Autonomous agents are already creating tickets, running playbooks, and invoking cloud and SaaS APIs across multiple teams and tenants. One leaked key, copied secret, or prompt‑injected tool call can turn “helpful automation” into high blast radius change, while credential sprawl makes it hard to answer questions such as, which agent did what, under whose authority, and can we revoke it now?
This session shows an agent‑first access pattern that replaces standing secrets with intent scoped, just in time authorization. We’ll walk through reference flows for onboarding and identity attestation, issuing short‑lived permissions bound to the executing runtime (sender constrained / proof‑of‑possession), and granting access only for the declared intent or task. We’ll also cover continuous access evaluation using runtime telemetry and shared risk signals, plus practical patterns for delegation, revocation, and audit when agents can call tools and trigger side effects.
Attendees will leave with an architecture blueprint, a threat model, and an implementation checklist mapped to open standards (OAuth/OIDC, and Verifiable Credentials) for multi‑cloud and cross‑domain adoption.