IDENTITY FOR AI AGENTS

Secure AI agents
with identity they can be held accountable for

Authentication, consent, and authorization to govern autonomous AI agents:
Pluggable, standards-based, and EU-sovereign.

OAuth 2.1 OAuth 2.1
MCP Auth Server MCP Auth
PSD2-Ready Consent Agent Auth
OPA Policy Engine Human-in-the-Loop
EU-hosted EU sovereign
EU-hosted Fine-grained authorization
CORE FRAMEWORK

6 building blocks for agent governance

1

Agent identity

Agents as first-class identities with sponsors, lifecycle management, and attestation.

2

Authentication

OAuth 2.1 auth server for MCP and A2A protocols – standards-first, zero proprietary lock-in.

3

Consent

Granular per-resource consent – the same pattern as PSD2, but built for AI agents. Revocable anytime, with full audit trail.

4

Authorization

Policy-based, runtime authorization via OPA and Rego – fine-grained per agent, per tool, and per tenant. AuthZEN-compatible for interoperable access decisions across systems.

5

Vault & secrets

Token vault, certificate lifecycle, and secretless authentication via clavik, our secrets management layer.

6

Audit & control

Every agent action is logged in an immutable audit trail. CIBA-based human-in-the-loop approval lets you require human sign-off before sensitive operations – with instant revocation at any time.

HOW IT WORKS

Agent Authentication Flow

Interactive walkthrough of cidaas agent delegation, OAuth-based access, runtime policy, and auditable execution.

