Close Menu
  • Home
  • AI Models
    • DeepSeek
    • xAI
    • OpenAI
    • Meta AI Llama
    • Google DeepMind
    • Amazon AWS AI
    • Microsoft AI
    • Anthropic (Claude)
    • NVIDIA AI
    • IBM WatsonX Granite 3.1
    • Adobe Sensi
    • Hugging Face
    • Alibaba Cloud (Qwen)
    • Baidu (ERNIE)
    • C3 AI
    • DataRobot
    • Mistral AI
    • Moonshot AI (Kimi)
    • Google Gemma
    • xAI
    • Stability AI
    • H20.ai
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Microsoft Research
    • Meta AI Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding & Startups
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • Expert Insights & Videos
    • Google DeepMind
    • Lex Fridman
    • Matt Wolfe AI
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • Matt Wolfe AI
    • The TechLead
    • Andrew Ng
    • OpenAI
  • Expert Blogs
    • François Chollet
    • Gary Marcus
    • IBM
    • Jack Clark
    • Jeremy Howard
    • Melanie Mitchell
    • Andrew Ng
    • Andrej Karpathy
    • Sebastian Ruder
    • Rachel Thomas
    • IBM
  • AI Policy & Ethics
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
    • EFF AI
    • European Commission AI
    • Partnership on AI
    • Stanford HAI Policy
    • Mozilla Foundation AI
    • Future of Life Institute
    • Center for AI Safety
    • World Economic Forum AI
  • AI Tools & Product Releases
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
    • Image Generation
    • Video Generation
    • Writing Tools
    • AI for Recruitment
    • Voice/Audio Generation
  • Industry Applications
    • Finance AI
    • Healthcare AI
    • Legal AI
    • Manufacturing AI
    • Media & Entertainment
    • Transportation AI
    • Education AI
    • Retail AI
    • Agriculture AI
    • Energy AI
  • AI Art & Entertainment
    • AI Art News Blog
    • Artvy Blog » AI Art Blog
    • Weird Wonderful AI Art Blog
    • The Chainsaw » AI Art
    • Artvy Blog » AI Art Blog
What's Hot

Zach + Richard’s Excellent Legal AI Adventure – Artificial Lawyer

Leveraging Large Language Models for Predictive Analysis of Human Misery – Takara TLDR

Google is adding “Projects” feature to Gemini to run research tasks

Facebook X (Twitter) Instagram
Advanced AI News
  • Home
  • AI Models
    • OpenAI (GPT-4 / GPT-4o)
    • Anthropic (Claude 3)
    • Google DeepMind (Gemini)
    • Meta (LLaMA)
    • Cohere (Command R)
    • Amazon (Titan)
    • IBM (Watsonx)
    • Inflection AI (Pi)
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Meta AI Research
    • Microsoft Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • AI Experts
    • Google DeepMind
    • Lex Fridman
    • Meta AI Llama
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • The TechLead
    • Matt Wolfe AI
    • Andrew Ng
    • OpenAI
    • Expert Blogs
      • François Chollet
      • Gary Marcus
      • IBM
      • Jack Clark
      • Jeremy Howard
      • Melanie Mitchell
      • Andrew Ng
      • Andrej Karpathy
      • Sebastian Ruder
      • Rachel Thomas
      • IBM
  • AI Tools
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
  • AI Policy
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
  • Business AI
    • Advanced AI News Features
    • Finance AI
    • Healthcare AI
    • Education AI
    • Energy AI
    • Legal AI
LinkedIn Instagram YouTube Threads X (Twitter)
Advanced AI News
Amazon AWS AI

Introducing Amazon Bedrock AgentCore Identity: Securing agentic AI at scale

By Advanced AI EditorAugust 16, 2025No Comments14 Mins Read
Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


We’re excited to introduce Amazon Bedrock AgentCore Identity, a comprehensive identity and access management service purpose-built for AI agents. With AgentCore Identity AI, agent developers and administrators can securely access AWS resources and third-party tools such as GitHub, Salesforce, or Slack. AgentCore Identity provides robust identity and access management at scale so that agents can access your resources or tools either on behalf of users or themselves with pre-authorized user consent to minimize the need for custom access controls and identity infrastructure development.

As organizations deploy AI agents into production environments, they face a critical challenge: how to securely manage identity and access at scale. Applications need to authenticate users for invoking AI agents, and these agents need to access multiple tools and services, maintain audit trails, and integrate with existing enterprise identity systems—all while avoiding data leakage and maintaining compliance with organizational requirements. These requirements become exponentially more complex when agents operate across disparate systems, act on behalf of different users, and need to access resources and tools in both AWS and external third-party services.

