The Identity Problem Agents Create: Why RBAC Is Necessary but Not Sufficient — Luminity Digital
Agentic AI Security  ·  Identity & Access

The Identity Problem Agents Create

Existing RBAC can anchor agent access boundaries. It cannot handle short-lived credentials, multi-hop delegation chains, or context-sensitive access within a single session. Here is what breaks, and what the production-grade answer looks like.

March 2026 Tom M. Gomez Luminity Digital 9 Min Read

Most enterprises deploying agentic AI in 2026 have assigned agents service accounts, mapped those accounts to roles, and declared their identity posture addressed. That approach is not wrong. It is the correct first layer — and it is insufficient for production-grade agentic deployments. The identity patterns agents introduce were not present when RBAC was designed, and standard role assignment breaks predictably at exactly the points where agentic systems create the most risk.

The instinct to reach for role-based access control when an agent needs system access is sound. RBAC is the enterprise’s established vocabulary for scoping what a principal can do. An agent represented as a service account, bound to a role that permits specific tool invocations against specific resources, is a meaningful access boundary — it constrains the blast radius, creates an auditable identity, and integrates with the IAM infrastructure the enterprise already operates. For static, single-agent deployments with predictable access patterns, this approach provides real governance value.

The problem is not that RBAC is wrong. The problem is that agentic systems introduce three identity properties that static role assignment was never designed to handle. Each one is a break point. Each one requires a different solution. And none of them are hypothetical — they emerge from the architectural reality of how agents operate in production MCP environments, not from edge cases.

What RBAC Was Designed For

Role-based access control was designed for persistent human identities and stable workloads. A user is assigned a role. The role grants access to a defined set of resources. The assignment persists until explicitly revoked. The system assumes that the principal’s identity is stable, that its access patterns are predictable in advance, and that the unit of authorization is the principal-resource-action triple at the time of provisioning.

All three of those assumptions break under agentic AI deployment. Agents are short-lived. Their delegation chains introduce new principals mid-workflow. Their access requirements vary contextually within a single session. RBAC can anchor them — it cannot govern them fully.

The Three Breaks

Each of the following failure modes emerges from a specific mismatch between how RBAC was designed and how agents behave. They are not edge cases. They are the normal operating conditions of agents deployed at enterprise scale on MCP infrastructure.

Break One

Short-Lived Credentials

IAM provisioning assumes persistence

Traditional IAM was designed around persistent identities — a user account, a service account, a machine identity that exists until deprovisioned. Provisioning is a deliberate, audited act. Revocation is explicit. The lifecycle of the credential is measured in months or years.

An agent spun up to complete a discrete task may exist for thirty seconds. Provisioning a service account, assigning it a role, and deprovisioning it in that window is operationally absurd. The practical result is that enterprises either create long-lived service accounts that persist across agent sessions — accumulating permissions that no single session needs — or they skip the provisioning step entirely and grant overly broad standing access.

Partial coverage today
The Solution

Workload Identity & Short-Lived Token Infrastructure

The production-grade answer is OIDC-based workload identity — credentials that are issued dynamically at agent instantiation, scoped to exactly the access the task requires, and expire when the task completes. This pattern is mature in cloud-native infrastructure: AWS IAM Roles for Service Accounts, GCP Workload Identity Federation, and Azure Managed Identities all implement it for container workloads.

Extending this pattern to agent tasks requires the harness to request scoped credentials at spawn time and pass them through the agent’s MCP context rather than relying on a standing service account. Platforms like Teleport Machine ID and Aembit are building specifically for this agent credential lifecycle. The pattern exists and is deployable today — it requires deliberate harness integration that most MCP deployments have not yet built.

Break Two

Multi-Hop Delegation Chains

RBAC has no native trust attenuation model

In agentic workflows, the originating principal — a human user, an orchestrator agent — frequently spawns sub-agents to complete subtasks. Each spawned agent is a new principal. The question of what permissions that sub-agent carries is not one RBAC was designed to answer.

Three common patterns emerge, each problematic in its own way. The sub-agent inherits the parent’s full permissions — violating least privilege by giving the subtask agent access it doesn’t need. The sub-agent gets a standing service account — creating a static credential that outlives the task. Or the sub-agent runs without explicit credential scoping — operating in an authorization vacuum where the harness assumes whatever the underlying MCP server permits.