Tap any step to explore the delegation flow
Step 1 of 6
Grant Delegation
Grant
Delegation
Authenticate
Agent
Record
Consent
Issue
Token
Evaluate
Policy
Execute
& Audit
User (Sponsor)
al***@**rp.eu
  • Approves agent identity
  • Selects allowed tools
  • Sets tenant and limits
>
cidaas
cidaas
Consent intake · Identity
<
AI Agent
awaiting delegation
  • Requests delegated access
  • Acts only inside approved limits
  • Cannot self-expand permissions
STEP 1 · CONSENT
User grants delegation
The user explicitly approves what the agent may do — which tools, which tenant, for how long, and with which guardrails. No vague, open-ended access.
Explicit consent Task-scoped Tenant-aware Time-bound
WHY THIS MATTERS Delegation must be explicit, contextual, and auditable. This prevents vague, open-ended access and makes the agent’s authority understandable to both users and administrators.
BEST-PRACTICE SIGNALS
  • Separate the user sponsor from the agent workload identity
  • Collect consent with concrete task, tool, and tenant boundaries
  • Prefer narrow, revocable permissions over broad persistent grants
Agent Runtime
registered workload
  • Presents client identity
  • Proves registered credential
  • Requests access bootstrap
>
cidaas
cidaas
Client auth · Trust evaluation
<
Verified Identity
agent trusted
  • Client authenticated
  • Sponsor context linked
  • Ready for fine-grained consent
STEP 2 · IDENTITY
Agent authenticates
The agent proves its registered workload identity to cidaas — separate from the user. Two distinct identities, zero confusion between sponsor and software.
Workload identity OAuth 2.1 No identity confusion Proof-based
WHY THIS MATTERS Best practice requires two identities: the human sponsor and the agent itself. This keeps user approval separate from the software identity that will later use the token.
BEST-PRACTICE SIGNALS
  • Do not blur user consent with client authentication
  • Prefer strong client auth such as private_key_jwt or mTLS
  • Make the authenticated software identity visible in logs and policy
Granted Access
policy input
  • calendar.read → granted
  • calendar.write → granted
  • files.delete → denied
>
cidaas
cidaas
Consent ledger · Guardrails
<
Guardrails
runtime rules
  • Tenant corp-eu only
  • Expires in 30 minutes
  • Approval required for external
STEP 3 · AUTHORIZATION
Consent & constraints recorded
cidaas stores granular authorization: which resources, which tools, which tenants, for how long — and critically, what stays denied. Scopes alone are too blunt for agentic systems.
Fine-grained Resource-level Denied actions visible Approval rules
WHY THIS MATTERS Scopes alone are usually too broad for agentic systems. Structured delegation data makes authorization decisions clearer, safer, and easier to audit later.
BEST-PRACTICE SIGNALS
  • Record what is allowed and what is explicitly denied
  • Attach delegation to concrete resources, not generic global scopes
  • Store enough detail for audit and forensic review
cidaas Token Service
secure issue path
  • Builds token from consent
  • Binds to target resource
  • Limits lifetime and scope
>
cidaas
cidaas
Token service · Scoped issuance
<
MCP / API Resource
resource server
  • Validates audience & expiry
  • Checks delegated context
  • Rejects unrelated reuse
STEP 4 · ACCESS
Delegated token issued
cidaas issues a short-lived, audience-bound token for the target MCP server or API. Least privilege by design — no reusable master key.
Short-lived Audience-bound Delegated context Least privilege
WHY THIS MATTERS Short-lived, audience-bound tokens reduce blast radius. The token carries enough context to support validation without becoming a broad reusable credential.
BEST-PRACTICE SIGNALS
  • Issue delegated tokens for a specific audience or resource
  • Prefer very short lifetimes for agent execution tokens
  • Avoid generic long-lived bearer tokens for powerful actions
Policy Engine
cidaas authz
  • Reads consent + token
  • Checks live risk signals
  • Returns allow / deny / approve
>
cidaas
cidaas
Policy engine · Live decisions
<
Decision Result
ALLOW or HITL
  • Allow low-risk internal
  • Require approval for external
  • Deny expired or cross-tenant
STEP 5 · DECISION
Runtime policy evaluated
Before every sensitive action, runtime policy evaluates live context: sponsor, agent, tenant, tool, risk, approval state. Authorization is not a one-time event.
Allow / deny / approve Context-aware Risk-based Human-in-the-loop
WHY THIS MATTERS Authorization for agents should not be a one-time check. Runtime policy is where the system can allow, deny, or require human approval depending on what is happening right now.
BEST-PRACTICE SIGNALS
  • Evaluate every sensitive action at runtime, not just at sign-in
  • Feed live context into policy: risk, destination, tenant, approval
  • Let policy return allow, deny, or require human approval
Approved Execution
tool invocation
  • Runs inside approved limits
  • Only allowed operation executes
  • Response captured
>
cidaas
cidaas
Immutable audit trail
<
Audit Record
immutable trail
  • Who approved it
  • Which agent performed it
  • What happened and when
STEP 6 · ACCOUNTABILITY
Action executed & audited
Once token and policy both clear, the tool runs — and the full chain is captured: sponsor, agent, decision, action, outcome. Accountable execution, not just execution.
Immutable trace Sponsor-to-agent chain Action evidence Review-ready
WHY THIS MATTERS The final step is not just execution — it is accountable execution. This is what makes agent activity reviewable, governable, and trustworthy inside enterprise environments.
BEST-PRACTICE SIGNALS
  • Tie every action back to both the user and the agent
  • Store the policy decision and execution result together
  • Keep an immutable trace for review, compliance, and incident response
INDUSTRY SOLUTIONS

AI agents across industries

Every industry deploying autonomous agents faces the same challenge: identity, consent, and control.

FINANCIAL SERVICES

Autonomous trading agents

AI agents that execute trades need granular per-action consent, PSD2-compliant audit trails, and real-time revocation when limits are breached.

HEALTHCARE

Patient data access agents

Medical AI assistants accessing EHR data require purpose-limited consent, GDPR audit logging, and human approval for sensitive operations.

E-COMMERCE

Customer service agents

Agents handling returns, refunds, and order modifications need scoped authorization per customer, tenant, and action – with full traceability.

MANUFACTURING

Supply chain orchestration

AI agents coordinating across supplier APIs require multi-tenant identity, certificate-based auth, and machine-to-machine delegation chains.

PROVEN PATTERN

From open banking to agent consent

The same consent framework trusted by banks – now extended for AI agents and agent-based authorization. cidaas already powers PSD2-compliant consent for financial services customers across Europe – the same engine, now available for AI agents.

