Skip to content

Commit 0162913

Browse files
authored
Merge pull request #53730 from ceperezb/CEPEREZB-sc100-design-identity-solutions
create new unit on entra agent ID
2 parents 173d776 + 253d342 commit 0162913

5 files changed

Lines changed: 148 additions & 10 deletions

File tree

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.design-solutions-identity-access-management.design-solution-agent-identities
3+
title: Design a solution for agent identities using Microsoft Entra Agent ID
4+
metadata:
5+
title: Design a solution for agent identities using Microsoft Entra Agent ID
6+
description: "Design an agent identity solution using Microsoft Entra Agent ID."
7+
ms.date: 03/03/2026
8+
author: ceperezb
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
ai-usage: ai-generated
12+
durationInMinutes: 12
13+
content: |
14+
[!include[](includes/3a-design-solution-agent-identities.md)]
Lines changed: 122 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,122 @@
1+
As organizations adopt AI agents—software systems that perceive their environment, make decisions, and take actions—a new category of identity emerges that doesn't fit neatly into existing human or workload identity models. As a security architect, you need to design an identity strategy that accounts for this new identity type and the unique security, governance, and compliance challenges it introduces.
2+
3+
Microsoft Entra Agent ID extends the security capabilities of Microsoft Entra to AI agents, enabling organizations to discover, govern, and protect agent identities using the same Zero Trust framework applied to human users and workload identities.
4+
5+
## Why agent identities require dedicated design
6+
7+
Traditional identity models address human users (interactive authentication, predictable schedules) and workload identities (programmatic authentication, static behavior). AI agents don't fit either category. Like users, some agents need access to collaborative resources—documents, team channels, and mailboxes. Like workload identities, agents authenticate programmatically at machine speed. Unlike either, agents make autonomous decisions, adapt dynamically, interact with other agents, and face AI-specific attack vectors such as prompt injection.
8+
9+
Treating agents as workload identities leaves governance gaps (no sponsor accountability, no lifecycle management), while treating them as human users creates authentication friction and misaligned security signals. Microsoft Entra Agent ID addresses this gap by establishing agent identities as a distinct, first-class identity type.
10+
11+
## Types of AI agents
12+
13+
Your agent identity solution must account for three agent types, each with distinct security implications:
14+
15+
**Assistive agents** perform specific tasks when initiated by a user, operating within the requesting user's delegated permissions. Security risk centers on ensuring the agent doesn't exceed its delegated scope.
16+
17+
**Autonomous agents** operate independently with their own identities, making decisions without human intervention. These present the highest intrinsic risk—a compromised autonomous agent can operate at machine speed without oversight.
18+
19+
**Agent users** function with human user characteristics: persistent identities, mailbox access, team membership, and meeting participation. A compromised agent user could act as a trusted team member, accessing documents and sending communications under assumed legitimacy.
20+
21+
## Agent identity architecture
22+
23+
Microsoft Entra Agent ID introduces purpose-built identity constructs that form a hierarchy designed for management at scale.
24+
25+
| Object | Purpose |
26+
|---|---|
27+
| **Agent identity blueprint** | A logical definition of an agent type, represented as an application registration and service principal. Blueprints can't access resources directly—they serve as templates that define inheritable OAuth 2.0 delegated permissions for child agent identities. |
28+
| **Agent identity blueprint principal** | The service principal representation of the blueprint in a tenant. For multitenant agents, a blueprint principal can be provisioned in a resource tenant, enabling agent identity creation across tenant boundaries. |
29+
| **Agent identity** | An instantiated identity that performs token acquisitions and accesses resources. Parented by a blueprint and inherits permissions from it. |
30+
| **Agent user** | A nonhuman user identity for scenarios requiring a user account—mailbox access, Teams membership, or collaborative workflows. |
31+
| **Agent resource** | An agent blueprint or agent identity acting as the target of another agent's access request in agent-to-agent (A2A) flows. The agent resource validates the incoming token and controls access to its capabilities. |
32+
33+
