You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/introduction-entra-agent-id/includes/2-describe-agent-id-compare-identities.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,10 +63,10 @@ Managed identities are another type of identity used for Azure resources:
63
63
64
64
Agent identities provide specific security benefits designed for AI agents:
65
65
66
-
1.**Distinguish AI operations**: Operations performed by AI agents are clearly separated from operations performed by workforce, customer, or traditional workload identities in audit logs and monitoring
67
-
2.**Right-sized access**: Enable AI agents to gain appropriate access across systems without excessive permissions
68
-
3.**Prevent excessive privilege**: Block agents from accessing critical security roles and systems
69
-
4.**Scale identity management**: Support large numbers of AI agents that can be quickly created and destroyed without leaving orphaned credentials
66
+
-**Distinguish AI operations**: Operations performed by AI agents are clearly separated from operations performed by workforce, customer, or traditional workload identities in audit logs and monitoring
67
+
-**Right-sized access**: Enable AI agents to gain appropriate access across systems without excessive permissions
68
+
-**Prevent excessive privilege**: Block agents from accessing critical security roles and systems
69
+
-**Scale identity management**: Support large numbers of AI agents that can be quickly created and destroyed without leaving orphaned credentials
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/introduction-entra-agent-id/includes/3-identify-products-use-agent-identities.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,8 +44,8 @@ Agents in Microsoft Foundry access remote resources and tools by using agent ide
44
44
> When you publish an agent, you must reassign RBAC permissions to the new agent identity for any resources that the agent needs to access. Permissions assigned to the shared identity don't automatically transfer.
45
45
46
46
Currently, the tools that support authentication with agent identity are:
47
-
1.**Model Context Protocol (MCP)**: Use your agent's identity to authenticate with MCP servers that support agent identity authentication
48
-
2.**Agent-to-Agent (A2A)**: Enable secure communication between agents using agent identities
47
+
-**Model Context Protocol (MCP)**: Use your agent's identity to authenticate with MCP servers that support agent identity authentication
48
+
-**Agent-to-Agent (A2A)**: Enable secure communication between agents using agent identities
49
49
50
50
## Azure App Service and Azure Functions
51
51
@@ -123,8 +123,8 @@ Key features:
123
123
124
124
When planning your agent deployments, consider:
125
125
126
-
1.**Which platforms will you use?** Determine which Microsoft products host your agents
127
-
2.**Identity governance requirements**: Understand how agent identities are created, managed, and governed
128
-
3.**Permission management**: Plan how permissions are assigned, especially when publishing agents or moving them between environments
129
-
4.**Audit and monitoring**: Ensure you have processes to monitor agent identity activity in the Microsoft Entra admin center
130
-
5.**Lifecycle management**: Plan for how agent identities are created and deleted as agents are deployed and retired
126
+
-**Which platforms will you use?** Determine which Microsoft products host your agents
127
+
-**Identity governance requirements**: Understand how agent identities are created, managed, and governed
128
+
-**Permission management**: Plan how permissions are assigned, especially when publishing agents or moving them between environments
129
+
-**Audit and monitoring**: Ensure you have processes to monitor agent identity activity in the Microsoft Entra admin center
130
+
-**Lifecycle management**: Plan for how agent identities are created and deleted as agents are deployed and retired
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/introduction-entra-agent-id/includes/5-understand-access-permissions.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@ Managing agent identities requires specific Microsoft Entra roles and understand
2
2
3
3
## Required roles for managing agent identities
4
4
5
-
There are several different types of roles that can perform operations on agent identies, from viewing to managing.
5
+
There are several different types of roles that can perform operations on agent identities, from viewing to managing.
6
6
7
7
### Roles for viewing agent identities
8
8
@@ -13,11 +13,11 @@ To view agent identities in the Microsoft Entra admin center:
13
13
14
14
To manage agent identities (create, update, disable, delete), you need one of the following roles:
15
15
16
-
1.**Agent ID Administrator**: Full permissions to manage agent identities, agent identity blueprints, and related configurations. Use the role for agent identity management (recommended).
16
+
-**Agent ID Administrator**: Full permissions to manage agent identities, agent identity blueprints, and related configurations. Use the role for agent identity management (recommended).
17
17
18
-
2.**Cloud Application Administrator**: Can manage enterprise applications and agent identities. This role has broader application management permissions beyond just agent identities.
18
+
-**Cloud Application Administrator**: Can manage enterprise applications and agent identities. This role has broader application management permissions beyond just agent identities.
19
19
20
-
3.**Owner of the agent identity**: If you're designated as an owner of a specific agent identity, you can manage that agent identity without holding a tenant-wide administrator role.
20
+
-**Owner of the agent identity**: If you're designated as an owner of a specific agent identity, you can manage that agent identity without holding a tenant-wide administrator role.
21
21
22
22
### Roles for creating agent identity blueprints
23
23
@@ -77,9 +77,9 @@ A critical scenario for permission management occurs when publishing agents in p
77
77
78
78
When you publish an agent:
79
79
80
-
1.**RBAC permissions don't transfer**: Permissions assigned to the shared project identity don't automatically transfer to the new distinct identity
81
-
2.**You must reassign permissions**: Navigate to each Azure resource the agent accesses and assign the required RBAC role to the new agent identity
82
-
3.**Verify access**: Test that the published agent can still access all required resources
80
+
-**RBAC permissions don't transfer**: Permissions assigned to the shared project identity don't automatically transfer to the new distinct identity
81
+
-**You must reassign permissions**: Navigate to each Azure resource the agent accesses and assign the required RBAC role to the new agent identity
82
+
-**Verify access**: Test that the published agent can still access all required resources
83
83
84
84
### Example: Publishing a Microsoft Foundry agent
85
85
@@ -103,7 +103,8 @@ Agent identities can be assigned Azure RBAC roles just like service principals:
103
103
5.**Search for the agent identity** by its name or object ID
104
104
6.**Assign the role**
105
105
106
-
Note: You need the object ID of the agent identity for role assignments.
106
+
> [!Note]
107
+
> You need the object ID of the agent identity for role assignments.
0 commit comments