“Consent is not just a feature – it’s the bridge between user intent and agent authority.”

Sadrick Widmann

CEO, cidaas

Two pillars of agentic identity

MCP AUTH

Secure your MCP servers

OAuth 2.1-based authentication for Model Context Protocol servers. Control which tools and data sources AI agents can access with fine-grained authorization.

AGENT AUTH

Identity for autonomous agents

Issue machine identities, enforce scoped tokens, and audit every action. Built for A2A, human-in-the-loop, and fully autonomous agent workflows.

ONE ECOSYSTEM
MCP CLIENTS
ChatGPT
Claude
Cursor
A2A AGENTS
LangChain
CrewAI
Custom
HUMAN USERS
Browser
Mobile
CLI
EUROPEAN IDENTITY & ACCESS MANAGEMENT ECOSYSTEM
Identity Control Plane
Agent Registry
MCP Auth
Agent Auth
Consent Mgmt
Fine-Grained AuthZ
AI Flow Designer
Agent Lifecycle
Agentic Workflows
Vault
Certificate Mgmt
Sovereign Keys
EXTERNAL APIS
Salesforce
SAP
Slack
GitHub
Jira
Stripe
INTERNAL SYSTEMS
ERP
CRM
HR Systems
Databases
File Storage
ML Models
PLATFORM

The pluggable stack

Three products, one coherent platform – each independently deployable, all natively integrated.

IDENTITY CONTROL PLANE

  • Agent registration & lifecycle
  • MCP auth server (OAuth 2.1)
  • Consent management
  • Policy-based authorization
  • Human-in-the-Loop with CIBA
  • Multi-tenant group management

ORCHESTRATION ENGINE

  • Agent lifecycle automation
  • AI-assisted flow design
  • Agentic workflows
  • Real-time monitoring
  • Event-driven orchestration
  • Visual workflow builder

TRUST FOUNDATION

  • Vault
  • Certificate lifecycle
  • Secretless authentication
  • Encryption as a service
  • Sovereign key management
TRUST & COMPLIANCE

Built for European Sovereignty

EU data residency

All data processed and stored in the EU. Full GDPR compliance by design.

Regulatory ready

Built for GDPR, NIS2, and DORA – not retrofitted, architected from day one.

No US cloud lock-in

Sovereign infrastructure. No dependency on US hyperscalers for critical IAM.

European IAM Ecosystem

cidaas, cnips, and clavik form a complete European identity, integration, and security stack – built, hosted, and operated in the EU.

FAQs: AI agent identity

AI agent identity means giving autonomous agents – like LLM-based tools or workflow bots – a verifiable, managed identity just like a human user. This includes registration, authentication credentials, a sponsor (the human or system that delegated authority), and a full lifecycle including revocation.
cidaas acts as an OAuth 2.1 authorization server for AI agent protocols including MCP (Model Context Protocol) and A2A (Agent-to-Agent). Each agent authenticates with its identity, and cidaas issues scoped, time-limited tokens. No secrets leave the trust boundary.
Human identity is tied to a person with explicit consent flows. Agent identity adds a sponsor layer (the human or system that created the agent), bounded authority (the agent can only do what was explicitly delegated), and automated revocation, because agents can operate at machine speed without human oversight.
Yes. cidaas supports both the Model Context Protocol (MCP) and Agent-to-Agent (A2A) protocol. As an OAuth 2.1 authorization server, cidaas provides the authentication and consent layer that both protocols require — including PKCE, Dynamic Client Registration, Protected Resource Metadata, and DPoP. cidaas actively tracks and implements the emerging standards around agentic identity as they evolve. No proprietary lock-in.
Yes. cidaas is EU-sovereign, hosted entirely in Europe, and built on GDPR-compliant infrastructure. The consent management layer ensures agents only access data or perform actions with granular, revocable user consent – the same pattern used in PSD2 open banking.
Yes. cidaas supports instant revocation of agent tokens, consent grants, and certificates. A human approver can withdraw an agent’s authority at any time.
Scroll to Top