In this post, we examine how AgentCore Identity solves these agentic AI security challenges. We start by exploring the core identity and security needs for enterprise AI agents, then dive into the architecture of AgentCore Identity for managing agent identities and credentials. We then demonstrate how to implement secure agent authentication through a practical customer support use case and conclude with best practices for enterprise-grade security at scale.

Agentic AI security at scale

Building secure AI agents for enterprise deployment presents unique identity and access management challenges that traditional application security models weren’t designed to handle. The following diagram illustrates the areas where access control through authentication and authorization is required in a typical agentic workflow.

Let’s examine the specific security requirements that make agentic AI systems particularly complex:

Inbound authentication: Who can access the agent?

When users or applications invoke an AI agent, you need to verify their identity and determine what they’re authorized to do. This inbound authentication must support multiple patterns:

User authentication: Verifying human users accessing agents through web applications or APIs
Service authentication: Validating other services or agents that need to communicate with your agent
Multi-tenant isolation: Blocking users from different organizations from accessing each other’s data

Outbound authentication: What can the agent access?

AI agents need to interact with various resources and tools to accomplish tasks. This outbound authentication presents its own challenges:

Acting on behalf of users: Agents often need to access user-specific resources (such as their Google Drive or Slack workspace) with appropriate permissions
Service-to-service authentication: Agents might need their own credentials to access shared resources or APIs
Token management: Securely storing and managing OAuth access tokens, API keys, and other credentials without exposing them to potential threats

Enterprise integration requirements

Modern enterprises have invested heavily in identity infrastructure, and AI agents must integrate seamlessly:

Identity provider compatibility: Supporting existing systems such as Amazon Cognito, Okta, or Microsoft Entra ID (formerly Azure Active Directory).
Standard protocols: Using OAuth 2.0, OpenID Connect, and other industry standards
Robust access controls: Implementing least-privilege access and continuous verification

Compliance and auditability

For financial services companies and other regulated industries, every agent action must be traceable:

Comprehensive audit trails: Logging who accessed what, when, and on whose behalf
Data isolation: Avoiding cross-contamination between different users’ data
Regulatory compliance: Meeting requirements for data protection and privacy regulations

Without a purpose-built solution, developers spend months building custom authentication systems, implementing token vaults, managing OAuth flows, and creating audit mechanisms—all while trying to maintain security best practices.

AgentCore Identity: Main features

AgentCore Identity addresses most of these challenges by providing a centralized capability for managing agent identities, securing credentials, and supporting seamless integration with AWS and third-party services through Sigv4, standardized OAuth 2.0 flows, and API keys.

The main components provided with AgentCore Identity include:

Agent identity directory: Create, manage, and organize agent and workload identities through a unified directory service that acts as the single source of truth for the agent identities within your organization.
Agent authorizer: Validates whether a user or service is allowed to invoke an agent or not.
Resource credential provider: Stores the configuration for an agent that needs to get credentials to access downstream resource servers. It subsequently retrieves credentials of downstream resource servers such as Google or GitHub to access them, for actions like in example fetching emails from Gmail or adding a meeting to Google Calendar.
Resource token vault: Stores user’s OAuth access tokens and allows agents to retrieve them securely to perform actions on behalf of users and reduce unnecessary user consents.

AgentCore Identity implements authentication and authorization controls that verify each request independently, requiring explicit verification for access attempts regardless of source. It integrates seamlessly with AWS services while also enabling agents to securely access external tools and services. You can use AgentCore Identity for securing access to the agents, and for securing access to the resources or tools that your agents access on behalf of users, as shown in the following diagram.

Whether you’re building simple automation scripts or complex multi-agent systems, AgentCore Identity provides the identity foundation to help your applications operate securely and efficiently.

Distinct agent identities

Each agent receives a unique identity with associated metadata (such as name, Amazon Resource Name (ARN), OAuth return URLs, created time, last updated time) that can be managed centrally across your organization. This workload identity approach means agents are first-class citizens in your security architecture, not just applications masquerading as users.

Dual authentication model

AgentCore Identity implements a dual authentication approach:

Inbound authentication: Validates users and applications attempting to invoke agents

Supports AWS Identity and Access Management (IAM) credentials (SigV4) for AWS authentication
Integrates with OAuth 2.0 or OpenID Connect identity providers
Provides JSON Web Token (JWT) token validation

Outbound authentication: Enables agents to securely access resources:

The token vault provides security for storing OAuth 2.0 access tokens, OAuth client credentials, and API keys with comprehensive encryption at rest and in transit.
Supports both two-legged OAuth (machine-to-machine) and three-legged OAuth (on behalf of users)
Pre-configured integrations with authorization providers for popular services such as GitHub, Slack, or Salesforce.

