Learning Library

← Back to Library

Identity Governance Evolution for Agentic Systems

Key Points

  • The concept of identity governance began in the 1960s with mainframe users needing to protect files and schedule batch jobs, prompting early questions of “who am I?” and “what am I accessing.”
  • By the 1970s‑80s, the rise of networked databases and applications required systematic user provisioning, directory services, authentication, and access control, expanding identity management to both internal employees and external partners.
  • Modern identity governance now handles complex ecosystems that include SaaS platforms, firewalls, and remote users, emphasizing continuous verification of who can do what across diverse systems.
  • As AI‑driven chatbots and autonomous agents proliferate, we must extend traditional identity governance frameworks to define and control “agentic identities,” ensuring these agents are authenticated, authorized, and governed just like human users.

Full Transcript

# Identity Governance Evolution for Agentic Systems **Source:** [https://www.youtube.com/watch?v=AuV62XbiZcw](https://www.youtube.com/watch?v=AuV62XbiZcw) **Duration:** 00:10:52 ## Summary - The concept of identity governance began in the 1960s with mainframe users needing to protect files and schedule batch jobs, prompting early questions of “who am I?” and “what am I accessing.” - By the 1970s‑80s, the rise of networked databases and applications required systematic user provisioning, directory services, authentication, and access control, expanding identity management to both internal employees and external partners. - Modern identity governance now handles complex ecosystems that include SaaS platforms, firewalls, and remote users, emphasizing continuous verification of who can do what across diverse systems. - As AI‑driven chatbots and autonomous agents proliferate, we must extend traditional identity governance frameworks to define and control “agentic identities,” ensuring these agents are authenticated, authorized, and governed just like human users. ## Sections - [00:00:00](https://www.youtube.com/watch?v=AuV62XbiZcw&t=0s) **From Mainframes to Agent Governance** - The speaker traces the history of identity governance—from early mainframe file protection in the 1960s through networked databases and directories—to argue how these principles can be adapted for governing the identities of modern autonomous agents. - [00:03:04](https://www.youtube.com/watch?v=AuV62XbiZcw&t=184s) **Agents vs. Traditional System Identities** - The speaker explains that autonomous agents are dynamic, non‑human entities with complex interactions and handoffs, contrasting them with the static, deterministic process flows of conventional systems. - [00:06:17](https://www.youtube.com/watch?v=AuV62XbiZcw&t=377s) **Governance of Autonomous Agent Identities** - The speaker outlines a governance strategy that requires assigning each AI agent a unique, verifiable identity and implementing strict access controls to ensure predictable behavior and compliance with regulatory requirements. - [00:09:35](https://www.youtube.com/watch?v=AuV62XbiZcw&t=575s) **Governance, Isolation, Observability** - The speaker emphasizes restricting agents to narrow functions, using segmentation and isolation to limit damage, and ensuring full observability for auditability when deploying enterprise agentic systems. ## Full Transcript
0:00Howdy everyone. 0:01We are interacting more and more and every day with assistants and chatbots and agents. 0:07And with the rise of all these agents and agentic systems, 0:10how do we start thinking about governing agents and how do we express their identities? 0:16To actually address this question, we have to go back a little bit. 0:19And let's do a quick walk through the evolution of identity governance 0:24so that we know how we can then apply that to agentic 0:28identities and agentic agent governance. 0:30Alright, so if we go back actually all the way back to the 1960s, 0:34we had people that were storing on mainframes files that they wanted to store and they wanted, to protect those files. 0:43So they had to start thinking of the concept of who am I and what is it that I'm trying to store. 0:48At the same time we had had timesharing processes or batch applications 0:55where an individual, again, on mainframes, wanted to run jobs in a predetermined time slot. 1:01So who is that person and what is it they were trying to run? 1:05And that's really where we started. 1:07Now, as we move through the 70s and in the 80s, we started seeing more and more databases pop up. 1:13We see applications popping up all over the place. 1:17And these were all on a network. 1:18And across that network, we started having more systems, more data, more people. 1:22So we really had to understand who was in the system. 1:26And what were they trying to do? 1:28So we first had to start talking about how do we provision users? 1:32And once we do that, we put them into a directory. 1:35So we have to know who all of our users are. 1:37And if we know who the users are, we had to started talking about authenticating them. 1:43So we know, do we really know who this individual is? 1:47And then once we knew that, what access did they have to things within our system? 1:52And so we have this whole. 1:54Environment around our enterprise, looking at all the ways that an 1:59individual can interact with the systems and processes within that. 2:02Then of course we had it where we had people now outside 2:05of the enterprise that were coming through a firewall and trying to dial in. 2:09We had to understand who they are and what they're trying to do. 2:12And then we started blocking in SaaS systems that became part of our entire environment. 2:17And again, who are the users? 2:19What can they do? 2:20And this is really the evolution of our modern. 2:23Identity Governance Environment. 2:25Now we have to look at agents. 2:28So they have started to pop up within our systems. 2:32So the first thing that we kind of see happening is that we see a person that's interacting with a chatbot. 2:38It is really a gen AI system, and they interact with data and they bring that back. 2:42That's great. 2:43This is stuff that's kind of been going on since the early 2000s 2:48as we start evolving agents and getting them more integrated in our system. 2:52But what we're seeing today as we start looking at agentic systems, 2:55is we have a lot of agents that are starting to proliferate 2:59throughout the environment and they're interacting on all sorts of interesting ways. 3:03So what does that mean? 3:05What does it mean from an identity perspective? 3:08Well, in one sense, they're not really human. 3:11I mean, they don't behave completely like a human, but they have a lot of human characteristics. 3:16If we look at non-human identities, so we have individuals that... 3:21Interact with an application, it may pull data, and we build these process flows through our systems, 3:27and there's ways that we connect through APIs and build our processes. 3:31And these are non-human systems, but agents are more autonomous. 3:35They're really not non-humans systems either. 