Next-Gen
AI Agent IAM Reference Architecture
Layered identity, authorization & enforcement for secure AI agent operations.
User Identity Layer
Establish and enrich human identity and attributes.
User Access Flow
Identity & Attribute Service
User → Agent Authorization Layer
Determines which agents the user is allowed to access.
Authorization Point #1
Can THIS USER use THIS AGENT?
Policy Decision (OPA / Cedar)
Agent Catalog (Discoverable Agents)
Agent Identity Layer
Agent identity established with capabilities and trust context.
Agent Runtime & Identity
Request Context (per Session / Task)
Agent → Capability Authorization Layer
Determines what this agent is allowed to access and do.
Authorization Point #2
Can THIS AGENT access THIS TOOL / DATA / API?
Policy Decision (OPA / Cedar)
Agent Capabilities (Allow List)
User → Data Authorization Layer
Determines what data the user is entitled to see. (Entitlement Overlay)
Authorization Point #3
User Entitlement Check for THIS DATA?
Policy Decision (OPA / Cedar)
Data Entitlements & Classification
Runtime Intersection Decision Layer
Policy evaluation with context. Evaluates the full intersection and returns a decision and obligations.
Authorization Point #4 — Policy Evaluation (Intersection)
Decision = f(user, agent, action, resource, context)
Cutting-Edge Enhancements (Built into Policy Evaluation)
Enforcement Layer
Decisions are enforced at every execution boundary. (Multiple Boundaries)
Guardrail Pipeline
Input Guardrails
Validate & sanitise user input (PII, jailbreak, etc.)
Retrieval Layer
Enforce collection filters & metadata constraints (classification, ownership, RLS)
Tool / API Gateway
Tool allow list, parameter constraints, rate limits, scopes
Data Access Layer
Query rewriting, RLS/CLS, masking, row/field security, DLP
Model / LLM Guardrails
Model allow list, prompt controls, context limits, policy constraints
Output Guardrails
Redaction, policy checks, toxicity, PII detection, summarization limits
Agent Response
Output to User
Observability & Audit Layer
End-to-end visibility for accountability and improvement.
Runtime Events & Audit Trail (Immutable)
Control Plane
Centralized Governance
Legend
→ Request / Data Flow- -→ Policy / Control Flow Allow Deny Policy Decision Point Enforcement Point Control Plane Service