Secure token vault

The secure token vault is a key element of the security model for AgentCore Identity:

Encryption: Credentials are encrypted using customer managed AWS Key Management Service (AWS KMS) keys
Access control: Credentials bound to specific agent-user combinations
Zero token sharing: Avoids credentials from being accessed across users or agents

Seamless SDK integration

Seamless integration with the AgentCore SDK through declarative annotations such as @requires_access_token and @requires_api_key that automatically handle credential retrieval and injection, reducing boilerplate code and potential security vulnerabilities.

How to get started

Let’s walk through a practical example of deploying a developer productivity agent that helps engineering teams manage their GitHub repositories, track issues, and streamline their development workflow, as shown in the following diagram.

This agent will authenticate developers using OAuth and then access GitHub to help them manage repositories, track issues, and review pull requests on their behalf. You can follow the complete example in this notebook.

Prerequisites

Step 1: Set up your identity provider

First, configure your identity provider for agent users. You can use an OAuth 2.0-compatible identity provider of your choice. For this example, we use Amazon Cognito with a handy script provided in the notebook. We can then map the attributes required either directly or by relying on AWS Secrets Manager for storing and retrieving this information securely.

from bedrock_agentcore_starter_toolkit import Runtime
from boto3.session import Session
boto_session = Session()
region = boto_session.region_name
# Configure your Cognito User Pool
discovery_url = f’https://cognito-idp.{region}.amazonaws.com/{pool_id}/.well-known/openid-configuration’
client_id = ‘your-cognito-app-client-id’

Step 2: Create your agent with JWT authentication

Configure your agent runtime to accept JWT tokens from your identity provider:

from bedrock_agentcore_starter_toolkit import Runtime
agentcore_runtime = Runtime()
response = agentcore_runtime.configure(
entrypoint=”github_agent.py”,
auto_create_execution_role=True,
auto_create_ecr=True,
requirements_file=”requirements.txt”,
region=region,
agent_name=”strands_agent_github”,
authorizer_configuration={
“customJWTAuthorizer”: {
“discoveryUrl”: discovery_url,
“allowedClients”: [client_id]
}
}
)

Step 3: Configure OAuth credential provider for GitHub

Set up the OAuth provider to enable your agent to access GitHub services. AgentCore Identity provides preconfigured settings for popular services:

import boto3
agentcore_client = boto3.client(‘bedrock-agentcore-control’, region_name=region)
response = agentcore_client.create_oauth2_credential_provider(
name=”github-provider”,
credentialProviderVendor=”GithubOauth2″,
oauth2ProviderConfigInput={
‘githubOauth2ProviderConfig’: {
‘clientId’: “”,
‘clientSecret’: “”
}
}
)

Step 4: Implement the agent with automatic token handling

Create tools with AgentCore SDK annotations to automatically handle the three-legged OAuth process. The @requires_access_token decorator manages the entire OAuth flow, including user consent. You can check the full code for this example in the notebook, but we highlight the key parts in the snippet below:

from bedrock_agentcore import BedrockAgentCoreApp
from bedrock_agentcore.identity.auth import requires_access_token
from strands import Agent, tool

# Global token storage
github_access_token = None

app = BedrockAgentCoreApp()

@tool
def inspect_github_repos() -> str:
“””Tool that requires authentication to access private repos.”””
global github_access_token
# Check if authentication is required
if not github_access_token:
return “Authentication required for GitHub access”
# Use token for authenticated API calls
headers = {“Authorization”: f”Bearer {github_access_token}”}
### … code for making authenticated requests with GitHub APIs …

async def agent_task(user_message: str) -> None:
“””Main agent logic with authentication handling.”””
global github_access_token
# Initial agent call
response = agent(user_message)
# Check if authentication is needed
if “Authentication required” in str(response.message):
# Trigger authentication flow
github_access_token = await need_token_3LO_async(access_token=”)
# Retry with authentication
response = agent(user_message)

@requires_access_token(
provider_name=”github-provider”,
scopes=[“repo”, “read:user”],
auth_flow=’USER_FEDERATION’,
force_authentication=True,
)
async def need_token_3LO_async(*, access_token: str) -> str:
“””Handle OAuth authentication flow.”””
global github_access_token
github_access_token = access_token
return access_token

