Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Sulfur lava exoplanet L 98-59 d defies classification
    • Hisense U7SG TV Review (2026): Better Design, Great Value
    • Google is in talks with Marvell Technology to develop a memory processing unit that works alongside TPUs, and a new TPU for running AI models (Qianer Liu/The Information)
    • Premier League Soccer: Stream Man City vs. Arsenal From Anywhere Live
    • Dreaming in Cubes | Towards Data Science
    • Onda tiny house flips layout to fit three bedrooms and two bathrooms
    • Best Meta Glasses (2026): Ray-Ban, Oakley, AR
    • At the Beijing half-marathon, several humanoid robots beat human winners by 10+ minutes; a robot made by Honor beat the human world record held by Jacob Kiplimo (Reuters)
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, April 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»AI Technology News»Identity-first AI governance: Securing the agentic workforce
    AI Technology News

    Identity-first AI governance: Securing the agentic workforce

    Editor Times FeaturedBy Editor Times FeaturedMarch 17, 2026No Comments7 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    AI brokers at the moment are working inside manufacturing programs, querying Snowflake, updating Salesforce, and executing enterprise logic autonomously. In lots of enterprises, they authenticate utilizing static API keys or shared credentials relatively than distinct identities within the company IDP. 

    Authenticating autonomous programs by shared credentials introduces actual governance danger.

    When an agent executes an motion, logs usually attribute it to a developer key or service account as an alternative of a clearly outlined autonomous actor. Attribution turns into ambiguous. Least privilege weakens. Revocation might require rotating credentials or modifying code relatively than disabling a ruled identification. In a non-deterministic surroundings, that delay slows investigation and containment.

    Shared credentials flip autonomous programs into “shadow identities”: actors working inside manufacturing with no distinct, ruled identification within the enterprise listing.

    Most organizations have monitoring and guardrails in place. The difficulty is structural. Autonomous programs are working exterior first-class identification governance throughout the identical management airplane that secures human customers. Closing this hole requires aligning brokers with the identification mannequin that governs your workforce, guaranteeing each autonomous actor is traceable, permission scoped, and centrally revocable.

    The hidden danger: Trendy agentic AI is non-deterministic

    Conventional enterprise software program follows predefined logic. Given the identical enter, it produces the identical output.

    Agentic AI programs function in a different way. As an alternative of executing a hard and fast script, they use probabilistic fashions to:

    • Consider context
    • Retrieve data dynamically
    • Assemble motion paths in actual time 

    If you happen to instruct an agent to optimize a provide chain route, it might reference climate forecasts, gas value knowledge, and historic efficiency earlier than figuring out a route. That flexibility allows brokers to unravel complicated, multi-system issues that conventional software program can’t tackle.

    Nevertheless, non-deterministic programs introduce new governance issues:

    • Execution paths might fluctuate from one request to the subsequent.
    • Retrieved knowledge sources might differ relying on context.
    • Outputs can include reasoning errors or inaccurate conclusions.
    • Actions might lengthen past what a developer explicitly scripted.

    When a system can constantly entry firm knowledge and execute actions autonomously, it can’t be ruled like a static utility. It requires clear identification attribution, tightly scoped permissions, steady monitoring, and centralized revocation authority.

    Why credential-based safety breaks in agentic environments

    Most enterprises nonetheless safe AI brokers utilizing static API keys or shared service credentials. That mannequin labored when software program executed predictable logic. It breaks down when autonomous programs function throughout manufacturing environments.

    When an agent authenticates with a shared credential, exercise is logged however not clearly attributed. A Salesforce replace or Snowflake question might seem to originate from a developer key relatively than from a definite autonomous system. Attribution turns into blurred. Least privilege is more durable to implement. Containment is dependent upon rotating credentials or modifying code as an alternative of disabling a ruled identification.

    The issue is identification governance, not monitoring visibility.

    Conventional safety assumes credentials map to accountable customers or companies. Shared credentials break that assumption. In a non-deterministic surroundings, that ambiguity slows investigation and will increase publicity.

    The strategic shift: Identification-first governance

    The governance hole created by shadow identities can’t be solved with further monitoring. It requires a structural shift in how autonomous programs are ruled.

    When a system can dynamically retrieve knowledge, generate probabilistic outputs, and execute actions throughout enterprise platforms, it’s not simply an utility. It’s an operational actor. Governance should replicate that.

    Identification-first governance treats autonomous programs as first-class identities throughout the identical listing that governs human customers. Every agent receives a definite identification, clearly scoped permissions, and auditable exercise attribution.

    This adjustments the management mannequin. Entry is tied to identification relatively than static credentials. Actions are logged to a selected actor. Permissions will be adjusted with out modifying code. Revocation happens on the identification layer, not inside utility logic.

