Securing the Agentic Enterprise: Identity in the Age of Autonomy
Opal's support for NHIs and agentic access (as well as MCP) means you can view employee and agentic authorization in a single platform. Learn how to secure enterprises with numerous active agents.
Date
Jul 28, 2025
Author
Shelley Wu
Topics
FEATURED
IDENTITY SECURITY
PRODUCT
Share this post
Enterprise identity is experiencing its most radical transformation since the advent of the cloud. As AI agents proliferate across organizations—with projections showing AI agent adoption expected to jump 327% over the next two years¹—security teams face an unprecedented challenge. How do you secure identities that think, adapt, and operate autonomously at machine speed? The rules of identity are being rewritten in real-time. And legacy models are cracking under the strain.
At Opal, we've been preparing for this moment. As the industry scrambles to address agent-specific challenges, businesses are coming to realize that fragmentation and lack of scalability in the IAM stack are both a huge problem. Fragmentation, specifically, introduces a level of complexity and risk that eclipses anything in just human world. The future of identity security isn't about creating separate systems for humans, services, machines, or agents. It's about deploying and scaling a unified, intelligent platform that understands and secures all entity types through context, behavior, and continuous adaptation.
We designed Opal from the beginning to accommodate any entity and any resource, and with agentic usage rapidly expanding in the workplace and a wave of business consolidation, that’s more important than ever before.
Legacy Identity Systems Were Built for People—Now Agents are Breaking Them
Today's enterprises juggle an increasingly complex identity ecosystem, where each identity type presents unique challenges and solutions.
Human identities span diverse user types—full-time employees, contractors, Business Process Outsource users, and more—each with distinct access needs. While protocols like SAML, OpenID Connect, and FIDO2 enable authentication, disparate upstream identity sources (e.g. Okta, EntraID, Workday) and inconsistent authorization strategies to crown jewel systems create persistent security challenges. The human element—role changes, extended leaves, temporary assignments—gives rise to edge cases that basic automation fails to account for. This is where just-in-time (JIT) access request flows and powerful lifecycle management capabilities come into play.
Service accounts present their own challenges, often outnumbering human accounts while requiring specialized governance frameworks. Organizations implement centralized service account registries, automated credential rotation, and increasingly adopt JIT access patterns to minimize standing privileges—yet service account sprawl remains a persistent security risk.
Machine identities scale even further, with IoT devices, containers, and microservices each requiring unique cryptographic identities. Certificate management platforms automate lifecycle management for millions of certificates, while PKI infrastructure provides the foundation for secure machine-to-machine communication.
But here's where the foundation cracks: agent identities don't fit neatly into any existing category. They exhibit characteristics of all three—the delegation needs of humans, the automation patterns of services, and the scale challenges of machines—while introducing new complexities.
The Rise of the Identity-Challenging Class
Imagine this: a generative AI agent trained to support HR suddenly starts routing sensitive employee reports—based on behavioral pattern detection—to an executive assistant agent. Nothing was breached. Everything was “authorized.” But trust was broken. Agents don’t ask for access—they just start acting. That’s the new risk surface. AI agents fundamentally break traditional identity security models through several unique characteristics³:
Dynamic and Ephemeral Nature: Unlike static service accounts, agents spawn, evolve, and terminate based on task requirements. An agent analyzing financial data might exist for minutes, while another managing customer interactions persists for months. Traditional IAM systems, designed for predictable lifecycles, struggle with this dynamism.
Autonomous Decision-Making: Agents don't just execute predefined tasks, they reason, adapt, and make decisions. These aren’t bots following a script. They’re actors with evolving goals and opaque logic. Identity becomes not just an inventory problem, but a trust problem. This autonomy creates new attack surfaces. Consider an agent with read-only database access that learns to chain multiple read operations to extract sensitive information never intended for exposure.
Complex Trust Relationships: In multi-agent environments, trust becomes multidimensional. In a scenario of Agents A, B, and C, the problem becomes:
Tracing Agent B’s accountability
Tracing authorization back to Agent A
Managing the upstream and downstream implications from agent to agent or agent to employee
The delegation chain becomes opaque, accountability blurs, and security teams lose visibility into who's accessing what. This complexity deepens with the critical need to distinguish whether an agent is acting on behalf of a user, on its own behalf, or on behalf of another agent⁴—a distinction that emerging protocols like Model Context Protocol (MCP)⁵ and Agent-to-Agent (A2A) are beginning to address through explicit delegation tracking and chain-of-authority verification.
