Agent identity and zero trust for AI
Every AI agent — Claude Desktop, ChatGPT Connectors, Copilot, MCP servers, custom CLIs — gets its own cryptographic identity. Every request re-authenticated, scoped, and recorded. Default deny, never trust.
Three pillars of enterprise AI governance
Per-agent identity, not user impersonation
Each AI client has its own JWT-backed identity, distinct from the human's OAuth grant. The agent never holds your customer's Google or Microsoft refresh token. Revoking one agent does not disrupt the rest of the user's AI stack.
Continuous verification on every request
No session trust. Every call re-validates the agent identity, the requested scope, the policy attribute set, and the device + environment posture. A compromised token has a blast radius of one request, not one session.
Microsegmentation by default
Smallest possible scope: one folder, one label, one verb, one expiry, one device posture, one AI client. Lateral movement is structurally impossible — there is no implicit "this agent can also reach Drive" path to exploit.
How agent identity & zero trust help you satisfy the controls your auditors read
| Requirement | What PortEden does | Evidence |
|---|---|---|
| NIST 800-207 — Zero Trust Architecture | Per-request authentication, encryption everywhere, dynamic policy evaluation. PortEden implements all seven ZT tenets at the AI/data boundary. | Per-request authn + dynamic policy · all seven ZT tenets at the AI boundary |
| CISA Zero Trust Maturity Model — Identity, Devices, Networks, Applications, Data | Identity pillar: per-agent JWTs. Devices: posture as a policy attribute. Networks: TLS 1.3 end-to-end. Applications: policy-checked per call. Data: redacted at egress. | Per-agent JWTs · device posture as policy attribute · per-call check |
| NIST 800-53 IA-2 / IA-4 / IA-5 / IA-8 — Identification & authentication | Unique agent identifiers (IA-2), identifier management (IA-4), authenticator strength via signed JWTs with short expiry (IA-5), non-organizational user authentication for cross-tenant agents (IA-8). | Unique per-agent identifiers · short-expiry signed JWTs · cross-tenant authn |
| NIST 800-53 AC-3 / AC-4 — Access enforcement & information flow | Six-layer enforcement on every request. Information flow controls prevent lateral movement between scopes; cross-scope reads require explicit policy. | Six-layer per-request enforcement · cross-scope reads require explicit policy |
| CMMC 2.0 IA.L2 — Identification & authentication (Level 2) | Multi-factor for users; device + environment attributes for agents. Per-agent identity supports IA.L2-3.5.1 and IA.L2-3.5.2 traceability. | Per-agent identity trail · device + environment attribute capture |
| FedRAMP — IA + AC control families | Per-agent identity, dynamic policy evaluation, and per-request audit-trail evidence at the AI/data boundary. Each AI client carries its own short-lived, scoped JWT — no shared service accounts, no implicit trust. | Per-agent JWT identity · dynamic policy per request · tamper-evident audit |
| EU AI Act Art. 14 — Human oversight | Every agent is identifiable, traceable, and revocable by a named human. Approval workflows route policy-uncertain requests to humans without breaking automation. | Per-agent revocation trail · human-in-the-loop approval workflows |
| ISO 27001 A.5.16 / A.5.17 — Identity management & authentication info | Documented identity lifecycle for both humans and agents. Authenticator material is rotated, revoked, and audited per the same process. | Documented identity lifecycle · rotation + revocation audit trail |
Built for procurement
Talk to our enterprise team
30-minute discovery call. Bring your security questionnaire.
Frequently Asked Questions
What does "agent identity" mean for AI?
How does zero trust apply to AI agents specifically?
How is this different from OAuth?
Do I need to issue a separate identity for every Claude Desktop user?
How does this work with hosted MCP servers?
What's the relationship to NIST 800-207?
Can I revoke a single agent without disrupting others?
Ready to govern AI across your organization?
Book a discovery call. Bring your security questionnaire — DPA, subprocessor list, and pen-test summary available on request.