
Governance & Danger Administration
,
Id & Entry Administration
,
Multi-factor & Danger-based Authentication
As Agentic AI Takes Over Workflows, Conventional Authentication Practices Fall Brief

The explosion of agentic synthetic methods and autonomous bots to orchestrate cross-system duties is popping multifactor authentication right into a brittle protection. Non-human identities typically bypass human-centric safety controls, working with static credentials and undefined possession, creating exploitable identification dangers.
See Additionally: Id and Entry Administration (IAM) Market Information 2025
Safety frameworks could have developed to acknowledge non-human brokers, however conventional entry instruments have fallen behind. Consultants warn that persevering with to depend on MFA as a common repair undermines even the strongest zero belief methods.
Conventional MFAs are designed round human behaviors and hinge on one thing you already know, one thing you might have or one thing you’re. “Bots function with out an interface,” stated Reuben Athaide, international head of cybersecurity evaluation and testing with Commonplace Chartered in Singapore. “They execute duties programmatically, with no human within the loop to faucet approve on a push notification.”
Actually, service accounts typically bypass MFA altogether, as an alternative counting on static, long-lived credentials. These credentials persist quietly in infrastructure and are sometimes undocumented. Over time, it turns into a threat that enterprises are sometimes afraid to repair.
Rajdeep Ghosh, chief expertise officer with pharmaceutical firm Dr Reddy’s Laboratories, stated the issue arises due to the best way organizations deal with the bots. “We deal with bots as technical artifacts, not identities. That mindset results in static credentials and implicit belief harmful in right now’s zero belief world.”
Governance challenges of non-human identities transcend authentication. Non-human identities, not like their human counterparts, don’t depart when a challenge ends or an worker quits. With out lifecycle insurance policies resembling expiry, possession or de-provisioning, bots can persist indefinitely, typically with elevated privileges.
“Privilege creep is actual,” Ghosh stated. For instance, “a bot initially created to course of invoices may finally achieve database learn entry or buyer PII permissions with out formal overview.” In extremely regulated sectors together with healthcare and finance, an orphaned bot poses not only a safety issues however a compliance nightmare.
“With out tagging, attestation, or metadata enforcement, they turn out to be invisible assault vectors,” Athaide stated.
The answer? Deal with bots like first-class residents. Each service account should have an proprietor, a function and an outlined scope. Entry must be role- or attribute-based, by no means static. De-provisioning must be tied to occasions resembling challenge closure or lack of exercise. And all of this, consultants stated, should be codified by infrastructure-as-code and automatic pipelines.
Relatively than retrofitting human-centric MFA into machine workflows, the business ought to transfer towards automation-native options, Athaide stated. “This consists of machine-native identification fashions, the place authentication is constructed round workload context, cryptographic belief and runtime indicators – and never push notifications or OTPs,” he stated.
Shakeel Khan, regional vp and nation supervisor at Okta India, stated AI brokers are more and more connecting throughout functions, automating duties and accessing delicate enterprise knowledge. “We’d like centralized identification layers that implement short-lived, context-aware entry tokens ruled by enterprise insurance policies,” he stated. This imaginative and prescient is being realized by options resembling Cross App Entry and Auth for GenAI, which allow agent-to-agent authentication throughout providers resembling Gmail and Slack.
Approaches together with workload identification federation seen in fashions resembling AWS IAM Roles Wherever or Azure Managed Id, anchor identification to runtime context relatively than static credentials. Complementary applied sciences resembling mutual TLS, SPIFFE and dynamic secret rotation guarantee safe authentication with out human intervention. “Frictionless doesn’t suggest insecure,” Athaide stated. “The objective is to shift from interactive friction to automated, policy-bound belief.”
Consultants additionally guess on habits analytics and identification risk detection, repeatedly evaluating whether or not a bot’s exercise aligns with anticipated patterns.
Dev Wijewardane, discipline CTO at WSO2, warned that the struggle just isn’t solely about human vs. bots but additionally about good bots vs. unhealthy bots and regular bot habits vs. anomalous bot habits.
“For shared bots, it is important to make sure function isolation is maintained and a bot performing for Division A is not by chance or maliciously performing actions for Division B,” Wijewardane stated. Sustaining strict function isolation is crucial together with having distinctive identifiers per bot occasion, strict credential rotation and logging each motion, he stated.
Trying Forward: Multi-Assertion Authentication
Consultants say multi-assertion authentication – granting belief by cryptographic attestation, behavioral analytics and real-time coverage selections – is the long run for managing non-human identities. Beneath this strategy, bots must show each time that they deserve the entry they’ve.
As enterprises scale AI and automation, clinging to human-centric identification fashions will solely deepen threat publicity. The longer term lies in zero belief frameworks the place bots are handled not as artifacts, however as ruled identities, Wijewardane stated.
“Bots should be ruled like privileged human identities with full audit trails, automated de-provisioning and granular entry controls,” Khan stated.