One possible configuration of agentic accountability.
Combinatorial Complexity:
Cardinality Explosion: Enterprises might manage thousands of human identities and tens of thousands of service accounts—but agent identities can quickly exceed traditional identity counts at exponential ratios. At these quantities, agents don’t just outnumber humans, they can easily outmaneuver static controls. A single workflow automation platform can spawn hundreds of ephemeral agents per hour, while customer service implementations may run thousands of concurrent agent instances, so inflexible static controls always fall short.
Attribution Entropy: When an agent makes a decision based on learning from multiple data sources, processed through various models, and influenced by other agents' outputs, determining accountability becomes nearly impossible with traditional logging.
Information Leakage Risks via Granularity Failures: Agents with broad access can inadvertently become conduits for information leakage. Their ability to correlate data across systems, combined with potential prompt injection vulnerabilities, creates new vectors for data exfiltration. An agent might leak an embarrassing personal detail into a generated project update: while the detail might seem logically relevant, the LLM may not be prompted or RHLFed to use discretion around generating responses personal details, even in professional scenarios.
Consider different architectural patterns and their unique identity risks⁶:
Centralized Agent Architectures: Single points of failure where compromising the orchestrator grants access to all agent capabilities. A customer service bot system where all agents route through a central platform becomes a high-value target.
Federated Agent Systems: Trust boundary confusion where agents from different domains interact without clear security contexts. When a data analysis agent from the analytics team requests data from a DevOps agent managing production databases, who validates the trust chain?
Hybrid Deployments: Inconsistent security policies between on-premise and cloud-hosted agents creating gaps in protection. A financial services firm running compliance agents on-premise while customer interaction agents operate in the cloud faces policy synchronization challenges.
The lack of unified visibility creates security gaps and operational inefficiencies that compound as agent identities enter the mix, particularly as organizations navigate optimal human-agent ratios (HAR) that Microsoft research identifies as critical for 2025 success².
Identity Type | Key Risk | Governance Weakness | Scalability Concern |
Human | Role drift | Manual lifecycle mgmt | High variance, edge cases |
Service Account | Privilege creep | Sprawl, limited visibility | Patchy JIT adoption |
Machine | Certificate explosion | PKI maintenance | Orchestration |
Agent | Autonomous behavior | Chain-of-Trust ambiguity | Cardinality & attribution entropy |
The Opal Vision: A Unified Platform for a Fragmented Future
At Opal, we recognize that securing multi-agent enterprises doesn't require abandoning everything we've learned about identity security. Instead, it demands extending and adapting our proven foundations—robust authentication, granular authorization, comprehensive auditing—while adding the capabilities needed for the agentic future. We help teams move from identity inventory to identity intelligence.
Opal’s Unified Identity Matrix:
Universal Identity Data Fabric: Organizations need more than just inventory—they need to understand relationships across their entire identity landscape. Our platform enables teams to map and visualize connections between identities, from upstream providers through to downstream applications. Customers can self-service tag and classify identities, marking specific identities as agents based on their operational characteristics. This unified view forms the foundation for security—you can't protect what you can't see or understand. At Opal, we don’t just believe in seeing every identity—we believe in understanding every relationship. It’s not enough to know who’s in the system. You have to know who’s connected to what, and why.
Context-Aware Identity Detection: While manual tagging provides immediate value, automatic agent detection based on behavioral patterns, authentication methods, and operational characteristics represents the next evolution. An identity authenticating via OAuth client credentials, accessing multiple systems in rapid succession, and exhibiting non-human interaction patterns? It’s not labeled as an agent, but it walks like one, talks like one, and moves faster than any human ever could. That’s the future of detection—autonomous classification based on behavior, not declarations.
Dynamic Access Governance: Access request and approval workflows, time-bound access grants, and automated deprovisioning extend naturally to agent identities. But agents require additional capabilities: delegation chain tracking, capability-based access control, and real-time permission adjustment based on behavior.
Behavioral Security Posture: Traditional security posture management focuses on configuration and compliance. For agents, behavioral dimensions become critical—tracking not just what an agent can access, but how it actually uses that access. Anomaly detection, usage pattern analysis, and risk scoring help identify compromised or misbehaving agents before damage occurs. At Opal we’re leading the charge to shift from static controls to adaptive posture.