None of these patterns produce a defensible trust chain. The enterprise cannot answer the audit question: what permissions did this sub-agent carry, and were they appropriate to its task?

New infrastructure needed
The Solution

OAuth 2.0 On-Behalf-Of Flows & Trust Attenuation

OAuth 2.0’s On-Behalf-Of (OBO) flow was designed precisely for this pattern: a service acting on behalf of a user requests a token scoped to that delegation, and the token explicitly encodes both the originating identity and the delegated scope. Applied to agent chains, Agent A spawning Agent B requests an OBO token scoped to the subtask — the resulting credential carries the originating user’s identity, the scope is narrowed to what B requires, and the delegation is auditable in the token itself.

Solo.io’s Agentgateway implements this for MCP environments: OBO flows, token exchange patterns, and step-up authentication for sensitive operations. The OAuth 2.0 specification is mature. Enterprise tooling that consumes these patterns and wires them to MCP agent workflows is 2025–2026 vintage and still maturing — but the architecture is available for teams willing to build it now rather than wait for packaged solutions.

The design principle: trust must attenuate at each delegation hop, never amplify. A sub-agent cannot carry more permissions than the principal that spawned it. The harness enforces this — the protocol does not.

Break Three

Context-Sensitive Access

Static role assignment cannot express session-state conditions

The same agent, in the same session, may legitimately need read access to a customer record at one point in a workflow and write access to an outbound communication channel at another. A static role assignment either grants both — overprovisioning the read-only phase — or grants neither — blocking legitimate action. There is no middle position available in a pure RBAC model.

This is not an abstract concern. It is the default operating condition for agents doing multi-step work across MCP-connected tools: reading from a CRM, drafting a communication, writing to an email server, logging the outcome. Each step has a different appropriate permission set. Role assignment made at deployment time cannot express that sequence.

New infrastructure needed
The Solution

ABAC and ReBAC Layered on Existing Roles

Attribute-Based Access Control evaluates access decisions at request time against a policy that includes the principal’s attributes, the resource’s attributes, and environmental conditions — including workflow state. A policy can express: this agent may write to the email server only when the current task phase is “outbound communication” and the record being written references a CRM entity the originating user owns.

Relationship-Based Access Control extends this to graphs of entity relationships — particularly useful when access should follow data ownership across systems. Both models are mature: Open Policy Agent (OPA), Kyverno, and OpenFGA/SpiceDB are production-grade, widely deployed, and well-documented. The integration work is connecting the policy engine to the harness so that tool invocations carry the context attributes needed to evaluate the policy. That integration is new work — the engines themselves are not.

The practical sequence: start with OPA for policy-as-code on tool invocations. Define policies for the highest-risk sinks first — outbound communication, file write, data export. Expand coverage iteratively. The policy engine does not replace RBAC; it layers on top of it, adding the context-sensitivity that role assignment cannot provide.

What Partial Coverage Actually Looks Like

The failure pattern in enterprise agentic deployments is not that organizations skip identity governance entirely. It is that they implement the first layer — service account representation, role assignment — and treat that as a completed task. The three breaks described above then manifest as operational incidents rather than governance gaps, because nothing in the first-layer implementation signals that the gap exists.

What First-Layer RBAC Delivers

Necessary Foundation

Agents have auditable identities. Access is bounded by role at provisioning time. The IAM team can answer “what is this agent allowed to do” from the role assignment. Blast radius is constrained compared to an agent operating without any credential scoping. Integration with existing PAM and audit infrastructure is straightforward.

This is real governance value. For simple, persistent, single-agent deployments — a scheduled data pipeline, a fixed-function integration agent — it may be sufficient.

Correct starting point
Where It Fails in Production

Three Invisible Gaps

Short-lived agents accumulate standing permissions in long-lived service accounts that no single session requires — overprovision becomes the default. Sub-agents inherit or approximate the parent’s scope because no delegation chain policy exists — the trust model is undefined rather than attenuated. Context-sensitive workflows run under a role that either overprovisioned for the write phase or blocks legitimate action in the read phase.

None of these failures are detectable from RBAC alone. The audit log shows valid credential use. The role is correctly assigned. The governance gap is in the architecture, not the log.

