All Products
Search
Document Center

Identity as a Service:Agent ID Guard overview

Last Updated:Mar 20, 2026

Agent ID Guard is an identity and access management (IAM) service purpose-built for AI agents. It provides centralized identity registration, dynamic credential management, access control, and audit logging to help you secure agent interactions across your enterprise environment.

Background

As AI agents move from prototypes to production workloads, they introduce a new category of non-human identities (NHIs) that existing IAM solutions were not designed to handle. Unlike traditional applications with predictable access patterns, agents operate autonomously, invoke external services, and make chained API calls that span multiple systems. Cloud-native architectures and microservices compound these challenges by blurring traditional access boundaries.

Without purpose-built identity governance, agent adoption creates three systemic risks:

  • Unmanaged agent sprawl: Organizations lack visibility into how many agents exist, who created them, and what data they access. For example, a team deploys an unregistered data query agent with a code vulnerability that continuously leaks data, but the breach goes undetected until a traffic anomaly alert fires. Security teams have no inventory to trace back to.

  • Privilege escalation: Users gain access to restricted resources through agents with broader permissions than their own roles allow. For example, an employee accesses executive expense records through a reimbursement agent, or an orphaned agent from a departed employee continues to run with full credentials.

  • Credential mismanagement: To simplify configuration, administrators grant agents broad permissions. Developers hard-code API keys and secrets into agent code, making credentials vulnerable to exposure. Without centralized credential governance, rotation and revocation become impractical at scale.

Agent ID Guard addresses these risks by serving as a centralized identity hub and permission authority for all agents in your environment. It covers the full lifecycle of agent identities, from registration through credential management to runtime monitoring.

Core capabilities

Unified identity management

Agent ID Guard provides a dedicated management console where you register and manage all agents. Each agent receives a unique Agent ID that serves as its digital identity across your environment. The Agent ID enables:

  • Identification: Every agent has a traceable identity with a known owner and defined purpose.

  • Access governance: Permissions are defined per Agent ID and enforced consistently.

  • Auditability: All agent activity is linked to a specific Agent ID for investigation and compliance.

Enterprise identity integration

Agent ID Guard integrates with your existing identity providers, including DingTalk, WeCom, Lark, LDAP, and Microsoft Entra ID (Azure AD). This establishes an end-to-end trusted access chain:

User → Client → Agent → Resource

The chain enforces security at each transition:

Transition

Mechanism

Example

User to Client

SSO authentication

User logs in through the corporate IdP.

Client to Agent

Policy-based access control

Only HR department members can invoke the onboarding workflow agent.

Agent to Resource

Least privilege enforcement

The agent accesses only the downstream resources (LLMs, enterprise services, SaaS) required for its current task.

End-to-end

OIDC / OAuth 2.0 protocol security

Token propagation and validation at each step prevent identity spoofing and unauthorized access.

Dynamic credential management

Agent ID Guard manages the sensitive credentials (API keys, OAuth secrets, tokens) that agents need to access LLMs, third-party SaaS, and internal systems.

  • Encrypted storage: All credentials are encrypted at rest using Key Management Service (KMS).

  • Dynamic delivery: Agents retrieve credentials only when explicitly authorized. Agent code never accesses long-lived raw credentials. At runtime, agents receive only short-lived, scoped temporary tokens through a secure channel.

  • Auditable distribution: All credential distribution is logged and bound to the requesting Agent ID and call context.

End-to-end monitoring and alerting

Agent ID Guard integrates with Simple Log Service (SLS) to provide comprehensive behavior auditing:

Log category

What is recorded

Inbound records

The user or system that triggers the agent, along with the timestamp and source.

Outbound records

The downstream services the agent calls, the credentials used, and the operations performed.

Credential audit

All credential retrieval and usage, associated with the specific Agent ID and call context.

All events are written to SLS in standardized JSON format. You can search and analyze logs by Agent ID, user identity, timestamp, and resource type.

Architecture

The following diagram shows the business flow of Agent ID Guard, including how users, clients, agents, and downstream resources interact through the identity and credential management layer.

Business flow

image

Agent types

Agent ID Guard supports two agent types based on their interaction model:

Type

Description

Access pattern

Autonomous agent

Operates independently on a preset schedule without user context. Example: an operations agent that periodically restarts services.

Outbound only

Interactive agent (user-delegated)

Acts on behalf of a specific user. Requires user authentication before performing tasks such as sending emails or scheduling meetings.

Inbound and outbound

Core components

Component

Description

Agent ID

A unique application identity assigned to each AI agent. Defines the agent's access permissions. Clients must obtain authorization from the Agent ID before accessing agent services.

LLM integration

Hosts LLM API keys so that developers never access raw credentials directly. The Agent ID retrieves authorized keys through identity authentication at runtime.

Enterprise service (MCP)

Exposes existing enterprise systems to LLMs through the Model Context Protocol (MCP). Each enterprise service maps to a machine-to-machine (M2M) application with custom resource servers and permissions for secure API exposure.

Client

The access entry point for interactive agents, such as web or mobile applications. Users authenticate through the client and obtain an access token to invoke agent services.

Credential management service

A high-availability credential storage system. Encrypts all credentials (API keys, OAuth secrets) with KMS. Only authorized Agent IDs can retrieve credentials, and only as short-lived temporary tokens.

What to do next