    The result’s a unified identification airplane for human and autonomous actors. As an alternative of constructing parallel AI safety stacks, organizations lengthen present identification controls. Coverage stays constant. Incident response stays centralized. Innovation scales with out fragmenting governance.

    A sensible instance: Identification backed brokers in follow

    One architectural response to the identification governance hole is to provision autonomous programs as first-class identities inside the company listing, relatively than authenticating them by static API keys.

    This method requires coordination between agent orchestration and enterprise identification infrastructure. Via a deep integration between DataRobot and Okta, organizations can now provision brokers constructed within the DataRobot Agentic Workforce Platform as ruled, first-class identities immediately inside Okta. Brokers deployed throughout the DataRobot Agentic Workforce Platform will be provisioned as ruled identities inside Okta as an alternative of counting on shared credentials.

    On this mannequin, every agent receives a listing backed identification. Authentication happens by quick lived, coverage managed tokens relatively than lengthy lived credentials embedded in code. Actions are logged to a selected autonomous actor. Permissions are scoped utilizing present least privilege controls.

    This immediately addresses the attribution and revocation challenges described earlier. When an agent is deployed, its identification is created throughout the company IDP. When permissions change, governance workflows apply. If habits deviates from expectation, safety groups can limit or disable the agent on the identification layer, instantly adjusting its entry throughout built-in programs akin to Salesforce or Snowflake.

    The influence is operational. Autonomous programs develop into seen actors inside the identical identification airplane that secures human customers. Fairly than introducing a parallel AI safety stack, organizations lengthen the controls they already function and audit.

    Three governance ideas for agentic AI

    As autonomous programs transfer into manufacturing environments, governance should develop into express. At minimal, three ideas are important.

    1. Get rid of static credentials

    Autonomous programs mustn’t authenticate by lengthy lived API keys or shared service accounts. Manufacturing brokers should use quick lived, coverage managed credentials tied to a ruled identification. If an autonomous system can entry enterprise programs, it should authenticate as a definite actor throughout the identification supplier.

    2. Audit the actor, not the platform

    Safety logs ought to attribute actions to particular autonomous identities, to not generic companies or developer keys. In non-deterministic programs, platform stage visibility is inadequate. Governance requires actor stage attribution to help investigation, anomaly detection, and entry overview.

    3. Centralize revocation authority

    Safety groups should be capable to limit or disable an autonomous system by the first identification management airplane. Containment mustn’t rely on code adjustments, credential rotation, or redeployment. Identification should perform as an operational management floor.

    Non-deterministic programs usually are not inherently unsafe. However when autonomous programs function with out identification stage governance, publicity will increase. Clear identification boundaries convert autonomy from a governance legal responsibility right into a manageable extension of enterprise operations.

    AI governance is workforce governance

    Agentic programs now function inside core workflows, entry regulated knowledge, and execute actions with actual consequence. Governance fashions designed for deterministic software program usually are not enough for autonomous programs.

    If a system can act, it should exist as a ruled identification throughout the identical management airplane that secures your workforce. Identification turns into the inspiration for attribution, least privilege, monitoring, and centralized revocation. When brokers function inside the company listing relatively than exterior it, oversight scales with innovation.

    This mannequin is taking form by nearer integration between agent orchestration platforms and enterprise identification suppliers, together with the collaboration between DataRobot and Okta. Fairly than constructing parallel AI safety stacks, organizations can lengthen the identification infrastructure they already function to autonomous programs. To see how identity-backed brokers can function securely inside enterprise environments, discover The Enterprise Guide to Agentic AI or schedule a demo to learn the way DataRobot and Okta combine agent orchestration with enterprise identification governance.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    How robots learn: A brief, contemporary history

    April 17, 2026

    Vibe Coding Best Practices: 5 Claude Code Habits

    April 16, 2026

    Why having “humans in the loop” in an AI war is an illusion

    April 16, 2026

    Making AI operational in constrained public sector environments

    April 16, 2026

    Treating enterprise AI as an operating layer

    April 16, 2026

    Building trust in the AI era with privacy-led UX

    April 15, 2026

    Comments are closed.

    Editors Picks

    Sulfur lava exoplanet L 98-59 d defies classification

    April 19, 2026

    Hisense U7SG TV Review (2026): Better Design, Great Value

    April 19, 2026

    Google is in talks with Marvell Technology to develop a memory processing unit that works alongside TPUs, and a new TPU for running AI models (Qianer Liu/The Information)

    April 19, 2026

    Premier League Soccer: Stream Man City vs. Arsenal From Anywhere Live

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Palantir veterans’ startup Ankar raises €17 million to expand AI-driven IP software into the US

    December 17, 2025

    Cabin Devín vacation home delivers off-grid tiny living in just 215 sq ft

    March 23, 2026

    Rocket fuel for Europe’s SpaceTech? Founder reacts to EIB’s new €500 million space programme

    November 28, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.