AI Agent Access Control
OWASP's Agentic AI Top 10 lists Excessive Agency (#9) and Identity & Privilege Abuse (#3) as critical risks. OAuth scopes are all-or-nothing. gmail.modify means full access. PortEden replaces those binary permissions with granular, per-agent controls.
The Problem
Giving AI agents direct access to your data is risky. Here's what can go wrong.
All-or-Nothing OAuth Scopes
Gmail's gmail.modify and Microsoft's Mail.ReadWrite are binary: full access or none, with no per-sender or per-action granularity.
Every Agent Gets the Same Access
Claude summarizing newsletters and ChatGPT managing your calendar both get identical broad permissions with no per-agent differentiation.
No Principle of Least Privilege
Standard OAuth has no mechanism for least-privilege email or calendar access, so every agent gets maximum permissions by default.
How PortEden Protects You
Six layers of security between AI agents and your data.
Per-Agent Rules
Each agent gets its own permission set: Claude read-only, ChatGPT draft-only, Copilot none, all configured and enforced independently.
Six Control Layers
Visibility, contact rules, action limits, time windows, account scope, and data reduction, all configurable per agent.
Instant Revocation
One click disables a compromised agent's access without affecting other agents or requiring OAuth token revocation.
Full Audit Trail
Per-agent, per-request logging shows exactly what was requested, returned, and blocked.
Get Started in 3 Steps
Install the CLI
Install PortEden CLI and connect your email and calendar accounts via secure OAuth.
Define Per-Agent Rules
Configure visibility, contact rules, action limits, time windows, and data reduction per agent.
Enforce Least Privilege
Point each agent to PortEden and every request is filtered through that agent's specific rules with full audit logging.
Without vs. With PortEden
Without PortEden
- OAuth scopes are binary, either full read/write/send/delete or nothing
- Every AI agent gets the same broad permissions regardless of task
- No per-agent access differentiation exists in Gmail or Outlook OAuth
- Revoking one agent's access means revoking the OAuth token for all agents
- No audit trail showing what each individual agent accessed
With PortEden
- Granular, per-agent permissions replace all-or-nothing OAuth scopes
- Claude, ChatGPT, and Copilot each get exactly the access they need
- Six control layers enforce true least-privilege access
- One-click revocation per agent without affecting others
- Per-agent, per-request audit logs for complete access visibility