • resource server validation: broker-issued tokens plus advertised auth metadata
  • control point: registries, authorization servers, and certification workflows

MCP enterprise-managed auth and adjacent identity-vendor offerings point toward this model because it reduces credential sprawl while centralizing revocation and audit. NVIDIA NeMo Guardrails is not a broker, but it sits next to this layer by validating tool calls and external-system interactions at runtime.

Platform Use Cases

Platform-specific governance and runtime-safety layers are already turning agent identity into concrete deployment patterns

Identity alone does not explain how enterprise agent rollouts are actually governed. In practice, platforms are adding adjacent layers for data protection, runtime safety, and policy enforcement. Read together, Microsoft Purview, Google Cloud AI Protection and Model Armor, AWS Policy plus Guardrails, and NVIDIA NeMo Guardrails look like equivalent answers to the same design problem: how to place enterprise controls on top of agent identity rather than bolt them on after the fact.

Microsoft: Agent 365 + Entra Agent ID + Purview

On the Microsoft side, Agent 365 and Entra Agent ID define the acting principal, while Purview governs grounding data, interactions, and Microsoft 365 Copilot agents.

  • Best-fit use case: Microsoft 365 knowledge workflows across Teams, SharePoint, OneDrive, and internal approvals.
  • Benefit: tenant-level identity, data protection, and compliance controls can be kept in one operating surface.

Google Cloud: Agent Identity + AI Protection + Model Armor

On Google Cloud, Agent Engine identity is paired with IAM, while AI Protection, Model Armor, and Agent Engine Threat Detection add asset visibility and runtime protection.

  • Best-fit use case: internal knowledge and support agents backed by Cloud Storage, BigQuery, or Vertex AI RAG workflows.
  • Benefit: access control, AI asset inventory, and prompt-response protection can be reviewed inside one cloud governance surface.

AWS: AgentCore Identity + Policy + Bedrock Guardrails

On AWS, AgentCore Identity defines the acting workload, Policy controls tool access outside the agent code, and Bedrock Guardrails plus Organizations policies add safety and org-level enforcement.

  • Best-fit use case: multi-step back-office or operations agents that cross AWS accounts, internal tools, and approved external services.
  • Benefit: identity, tool policy, and guardrails can be enforced in separate layers without turning every control into application code.

NVIDIA: NeMo Guardrails + safety recipe

On NVIDIA, NeMo Guardrails provides input, retrieval, dialog, execution, and output rails, with agentic-security features focused on tool calls and interactions with external systems. The NVIDIA safety recipe adds a build-deploy-run operating model for evaluation and policy enforcement.

  • Best-fit use case: open-model or framework-based agents that need runtime guardrails for prompt injection, unsafe tool arguments, and off-policy outputs.
  • Benefit: teams can add an explicit safety and control layer even when native per-agent identity issuance lives somewhere else.

Reading the pattern

The product names differ, but the design pattern is similar. Microsoft Purview, Google Cloud AI Protection and Model Armor, AWS Policy and Guardrails, and NVIDIA NeMo Guardrails all answer the same question: what sits on top of agent identity to make deployment governable.

  • The main difference is whether the vendor starts from data governance, AI-asset protection, tool-access control, or runtime guardrails.
  • NVIDIA is not a direct equivalent to Entra Agent ID, AgentCore Identity, or Google Agent Identity on native identity issuance; it is the clearest runtime-safety and tool-validation layer in this comparison.
  • The shared direction is to put discovery, enforcement, and review alongside authentication instead of after it.

Concrete Scenarios and Benefits

Identity design matters most when high-permission workflows are narrowed into controlled operating lanes

M365

Microsoft 365 and Copilot-style internal access

For agents that touch Microsoft 365 resources or Copilot actions, a realistic pattern is to keep a dedicated agent principal while layering user auth only on the actions that need user context. The benefit is that background work and user-mediated work can be managed separately inside the same agent surface.

SaaS

User-delegated access to support and finance SaaS

CRM, ticketing, expense, and billing systems are better served by limited-scope delegated access than by shared secrets. The benefit is that teams can preserve existing permission models while reducing overprivileged credentials.

MCP

Connecting to other systems or other agents through MCP and A2A

For dynamic connections, the critical requirement is to expose auth schemes and requirements through protocol metadata. The benefit is that enterprises can swap auth servers, client-credential policy, or approved clients without rewriting every connection by hand.

Gov

Containing shadow agents and credential sprawl

Unknown OAuth grants, ownerless agents, and scattered long-lived secrets become hard to manage as the agent count rises. Discovery, registry, and access certification help keep revocation and review boundaries intact as deployment expands.

Why this model is useful

Separating agent principals, user principals, and broker responsibilities makes it easier to improve least privilege, auditability, revocation, and delegated access at the same time. This is not only a security advantage. It also affects how quickly an operations team can scale agent adoption without losing control.

Operating Implications

The design decisions that matter most are closer to principal design than to model selection

Observation

The source set increasingly suggests that the core question in agent auth is not which auth method is used, but how authority and operating responsibility are partitioned.

  • Do not collapse the agent principal, the user principal, and the connection owner into one identity concept.
  • Prefer short-lived tokens, token exchange, and managed connections over long-lived shared secrets.
  • Make the enforcement point explicit: IdP, policy engine, authorization server, or downstream resource server.
  • Treat MCP and A2A integrations as auth-metadata and client-governance problems, not only transport problems.
  • Make registry, discovery, and certification part of the first rollout design rather than a later cleanup step.

Key Takeaway

Takeaway

The comparison axis in agent authentication and authorization is no longer just whether a platform supports OAuth. The clearer direction in the public sources is to give agents first-class principals, layer user delegation and protocol auth when needed, and place registry and certification on top of that stack. That stack is also gaining explicit runtime-guardrail layers, especially for tool use and external-system interaction. It is still too early to call a winner, but it is already clear that platforms able to treat agents as governable identities have a structural advantage.