Forum Discussion
Critical identities in the Agent 365 era
From identity governance to execution control in the age of AI agents
As organizations accelerate AI adoption, a fundamental shift is taking place in enterprise security:
Identity is no longer just about access it is becoming the control plane.
What started with user identities evolved into application and workload identities.
Now, with AI agents entering the enterprise, we are entering a new phase:
Every actor human, application or AI agent must be governed through identity.
Why identity needs to evolve
AI agents are no longer passive tools. They:
- Access enterprise data
- Trigger workflows
- Interact across systems
- Act autonomously
This introduces a new reality:
Security is no longer about who can log in
It is about what is being executed, by which identity, in which context
Introducing critical identities
To address this, identity must evolve into a unified model:
Critical identities = Human + Non-human + Agent identities
- Human identities — Employees, partners
- Non-human identities (NHIs) — Workloads, APIs, service principals
- Agent identities — AI agents powered by Entra Agent ID
The next shift: a new identity plane
Beyond users and applications, we now have:
A third identity plane : Agent identities
This identity type:
- Operates in its own execution context
- Acts autonomously
- Requires continuous governance
Identity is no longer static
It becomes contextual, behavioral and execution-driven
The first principle: Converged identity is non-negotiable
You cannot secure AI without converged identity
This is not a priority.
This is a prerequisite.
Organizations must move from fragmented identity silos to:
One unified identity fabric across all actors
Where:
- Every identity is governed
- Every permission is controlled
- Every action is attributable
Converged identity becomes the foundation of the agentic enterprise
The next principle: AI SOC is no longer optional
Your SOC must operate at machine speed not human speed
This is not modernization.
This is survival in an AI-led environment.
In an AI-driven world:
- Events are continuous
- Signals increase exponentially
- Actions are autonomous
SOC must evolve to:
AI-powered, identity-aware and automation-driven operations
Without it:
- Threats outpace detection
- Agents execute unnoticed
- Security becomes reactive
AI SOC is not an enhancement it is the new operating model
The next principle: Data security becomes the first line of defense
Data not infrastructure is the primary risk surface
AI agents:
- Aggregate enterprise data
- Generate new outputs
- Share insights dynamically
Organizations must shift to:
Protecting data in interaction not just at rest
Without it:
- Sensitive data is exposed
- Agents amplify over-permissioned access
- Compliance breaks silently
AI without data security is exposure not innovation
The next principle: Agent 365 is the control plane for agents
Agents must be governed as identities, not treated as background components
Without governance:
❌ No visibility
❌ No ownership
❌ No lifecycle control
Agent 365 delivers:
- Agent Registry → complete visibility
- Entra Agent ID → identity foundation
- Policy enforcement → Conditional Access + least privilege
- Lifecycle governance → full control
- Observability → execution tracking
Without this:
Agents act without accountability
& Introducing Agent Inventory
One view across identity, execution and control
As AI scales, the challenge is no longer deployment:
It is visibility into how identities behave
Why Agent Inventory matters
Traditional IAM answers:
- Who has access
But now the real question is:
Which identity is executing what, in which context, under which policy?
What Agent Inventory surfaces
- Blueprints → Identity design layer
- Agent identities → Execution entities
- Agent users → Context (on-behalf-of)
- Orphan risk → Governance gaps
- Credential expiry → Identity hygiene
- Privilege gap analysis → Behavior vs access
- Registry gaps → Missing control plane coverage
- Action queue → Prioritized remediation
- Relationship graph → Identity + execution mapping
What’s fundamentally new
| Traditional IAM | Agentic IAM |
|---|---|
| Identity = access | Identity = execution control |
| Static roles | Context-aware permissions |
| Identity lists | Identity graphs |
| Periodic review | Continuous monitoring |
Bringing it all together
When you step back and connect these capabilities, a clear pattern emerges. Identity becomes the foundation that governs every actor human, workload and agent while AI-powered SOC ensures detection and response can operate at the speed of execution. Data security establishes the guardrails, protecting what truly matters as agents interact with enterprise information. On top of this, Agent 365 provides the control plane bringing visibility, governance, and lifecycle management to every AI agent in the environment. And finally, Agent Inventory completes the picture by making identity and execution observable, helping organizations understand not just what exists, but how it behaves. Together, these layers form a cohesive model one that enables organizations to move from fragmented security to a unified, identity-driven approach that is ready for the realities of the agentic enterprise.
We are entering a new paradigm:
- Humans define intent
- Applications execute logic
- Agents drive autonomous actions
And all of it is governed by identity.
So, You can’t govern agents without understanding their identity. You can’t secure identity without understanding execution.
Critical identities + Agent 365 + Agent Inventory establish the control plane for the agentic enterprise.