Unified Identity Security Signals and Insights: A comprehensive platform must intelligently correlate patterns and signals across the diverse identity fabric—spanning humans, services, machines, and agents—to provide actionable security insights. By analyzing access patterns, authentication methods, and behavioral anomalies across all identity types, such a platform can generate targeted recommendations for reducing attack surface area. This might include identifying over-privileged service accounts that agents leverage, detecting unusual delegation chains, or recommending more dynamic and fine-grained policies based on actual usage patterns. The goal is transforming raw identity data into trusted intelligence that drives proactive security decisions.
This comprehensive platform approach stands in stark contrast to point solutions that address only narrow slices of the identity security challenge. NHI-specific vendors might excel at discovering service accounts or managing machine certificates, but they lack the broader context needed for true security⁷. When an agent authenticated through a service account accesses data on behalf of a human user, visibility and control across all three identity types becomes critical—something only a unified platform can provide.
The Path Forward: Practical Steps for Every Enterprise
Organizations don't need to wait for the perfect solution to start securing their multi-agent future. Here's how to begin:
Establish Universal Visibility: Inventory all existing identities—human, service, machine, and emerging agents. See everything all at once and classify it fast.
Implement Context-Aware Policies: Implement xBAC, a system that dynamically responds to changing conditions, replacing brittle rules with access control based on behavioral patterns, and delegation chains in authorization decisions.
Eliminate Static Privilege: Apply JIT access principles aggressively for agent identities. No agent should have standing privileges beyond its immediate task requirements.
Build Behavioral Baselines: Start tracking how agents interact with your systems. These trust baselines become critical for detecting anomalies as agent populations grow and have narrow and wide scope.
Scope Agentic Access and Guardrails: Some agents perform better at broad, superficial tasks, where they can synthesize lots of information at a high level—access request feedback, for example. Other agents need to be narrowly scoped and constrained, when generating precise syntax ACLs and Terraform config files.
Architect for Explosion: Design identity architectures that can handle 10x or 100x current volumes. Most organizations are architecting for linear growth. The agent explosion is logarithmic. If you’re not designing for scale, you’re designing for failure⁸. Navigate this scale by safely adopting LLMs and leveraging emerging tools like MCP servers to streamline identity operations while maintaining security.
Securing Tomorrow's Enterprise Today
The transition to multi-agent enterprises isn't a distant future—it's happening now. Organizations that recognize identity as the new security perimeter, extending beyond humans to encompass the full spectrum of digital actors, will thrive in this new reality.
At Opal, we're not just adapting to this change—we're helping shape it. By treating identity security as a unified discipline that spans every type of digital actor, organizations can build systems that are both powerful enough for current needs and flexible enough for whatever comes next.
The enterprises that succeed will be those that see identity security not as a collection of point solutions but as a unified discipline requiring a comprehensive platform. They'll build on proven foundations while embracing new capabilities. Most importantly, they'll partner with vendors who understand that in the age of AI, identity security must be as dynamic, intelligent, and adaptive as the agents it protects.
Tomorrow’s attackers will be autonomous. Your defenses have to be too. Identity isn’t just the new perimeter—it’s the battlefield. The multi-agent enterprise is here. You don’t need to wait on securing agentic identities. In fact, you can’t afford to.
Many thanks to Paul Carleton from Anthropic for his conceptual contributions to this post, including the structure of the “Complexity” section and his crisp breakdown of Identity Types.
To learn how Opal can help secure your multi-agent enterprise with comprehensive identity visibility, context-aware governance, and behavioral security intelligence, schedule your demo today.
References
Salesforce. (2024). "Agentic AI Impact on Workforce Research." Retrieved from https://www.salesforce.com/news/stories/agentic-ai-impact-on-workforce-research/
Microsoft. (2025). "Work Trend Index 2025: The Year the Frontier Firm is Born." Retrieved from https://www.microsoft.com/en-us/worklab/work-trend-index/2025-the-year-the-frontier-firm-is-born
Huang, K., et al. (2025). "A Novel Zero-Trust Identity Framework for Agentic AI." arXiv preprint arXiv:2505.19301.
Microsoft. (2024). "The Future of AI Agents—and Why OAuth Must Evolve." Microsoft Entra Blog.
Anthropic. (2024). "Introducing the Model Context Protocol." Anthropic News.
Cloud Security Alliance. (2025). "Agentic AI Threat Modeling Framework: MAESTRO." Retrieved from https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro
OWASP Foundation. (2025). "Top 10 Non-Human Identities Risks - 2025." OWASP Project.
McKinsey & Company. (2024). "The State of AI in 2024." McKinsey Global Survey.
Gartner. (2024). "Market Guide for Identity Governance and Administration." Gartner Research.