This hierarchy is architecturally significant: policies applied to a blueprint automatically cascade to all child agent identities, enabling management of related agent families through a single policy assignment. The platform uses OAuth 2.0 and OpenID Connect (OIDC) standards, so existing token validation, consent, and authorization infrastructure applies.
34+
35+
## Agent security challenges that drive design decisions
36+
37+
When designing an agent identity solution, your architecture must mitigate several categories of risk that differentiate agents from other identity types.
38+
39+
### Increased attack surface
40+
41+
AI agents expand the organizational attack surface in ways that require specific design responses:
42+
43+
- **External accessibility**—Agents interacting with external systems or the public internet create pathways for adversaries to compromise agents and pivot into organizational resources.
44+
- **Permission escalation risk**—Agents are frequently provisioned with permissions broader than necessary, violating least privilege.
45+
- **Autonomous decision-making**—Compromised agents with purchasing authority or administrative privileges can take harmful actions at machine speed.
46+
- **Prompt injection**—Malicious instructions inserted into data processed by the agent can manipulate agent behavior—an attack vector unique to AI.
47+
- **Agent-to-agent propagation**—A compromised orchestration agent can target other agents through A2A flows, propagating compromise across agent ecosystems.
48+
49+
### Agent sprawl
50+
51+
Agent proliferation creates a governance challenge termed "agent sprawl"—the uncontrolled expansion of agents across an organization without adequate visibility, management, or lifecycle controls. Agent sprawl emerges when business units create agents independently (shadow AI), agents created for temporary purposes remain in production indefinitely, permissions accumulate without review, and ownership accountability is lost. The consequences include degraded security posture, compliance risk, operational inefficiency, data exposure, and impaired incident response.
52+
53+
Your agent identity design must address sprawl proactively by requiring every agent to have a registered identity, an assigned sponsor, and a governed lifecycle.
54+
55+
## Design an agent identity governance strategy
56+
57+
Microsoft Entra ID Governance extends to agent identities, enabling you to apply the same lifecycle and access management controls used for human identities. Your governance design should address three areas: lifecycle management, access assignment, and sponsor accountability.
58+
59+
### Lifecycle management
60+
61+
Agent identities start with limited permissions—only OAuth 2.0 delegated scopes inherited from their parent blueprint. Additional access must be explicitly requested, approved, and assigned through governed processes.
62+
63+
### Access assignment through entitlement management
64+
65+
Entitlement management access packages assign agent identities access to security group memberships, application OAuth API permissions (including Microsoft Graph application permissions), and Microsoft Entra roles. Access can be requested by the agent identity itself (programmatically), the agent's sponsor, or an administrator.
66+
67+
Access packages support expiration policies, ensuring agent access is time-bound. As expiration approaches, sponsors receive notifications and must either request an extension (triggering a new approval cycle) or allow access to expire.
68+
69+
### Sponsor accountability
70+
71+
Every agent identity should have a designated human sponsor accountable for its lifecycle and access decisions. If a sponsor leaves the organization, sponsorship automatically transfers to their manager. Lifecycle Workflows notify cosponsors and managers about impending sponsorship changes, maintaining an unbroken chain of human oversight.
72+
73+
## Design for agent identity protection
74+
75+
Microsoft Entra ID Protection extends risk detection and response to agent identities. Because agents can operate autonomously and at scale, anomalous behavior requires automated detection and response rather than relying on manual review.
76+
77+
ID Protection for agents establishes a behavioral baseline for each agent and then monitors for deviations. Activities that contribute to an agent being flagged as risky include:
78+
79+
| Risk detection | Meaning |
80+
|---|---|
81+
| **Unfamiliar resource access** | Agent targeted resources outside its normal pattern—possible lateral movement. |
82+
| **Sign-in spike** | Abnormally high sign-in frequency—possible automated tooling or attack activity. |
83+
| **Failed access attempt** | Agent attempted unauthorized resource access—possible token replay. |
84+
