Skip to content

Commit 253d342

Browse files
committed
fix for acronlinx
1 parent f665207 commit 253d342

2 files changed

Lines changed: 6 additions & 6 deletions

File tree

learn-pr/wwl-sci/design-solutions-identity-access-management/3a-design-solution-agent-identities.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.wwl.design-solutions-identity-access-management.design-solution-agent
33
title: Design a solution for agent identities using Microsoft Entra Agent ID
44
metadata:
55
title: Design a solution for agent identities using Microsoft Entra Agent ID
6-
description: "Design an agent identity solution using Microsoft Entra Agent ID, including agent identity architecture, governance, identity protection, network controls, and security design considerations for AI agents."
6+
description: "Design an agent identity solution using Microsoft Entra Agent ID."
77
ms.date: 03/03/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/design-solutions-identity-access-management/includes/3a-design-solution-agent-identities.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,11 @@ When designing an agent identity solution, your architecture must mitigate sever
4040

4141
AI agents expand the organizational attack surface in ways that require specific design responses:
4242

43-
- **External accessibility**Agents interacting with external systems or the public internet create pathways for adversaries to compromise agents and pivot into organizational resources.
44-
- **Permission escalation risk**Agents are frequently provisioned with permissions broader than necessary, violating least privilege.
45-
- **Autonomous decision-making**Compromised agents with purchasing authority or administrative privileges can take harmful actions at machine speed.
46-
- **Prompt injection**Malicious instructions inserted into data processed by the agent can manipulate agent behavior—an attack vector unique to AI.
47-
- **Agent-to-agent propagation**A compromised orchestration agent can target other agents through A2A flows, propagating compromise across agent ecosystems.
43+
- **External accessibility**Agents interacting with external systems or the public internet create pathways for adversaries to compromise agents and pivot into organizational resources.
44+
- **Permission escalation risk**Agents are frequently provisioned with permissions broader than necessary, violating least privilege.
45+
- **Autonomous decision-making**Compromised agents with purchasing authority or administrative privileges can take harmful actions at machine speed.
46+
- **Prompt injection**Malicious instructions inserted into data processed by the agent can manipulate agent behavior—an attack vector unique to AI.
47+
- **Agent-to-agent propagation**A compromised orchestration agent can target other agents through A2A flows, propagating compromise across agent ecosystems.
4848

4949
### Agent sprawl
5050

0 commit comments

Comments
 (0)