3:38So they're really non-human, they're not nonhuman, so what are they? 3:42So the first thing we kind of need to really talk about is what is the difference with an agent? 3:50And how do they behave differently from what we are used to in our systems? 3:55So the first kind of set of things that we look at when we think about agents 3:59and how they behave different is the first thing that makes them really kind of different is that they are dynamic entities. 4:12They also have complex handoffs. 4:18And they also do complex interactions. 4:24All right, so what does that actually mean? 4:27So if we think about it, if we go back to our environment and the area that we're really kind of used to, 4:32again, we have these process flows that kind of run along the bottom here. 4:37And these are deterministic process flows, and they're reasonably static and structured systems. 4:42We know exactly how the system is gonna act and operate across that process. 4:48But as we start thinking about agents and agentic flows, they're more dynamic. 4:54Yes, you may talk to this agent and get a response back, but this 4:57agent may need to go talk to this agent so you have a complex handoff, 5:01and this agent might need to talk to that to do something. 5:04And then the next time you do a prompt and you say I'm looking for some sort of a business answer, 5:09this agent maybe route over here, which then routes over here and takes some sort of action. 5:13And then next time through it may come down here again and then go this direction. 5:17So it's very dynamic, and there's a lot of different handoffs that happen, 5:22and so this is why they're not really our static process flows, 5:26they're really starting to be unstructured and more dynamic business process flows. 5:31And they're also having to do interactions with systems, with private data, 5:35with personal data, with public data, with sensitive systems. 5:39And so all of this makes all these interactions very complex, 5:43and that's one of the things that makes them very, very different from 5:47how we look at, you know, either human or non-human identities. 5:50The other thing that you have to take into consideration is that they're also adaptive. 5:58And what this means is the flow through is going to be different. 6:02They're going to adapt to the environment. 6:05They are 6:06autonomous systems or autonomic agents, and being autonomic, 6:10they're going to make choices about which direction they need to go 6:14within the parameters that are defined for them to operate. 6:17So it's going to be changing all the time. 6:20Now they still have a task to perform. 6:22They have to decide and they have to make decisions on the fly which path that that's to go. 6:27And we want that to operate in a really Define way to a certain extent 6:33so that we don't get a HAL 9,000 going off and doing things that are rogue, and we don't want them doing 6:37so this is where the governance piece of this starts coming in. So the question is then what is our strategy? 6:43What do we know today about how we want to govern? 6:50Agent identities and agentic systems. 6:54So it kind of comes into a set of things that we wanna make sure we're doing. 6:59The first thing that we do is that we want to make sure that we have a unique identity for agents. 7:08Like I said, they're not really human. 7:10They're not non-human. 7:11I mean, they are non-humans, but they don't behave like our traditional non-human identities. 7:15So they need to be unique. 7:16We need to know that this is an agent. 7:18There's actually. 7:20Government regulatory requirements that actually you have to identify that it's an agent. 7:24So you need to know this. 7:26So this is, you have provision them uniquely 7:29and you have authenticate them, much like you do anything else, but unique to that agent. 7:33So that's the first thing. 7:35Make sure you have a unique identity. 7:37The second piece actually starts getting into access. 7:40When we start thinking about governance and identity governance, how do we do access? 7:45So the first thing that you really need to do is make sure that you have context aware access. 7:54And what this is saying is yes, we have a dynamic nature in the way that these things operate and it's very adaptive. 8:02So when you're providing access to systems and to data and to the parts of your enterprise, 8:08you have to make sure you understand the context of which the agent wants to interact with something. 8:14So that's very important if you're going to allow access or not. 8:18The other thing you need to make is sure is that you also think about ephemeral access. 8:25And this also ties back to the dynamic and adaptive nature of this. 8:29It's always changing. 8:31So the kind of access you had the last time an agen 8:34t operated on something may be different from the next time that it operates. 8:38So you don't keep a consistent access control flowing through. 8:42You really want to change it every time. 8:45So ephemeral really talks about the timing, and it's really just-in-time access. 8:49Every time an agent works through a flow that it is working on in an agentic flow, 8:55you need to evaluate the context of it and do it for that flow only. 8:59If you think of a way human identities work, we pretty much, 9:03you know, we see a lot of role-based access controls and other access control models, 9:07but you pretty much are consistent for a extended period of time of what you're allowed to do. 9:13When we think of agents and agentic systems, that's not the same. 9:17We really wanna evaluate every time an agent is taking an action. 9:21The next thing that we wanna really look at or we want to do as a 9:25strategy when we're governing these things is make sure that we do segmentation 9:31and isolation of our agents. 9:35So what this is really talking to, and then especially as we're emerging and how to govern these, 9:41we look at this agent and what it's allowed to do. 9:45And we really restrict it to a small set of things, right? 9:48This agent can't decide that it's going to go talk over here or talk over there. 9:53It really has the function and task of a pretty narrow space of where it's allowed to operate. 9:58This really reduces the attack service. 10:01It really kind of isolates this. 10:03So if that agent were to be compromised in any way, the system that it can interact with is really limited. 10:09So segmentation and isolation are very important when we start thinking about agents and what they're allowed to do. 10:15And then of course, the final thing that we always want to think about is observability. 10:22Make sure that we know what the agents are doing, what actions they're taking. 10:26We always have transparent observability into those, which makes us audit ready and a lot of other great things. 10:32So if we start looking at where agentic flows and where agents are going, 10:37and we start thinking about how we want to express their identities, 10:41these are the things that you need to be doing today to make sure that you're properly governing 10:46and protecting your enterprise as you start evolving into agentic systems. Thank you.