| **Sign-in by risky user** | Agent signed in on behalf of a risky user during delegated authentication—possible credential exploitation. |
85+
| **Confirmed compromised** | Administrator confirmed compromise through manual investigation. |
86+
| **Microsoft Entra threat intelligence** | Microsoft threat intelligence identified activity consistent with known attack patterns. |
87+
88+
These risk signals feed into Conditional Access for agents (covered in the next unit), enabling risk-based policies that automatically block high-risk agents from accessing resources. Your design should combine agent risk detection with Conditional Access enforcement as a layered defense.
89+
90+
## Design network-level controls for agents
91+
92+
Microsoft Entra Global Secure Access extends network security controls to agent traffic. For agents built on platforms such as Microsoft Copilot Studio, you can forward agent traffic to Global Secure Access's proxy service, applying the same network policies used for users. Capabilities include logging agent network activity, applying web categorization to control API and MCP server access, restricting file transfers by type, blocking malicious destinations via threat intelligence, and detecting prompt injection attacks.
93+
94+
Network controls complement identity-layer protections: Conditional Access governs token acquisition, while network controls govern traffic paths and content once authorized—providing defense in depth.
95+
96+
## Agent registry and discovery
97+
98+
The agent registry in the Microsoft Entra admin center provides centralized visibility into all agent identities, their metadata (purpose, capabilities, protocols), owners, and sponsors. It supports agent-to-agent discovery and authorization based on standard protocols including MCP (Model Context Protocol) and A2A (Agent-to-Agent). The registry is your primary mechanism for addressing agent sprawl—requiring registration establishes organizational visibility and ensures every agent can be inventoried, audited, and governed.
99+
100+
## Integration across Microsoft platforms
101+
102+
Microsoft Entra Agent ID integrates with multiple platforms that create and manage agents, providing consistent identity management regardless of where agents originate:
103+
104+
- **Microsoft Foundry** automatically provisions blueprints and agent identities throughout the agent lifecycle.
105+
- **Microsoft Copilot Studio** agents can automatically receive agent identities when enabled in a Power Platform environment.
106+
- **Azure App Service and Azure Functions** can use the agent identity platform to connect to resources as agents.
107+
- **Microsoft Teams** agent identity blueprints can be managed in the Developer Portal for Teams.
108+
109+
This cross-platform integration means Microsoft Entra Agent ID provides the unified identity layer regardless of where agents originate.
110+
111+
## Design considerations for security architects
112+
113+
When designing an agent identity solution:
114+
115+
- **Establish agent identities as a distinct identity class.** Don't repurpose human user accounts or standard service principals for agents. Use the purpose-built agent identity constructs to ensure proper governance, risk detection, and policy coverage.
116+
- **Require blueprint-level organization.** Group related agents under shared blueprints to simplify policy assignment and permission inheritance. This reduces operational overhead as agent populations grow.
117+
- **Mandate sponsor assignment for every agent.** Unsponsored agents are ungoverned agents. Design your processes to prevent agent identity creation without a designated human sponsor.
118+
- **Apply least-privilege access by default.** Agent identities inherit only delegated permissions from their blueprint at creation. Design access assignment workflows through entitlement management access packages with approval, expiration, and review controls.
119+
- **Layer identity and network controls.** Combine Conditional Access for agent risk with Global Secure Access network policies for defense in depth. Identity controls govern token acquisition; network controls govern traffic and content.
120+
- **Plan for multitenant agents.** If your organization uses or builds agents that operate across tenants, design for blueprint principals in resource tenants, similar to multitenant application service principals.
121+
- **Address agent sprawl from the start.** Require agent registration in the centralized registry, enforce lifecycle management through ID Governance, and schedule regular access reviews for agent identities—just as you would for human users.
122+
- **Integrate agent identity monitoring into security operations.** Agent risk detections, sign-in logs, and network activity logs should flow into your SIEM (such as Microsoft Sentinel) for correlation with broader threat detection workflows.

