Curity Reinvents IAM: Runtime Authorization for AI Agents

0 comments

Beyond the Login: Why Traditional IAM Fails AI Agents—and the New Shift Toward Runtime Authorization

Enterprise developers in 2026 are currently racing to deploy a new breed of autonomous AI agents. The speed of adoption is breathtaking, but it has exposed a critical vulnerability: we are deploying these agents faster than we can secure them.

The crisis centers on a fundamental mismatch. Traditional Identity and Access Management (IAM) was built for humans and predictable machines. AI agents, however, operate in a realm of non-deterministic behavior and ephemeral needs, leaving a governance gap that is increasingly difficult to ignore.

While industry titans like Okta, Ping Identity, and Microsoft’s Entra ID are scrambling to evolve, a different philosophy is emerging from Sweden. Curity is arguing that the industry is trying to solve a new-world problem with old-world tools.

To bridge this gap, the company has launched Access Intelligence, a specialized extension of its Identity Server platform designed specifically for the volatility of agentic AI.

Did You Know? The rise of “shadow AI”—where employees deploy unauthorized agents to streamline workflows—has created a massive blind spot for corporate security teams, often referred to as the “invisible workforce.”

The Failure of Static Permissions

Most IAM systems operate on a simple premise: you prove who you are once, and you are granted a set of permissions. For a human employee, this works. For an AI agent executing a chain of a thousand actions per second, it is a liability.

If you lock an agent down too tightly, the autonomy that makes it valuable vanishes. If you give it broad permissions to ensure it “just works,” you create a security nightmare. The access is unpredictable, complex, and changes by the millisecond.

Curity’s solution is to treat agents not as users, but as a unique class of application. By leveraging “Token Intelligence,” the platform evolves the standard OAuth token. Instead of acting as a simple “key,” the token now carries the agent’s specific intent and purpose.

This shifts the security model from static permissions to runtime enforcement. Access is granted on-the-fly; each specific action requires a new token that describes exactly what is needed and why.

For high-stakes operations—such as moving significant corporate funds—the system can trigger a mandatory human-in-the-loop authorization, ensuring that autonomy never overrides accountability.

“Curity has always been application-centric,” explained Jacob Ideskog, Cofounder and CTO. “Our focus has always been on how we broker access.”

Navigating the Security Landscape

Currently, the industry is split. Some organizations rely on inline defenses like API gateways or Web Application Firewalls (WAFs). Others use out-of-band analysis to spot anomalies by comparing agent behavior against a baseline.

Access Intelligence takes a different route, operating as a self-hosted microservice. It acts as a rigorous validation layer that every single request must traverse.

As Ideskog puts it: “Because we let an agent do something now doesn’t mean we should be allowing it to do this a minute later.”

Are your current security protocols ready for an autonomous workforce? Or are you relying on a “perimeter” that no longer exists?

The Deep Dive: The Evolution of Non-Human Identity (NHI)

The challenge of AI agent security is part of a broader shift toward Non-Human Identity (NHI) management. As the ratio of machines to humans in the enterprise ecosystem grows, the traditional concept of “identity” is breaking.

In a world of agentic AI, identity is no longer a static attribute; it is a dynamic state. The industry is moving toward a “Zero Trust” architecture for AI, where no agent is trusted by default, regardless of its origin.

To truly secure these systems, enterprises should look toward the OWASP Top 10 for LLM Applications to understand the systemic risks of prompt injection and data leakage that can bypass traditional IAM.

Furthermore, adhering to the NIST Digital Identity Guidelines provides a baseline for ensuring that the authentication methods used for these agents are robust enough to withstand modern attack vectors.

Where do we draw the line between agent autonomy and human oversight? The answer likely lies in a layered defense strategy. No single tool—whether it be a PAM provider or a runtime authorization service—can solve the problem in isolation.

The emergence of runtime authorization is a promising signal. It shows that the industry is finally acknowledging that AI agents are not just “fast users,” but a fundamentally different type of entity.

However, the gap remains wide. While IAM vendors are evolving, Privilege Access Management (PAM) providers are still struggling to provide concrete answers for the agentic era.

For further technical context on this shift, you can explore the original reporting on CSOonline.

Pro Tip: When deploying AI agents, implement a “least-privilege” runtime policy. Start with zero permissions and use a logging phase to identify the exact API calls the agent needs before codifying its runtime tokens.

Frequently Asked Questions

What is AI agent security and why is it necessary?
AI agent security refers to the framework of protocols and tools used to manage the identities and permissions of autonomous AI agents. It is necessary because traditional IAM tools cannot handle the non-deterministic and ephemeral nature of agentic AI.

How does runtime authorization improve AI agent security?
Runtime authorization grants permissions on-the-fly based on the agent’s current task and intent, rather than relying on static, pre-granted permissions that could be exploited.

What are ‘shadow agents’ in the context of AI agent security?
Shadow agents are undocumented AI agents created by developers or employees using powerful new tools without the knowledge or oversight of corporate IT and security teams.

Can traditional IAM tools provide adequate AI agent security?
Generally, no. Traditional Identity and Access Management (IAM) is designed for human users or static machine identities, failing to account for the complex, long chains of action performed by autonomous agents.

What is the role of Token Intelligence in AI agent security?
Token Intelligence allows OAuth tokens to carry specific data about an agent’s purpose and intent, ensuring they can only access resources required for their immediate, authorized task.

Join the Conversation: Is your organization already deploying autonomous agents, or is the security risk keeping you on the sidelines? Share your experiences in the comments below and share this article with your security team to start the discussion.


Discover more from Archyworldys

Subscribe to get the latest posts sent to your email.

You may also like