Why AI Agent Security Demands New Identity Controls
Enterprises are rapidly rebuilding workflows around autonomous AI agents, but their security foundations still assume human operators. Most teams connect agents using shared API keys, inherited credentials, or persistent access tokens that were never designed for agent-to-agent delegation. That leaves agents either over-privileged and ungovernable or so constrained that they can’t deliver real value. As autonomy increases, the stakes rise: a single misconfigured agent can delete production data or exfiltrate confidential information without human oversight. Traditional identity access management tools focus on employees and static service accounts, not dynamic, task-scoped permissions across multi-agent systems. This gap is driving a new generation of platforms that treat agents as first-class identities, capable of receiving delegated, time-bound access with complete attribution. The emerging goal is clear: unify identity and access for humans, machines, and AI agents under one policy framework that can scale to production.
Keycard: Scoped Permissions and Attribution for Multi-Agent Apps
Keycard is positioning itself as an identity and access layer purpose-built for AI agents, especially in multi-agent architectures. Its new Keycard for Multi-Agent Apps gives every agent its own verifiable identity and replaces long-lived credentials with delegated, session-based access. Permissions are scoped per task, so an agent can only act within the boundaries of the specific job it’s been assigned. Crucially, every action becomes attributable across agents, users, and systems, creating an audit trail that security teams can actually reason about. This helps developers avoid the common trade-off between giving agents broad, risky privileges and making them too restricted to be useful. Enterprises like Chime highlight that engineers can deploy agents into production without becoming identity experts, because Keycard centralizes policy and access delegation. In a landscape where multi-agent systems are becoming the norm, this style of autonomous agent access control directly targets systemic misuse risks.
Palo Alto’s Idira: Unifying Human, Machine, and Agentic Identities
Palo Alto Networks’ Idira aims to become an AI identity-security control layer that treats human, machine, and agentic identities as peers. Instead of separate stacks for employees, service accounts, and AI agents, Idira builds one policy framework where security teams can see what any account is allowed to do, grant temporary access, and revoke it when tasks end. The platform aggregates capabilities from three key components. CyberArk contributes privileged-access management, governing when high-risk permissions can be elevated or must be withdrawn. Koi adds visibility into newer AI-era assets such as plugins, scripts, and endpoint artifacts that often sit outside legacy identity tools. Portkey brings AI-agent governance, allowing enterprises to monitor, route, and secure autonomous software activity across their AI systems. With most organizations already running agents in production, Idira’s unified identity access management approach is designed to reduce the operational drag of slow privilege changes and weak revocation practices.

Cloudflare and Stripe: Letting Agents Provision Cloud Resources Safely
Cloudflare and Stripe are tackling a different but related challenge: how to let AI agents manage cloud resources and payments without breaking security boundaries. Their new protocol, exposed via Stripe Projects, lets agents create cloud accounts, start paid subscriptions, register domains, and deploy applications to production. The design enforces clear trust boundaries. Discovery is handled through a REST-based catalog that agents can query to choose services based on user intent. Authorization uses Stripe as the identity provider; if an email matches an existing Cloudflare account, a standard OAuth flow is triggered, and if not, a new account is provisioned automatically. Payment relies on Stripe’s tokenization, so agents never see raw card data, and default spending caps help contain risk. The result is a model where agents can autonomously orchestrate infrastructure while humans retain control over identity, terms of service acceptance, and payment approval.

Convergence: Toward a Single Control Plane for Agent Access
Taken together, these efforts signal a shift toward unified, policy-driven AI agent security. Keycard focuses on scoped permissions for agents inside multi-agent applications, emphasizing per-task delegation and full attribution. Palo Alto’s Idira extends that logic across the broader enterprise, blending privileged-access management, AI asset visibility, and agent governance into a single control layer. Cloudflare and Stripe, meanwhile, show how agents can operate at the cloud and commerce edge, provisioning resources and handling payments while staying inside carefully designed trust boundaries. The common thread is the move away from static credentials and human-only identity models toward dynamic, session-based access that covers people, services, and agents alike. For enterprises, the next phase of AI agent security will likely hinge on how well these platforms interoperate to deliver consistent policies, auditability, and revocation across all layers of their AI-driven stacks.

