Zero-Trust Agents: Adding Identity and Access to Multi-Agent Workflows
Thia details how zero-trust security and identity management can empower secure, autonomous AI agents by utilizing Azure OpenAI, AutoGen, and WSO2 Asgardeo.
Overview
In this article, Thia presents a working reference architecture for introducing zero-trust security to autonomous, agent-driven AI workflows. The focus is a hotel booking scenario showcasing how each AI agent receives its own digital identity and access token, thus enabling secure, auditable operations.
Key Concepts and Contributions
- Zero-Trust for AI Agents: The approach enforces continuous authentication and authorization for every agent action, eliminating implicit trust within agentic workflows.
- Identity & Access Integration: WSO2 Asgardeo serves as the identity and access management engine, issuing OAuth2 tokens for agents, while Microsoft’s Azure OpenAI Service (via Azure AI Foundry) powers natural language capabilities and intelligence.
- Security Architecture: A specially designed SecureFunctionTool intercepts sensitive agent actions in the workflow, validating access privileges and ensuring all API calls are properly authorized—a true zero-trust design.
How the System Works
- Architecture Components:
- AutoGen orchestrates multiple AI agents and tools.
- Hotel Booking Agent handles booking tasks, calling external resources securely.
- WSO2 Asgardeo acts as the OAuth2 authorization server, issuing identity tokens.
- SecureFunctionTool demands a valid token for sensitive operations before execution.
- Azure OpenAI Service (GPT-4o) provides intelligence and reasoning for agents while safeguarding enterprise data privacy.
- Code Flow:
- Agents authenticate and obtain tokens for protected actions.
- SecureFunctionTool validates token authenticity, ensuring proper claims and permissions via local checks or introspection endpoints.
- Every action is logged for accountability and auditability, ensuring all agent activities are traceable to specific credentials.
Alignment with Microsoft Entra Agent ID
- The design is closely aligned with Microsoft’s Entra Agent ID initiative, which will natively provide unique Azure directory identities to AI agents for robust security, governance, and audit. The solution remains standards-based and adaptable regardless of the underlying identity provider.
- Future scenarios include federating Asgardeo and Entra Agent ID and employing Microsoft security monitoring tools for advanced anomaly detection.
Practical Advice
- The open-source pattern is reusable for architects and developers keen on secure, multi-agent AI systems.
- OAuth2 and open standards underpin the design, allowing integration with identity providers of choice.
- The approach future-proofs solutions as agentic identity features mature in platforms like Microsoft Entra.
Conclusion
The article emphasizes the necessity of identity and zero-trust controls as AI agents gain autonomy. By leveraging proven IAM and AI services, organizations can realize secure, governable, and scalable AI-driven automation while maintaining complete oversight and auditability.
References and Further Reading:
- Zero Trust Architecture
- Microsoft Extends Zero Trust to Agentic Workforce
- Azure Agentic AI Patterns
- WSO2 Identity Server
- WSO2 Hotel Booking Sample Code
- Entra Agent ID Announcement
This post appeared first on “Microsoft Tech Community”. Read the entire article here