learn-pr/wwl-sci/design-solutions-identity-access-management/includes/4a-conditional-access-agent-id.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,19 @@
1-
As AI agents become more prevalent in enterprise environments, they introduce identity and access management challenges that traditional controls weren't designed to address. Conditional Access for Agent ID is a capability in Microsoft Entra ID that extends Conditional Access evaluation and enforcement to AI agents. It treats agents as first-class identities and evaluates their access requests using agent-specific logic, applying the same Zero Trust controls that protect human users and workload identities.
1+
The previous unit introduced agent identities as a distinct identity class with purpose-built constructs for lifecycle management, governance, and risk detection. Conditional Access for Agent ID builds on that foundation by extending Conditional Access evaluation and enforcement to AI agents—evaluating their access requests using agent-specific logic.
22

3-
As a security architect, you need to understand how agent identities differ from human and workload identities, when Conditional Access applies to agent flows, and how to design policies that govern agent access without creating coverage gaps.
3+
As a security architect, you need to understand when Conditional Access applies to agent flows and how to design policies that govern agent access without creating coverage gaps.
44

5-
## Agent identity architecture in Microsoft Entra
5+
## Agent identity constructs relevant to Conditional Access
66

7-
8-
Microsoft Entra Agent ID introduces first-class identity constructs specifically for agents. These constructs are modeled as applications (agent identities) and users (agent users), separate from existing human user and workload identity models.
7+
The previous unit introduced the agent identity hierarchy. The following table recaps each construct with its relevance to Conditional Access policy design:
98

109
| Term | Description |
1110
|---|---|
12-
| **Agent blueprint** | A logical definition of an agent type, represented by a service principal in the tenant. Blueprints can't independently access resources—they exist only to create agent identities and agent users. |
13-
| **Agent identity** | An instantiated agent identity that performs token acquisitions to access resources. This is the identity that performs agentic tasks. |
14-
| **Agent user** | A nonhuman user identity used for agent experiences that require a user account. Performs token acquisitions to access resources. |
15-
| **Agent resource** | An agent blueprint or agent identity acting as the resource application, for example in agent-to-agent (A2A) flows. |
11+
| **Agent blueprint** | A logical definition of an agent type, represented by a service principal in the tenant. Blueprints can't independently access resources—they exist to create agent identities and agent users. Policies targeting a blueprint automatically cover all child agent identities. |
12+
| **Agent identity** | An instantiated identity that performs token acquisitions and accesses resources. This is the identity evaluated by Conditional Access during resource access flows. |
13+
| **Agent user** | A nonhuman user identity for scenarios requiring a user account—mailbox access, Teams membership, or collaborative workflows. Evaluated by Conditional Access separately from agent identities. |
14+
| **Agent resource** | An agent blueprint or agent identity acting as the target of another agent's access request in agent-to-agent (A2A) flows. |
1615

17-
Understanding this hierarchy matters for policy design. For example, policies targeting an agent blueprint automatically cover the agent identities parented by that blueprint, allowing you to manage groups of related agents through a single policy assignment.
16+
When an agent accesses another agent as a resource, both the actor and the target are evaluated by Conditional Access. Blueprint-level scoping is the recommended approach for managing related agent families, since policies cascade to all child agent identities.
1817

1918
## When Conditional Access applies to agents
2019

learn-pr/wwl-sci/design-solutions-identity-access-management/includes/9-summary.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ You learned how to:
55
- Design access strategies for SaaS, PaaS, IaaS, hybrid, and multicloud resources using identity, networking, and application controls
66
- Design a solution for Microsoft Entra ID, including hybrid and multicloud environments
77
- Design a solution for external identities, including B2B collaboration and customer identity
8+
- Design a solution for agent identities using Microsoft Entra Agent ID
89
- Design modern authentication and authorization strategies
910
- Validate Conditional Access alignment with Zero Trust
1011
- Specify requirements for securing Active Directory Domain Services

learn-pr/wwl-sci/design-solutions-identity-access-management/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ abstract: |
1717
- Design access strategies for SaaS, PaaS, IaaS, hybrid, and multicloud resources using identity, networking, and application controls
1818
- Design a solution for Microsoft Entra ID, including hybrid and multicloud environments
1919
- Design a solution for external identities, including B2B collaboration and customer identity
20+
- Design a solution for agent identities using Microsoft Entra Agent ID
2021
- Design modern authentication and authorization strategies
2122
- Validate Conditional Access alignment with Zero Trust
2223
- Specify requirements for securing Active Directory Domain Services
@@ -48,6 +49,7 @@ units:
4849
- learn.wwl.design-solutions-identity-access-management.design-solution-entra-hybrid-multicloud
4950
- learn.wwl.design-solutions-identity-access-management.design-solution-external-identities
5051
- learn.wwl.design-solutions-identity-access-management.design-modern-authentication-authorization-strategies
52+
- learn.wwl.design-solutions-identity-access-management.design-solution-agent-identities
5153
- learn.wwl.design-solutions-identity-access-management.conditional-access-agent-id
5254
- learn.wwl.design-solutions-identity-access-management.align-conditional-access-zero-trust
5355
- learn.wwl.design-solutions-identity-access-management.specify-requirements-secure-active-directory-domain-services

0 commit comments

Comments
 (0)