Fails at production scale

The Audit Problem

The most dangerous property of partial-coverage RBAC for agents is that it produces clean audit logs while governance gaps remain open. A sub-agent operating under a parent’s overprovisionened credentials generates valid access records — the role was assigned, the credential was valid, the access was permitted. The governance failure does not appear in the log. It appears in the incident that the log fails to explain.

The Solutions Stack — Maturity and Sequencing

Each of the three breaks has a known solution. The solutions are at different points on the maturity curve, and sequencing them correctly matters more than pursuing all three simultaneously.

3

Distinct infrastructure problems requiring distinct solutions: short-lived credential lifecycle (workload identity), multi-hop delegation trust (OBO flows and token exchange), and context-sensitive access decisions (ABAC/ReBAC policy engines). Standard role assignment addresses none of them. Each requires deliberate harness integration.

Workload identity for short-lived credentials is the most mature and the highest-priority starting point. OIDC-based credential issuance for containerized workloads is well-understood infrastructure. The harness integration — requesting scoped tokens at agent instantiation, expiring them at task completion — is the new work, but it is bounded and testable. Start here. The alternative is standing service accounts accumulating permissions across sessions, which is the most common overprovision vector in current deployments.

ABAC policy engines for context-sensitive access are mature but require thoughtful policy design. OPA in particular has strong enterprise adoption, good documentation, and integrates cleanly with the kind of tool-invocation interception a harness should already be doing. The sequencing recommendation is to define policies starting from the highest-risk sinks — outbound communication tools, file write capabilities, data export endpoints — and expand coverage iteratively. Attempting to write comprehensive ABAC policy for every tool invocation before any agents are in production produces policy debt; starting from risk-tiered sinks produces defensible coverage.

OBO flows for delegation chains are the least mature from an enterprise tooling perspective. The OAuth 2.0 specification is solid; the ecosystem of harness-integrated token exchange for agent workflows is still forming. Organizations building multi-agent orchestration now should design for OBO from the start — the architectural patterns are available even if the packaged tooling is thin. The November 2025 MCP spec update introducing server identity primitives is the protocol-layer foundation this infrastructure will build on as the ecosystem matures.

The policy engine does not replace RBAC. It layers on top of it — adding the context-sensitivity that role assignment cannot express, without discarding the auditable identity boundary that role assignment provides.

— Luminity Digital, Enterprise Agentic AI Governance Practice

The Enterprise Architect’s Priority Sequence

The practical question is not which of these solutions to build — all three are eventually required for production-grade agentic deployments. The question is what to build first given that agents are already being deployed, pilots are already running, and governance work is competing with delivery pressure.

Immediately: Audit every agent in production or active development for service account accumulation. Identify which agents are operating under long-lived service accounts that predate the task they are currently running. These are the highest-risk identity configurations in your current state — overprovisionened, persistent, and silent in audit logs.

Short-term: Implement workload identity for net-new agent deployments. Do not retrofit existing pilots — the disruption cost is high and the marginal risk reduction is lower than addressing new deployments cleanly from the start. Establish the pattern in infrastructure before it scales.

Medium-term: Define ABAC policy for the highest-risk tool sinks. This requires the harness to be instrumented for policy evaluation at invocation time — if the harness is not already intercepting tool calls for audit, that instrumentation is the prerequisite, not the policy itself. Policy without interception is documentation, not governance.

Ongoing: Design multi-agent orchestration for OBO from the start, even before packaged tooling makes it easy. The architectural decision to define delegation scope at spawn time is much cheaper to make during design than to retrofit after a complex agent graph is in production. Accept that the tooling will mature around the pattern — don’t wait for the tooling to begin designing for the pattern.

The Governance Reality

RBAC is necessary. It is not sufficient. The gap between necessary and sufficient is where agents operate in production — short-lived, delegating, context-aware. Closing that gap requires new infrastructure, most of which exists in mature form today. What is new is not the technology. What is new is the integration work that connects it to the agentic deployment patterns enterprises are building right now.

Related: Vendor Hardening Is Not Enterprise Governance

OpenAI and Anthropic each published agent security frameworks this month. Both stop at the model and product layer. The harness layer — where agent identity, access scoping, and delegation chain policy live — is what neither framework builds for you. Read the full analysis →

References & Sources

Share this:

Like this:

Like Loading...