Securing Digital Assistants
Secure your organization’s AI-driven digital assistants by treating them as first-class identities, distinct from the humans they act on behalf of, and enforcing least-privilege access at runtime.
AI agents are serving both consumers and employees (for example, as chatbots on retail websites helping users navigate products, and as workforce assistants managing employee calendars and drafting emails). Securing these assistants means verifying not just what the agent is doing, but whose identity and permissions it’s exercising at any given moment. Runtime identity distinguishes the agent from the human while ensuring the agent has explicit authority to act on the user’s behalf.
Key Concepts
- Explicit agent identity
-
Register every digital assistant as a unique identity with its own credentials and lifecycle. This enables centralized management of your agents, their owners, and their resource permissions from a single console across your customer and workforce use cases.
- Delegation, not impersonation
-
Using OAuth 2.0 token exchange, agents swap a user’s token for a delegation token that has an
act(actor) claim, explicitly identifying both the user and the agent. The actor claim provides a clear audit trail of which agent took what action, enabling enforcement decisions at runtime based on both the user and the agent. The agent never sees the user’s credentials. - Least-privilege permissions
-
The delegation token is short-lived and might require additional token exchanges as the agent performs new actions or accesses different resources. Audience restriction ensures the token is only valid at a specific resource server, preventing acceptance of unauthorized tokens.
- Runtime Enforcement
-
The agent gateway acts as a security proxy, validating tokens and enforcing fine-grained policies before an agent can reach backend resources such as APIs or Model Context Protocol (MCP) servers. The gateway provides a consistent security layer for AI developers building on MCP or traditional REST architectures.
How this works
As an example scenario, consider a chatbot embedded in a banking app. Customers use the chatbot to retrieve account balances and make transactions. Acting on behalf of the customer, the chatbot accesses backend account resources.
To secure these interactions, an authorization server issues and exchanges tokens. An agent gateway validates the tokens, acting as a security proxy in front of account resources.
Example process flow:
-
User authentication: The customer signs on to the banking app and receives an initial access token (the subject token).
-
Request for action: The customer asks the chatbot for their account balance. The banking app passes the customer’s subject token to the chatbot.
-
Token exchange: The chatbot sends the customer’s token and its own credentials (the actor token) to the authorization server.
-
Issuance of delegation token: The authorization server issues a new, short-lived token. This token includes the customer as the
sub(subject) and the chatbot in theact(actor) claim. -
Gateway validation: The chatbot sends the request to the backend. The agent gateway intercepts the call, validates the
actclaim, the user (sub), and target resource (aud), and ensures the chatbot has the specific scope (account:read_balance) required for the task. -
Secure execution: The backend account API processes the request, knowing exactly which agent performed the action for which user.
A delegation token issued by the authorization server carries a precise record of the delegation:
{
"iss": "https://as.example.com",
"aud": "https://acount.api.example.com",
"sub": "customer@example.com",
"act": {
"sub": "https://bank-agent.example.com"
},
"scope": "account:read_balance",
"iat": 1742200000,
"exp": 1742200300
}
The token contains the following claims:
| Claim | Description |
|---|---|
|
The human user who authorized the action. |
|
The AI agent performing the action. |
|
Constrained permissions granted to the agent for this action. |
|
Restricts the token to a specific downstream resource. |
The delegation token provides downstream services with everything they need for authorization decisions: who is the human, who is the agent, what are they allowed to do, and how to trace this specific action.
Ping Identity authorization servers that support this scenario include PingOne, PingOne Advanced Identity Cloud, and Ping Identity software, such as PingFederate and PingAM. PingGateway serves as the agent gateway.