# Create agent with authentication-aware tool
agent = Agent(
model=”us.anthropic.claude-3-7-sonnet-20250219-v1:0″,
tools=[inspect_github_repos]
)
@app.entrypoint
async def agent_invocation(payload):
“””Main entrypoint.”””
user_message = payload.get(“prompt”, “…”)
await agent_task(user_message)

### … Code for returning responses …

Step 5: Deploy and test

Deploy your agent using the AgentCore CLI:

bedrock-agentcore runtime launch

When users invoke your agent with their JWT token, AgentCore Identity will:

Validate the incoming JWT token
Establish the user’s identity
Establish its own identity and obtain a workload access token for the user and agent pair
When the agent needs GitHub access, use the workload access token to automatically handle the user consent as part of the three-legged OAuth flow by providing an authorization URL
Securely store and retrieve tokens from the vault
Inject tokens into your function calls

Let’s explore a demonstration of how an application would look like for this example.

As you can see, the agent seamlessly authenticates users and accesses their GitHub repositories without exposing credentials or requiring manual token management. The entire OAuth flow, including user consent and secure token storage, is handled automatically by AgentCore Identity.

Clean up

Once you’ve completed the example provided, you can clean up the resources with the commands below to avoid unnecessary charges in your account. Remember to replace the provider ID with your own ID.

# Delete the agent runtime
bedrock-agentcore runtime delete –agent-name github-support-agent

# Delete the OAuth credential provider
aws bedrock-agentcore-identity delete-oauth-credential-provider \
–provider-id

Integration with AgentCore environment and identity providers

AgentCore Identity is designed to work seamlessly with the broader AgentCore environment and your existing identity infrastructure.

AgentCore service integration

AgentCore Runtime: Runtime, powered by AgentCore Identity, assigns distinct identities to AI agents and seamlessly integrates with your corporate identity provider such as Okta, Microsoft Entra ID, or Amazon Cognito, among others.
AgentCore Gateway: When using Gateway to expose tools using Model Context Protocol (MCP), AgentCore Identity handles authentication for both incoming agent requests and outgoing tool calls

Identity provider compatibility

AgentCore Identity supports OAuth 2.0 or OpenID Connect-compatible identity providers, and providers accessible through API keys. For example, Amazon Cognito, Okta, and Microsoft Entra ID, among others.

Customers who use AgentCore Identity through either AgentCore Runtime or AgentCore Gateway, do not incur any additional charges for their use of AgentCore Identity. For other scenarios, you pay for only what you use and are charged based on the number of requests from the agent to AgentCore Identity for an OAuth token or an API key. For more information on pricing, refer to the AgentCore public pricing.

Security considerations and best practices

When implementing AgentCore Identity, follow these security best practices:

Principle of least privilege

Minimize security risks by restricting agent access to only essential resources and capabilities:

Grant agents only the minimum permissions needed
Regularly audit and review agent permissions

Agent and user identities based access

Establish clear identity verification and management protocols for both human users and AI agents:

Provide user identity in a verifiable form
Manage agent identities

Token management

Protect authentication credentials through proper token lifecycle management:

Enable automatic token refresh to minimize credential exposure
Use force_authentication=True for sensitive operations
Implement token expiration policies appropriate for your use case

Audit and monitoring

Maintain visibility into agent activities to detect anomalies and ensure compliance with organizational requirements:

Enable Amazon CloudWatch logging for the agent operations
Set up alerts for unusual authentication patterns
Regularly review audit logs for compliance

Multi-tenant security

For software as a service (SaaS) providers and multi-tenant environments:

Configure separate credential providers per tenant
Use tenant-specific JWT claims for validation
Implement additional authorization checks in your agent logic

Conclusion and future outlook

Amazon Bedrock AgentCore Identity transforms how organizations secure AI agents at scale. By providing purpose-built identity and access management, it extinguishes months of custom development while providing enterprise-grade security. The service’s dual authentication model, secure token vault, and seamless integration with existing identity providers make it possible to deploy agents that can safely operate across organizational boundaries and access diverse resources .As AI agents become more prevalent in enterprise environments, the need for robust identity and access management will only grow. AgentCore Identity provides the foundation for this future, enabling organizations to build agents that are not just intelligent, but also secure, compliance-aligned, and trustworthy.

Resources to get started

Ready to secure your AI agents with AgentCore Identity? Here are your next steps:

Explore the documentation: Visit the Amazon Bedrock AgentCore documentation
Try the samples: Check out the GitHub repository with complete examples
No cost preview: You can try AgentCore services at no additional charge until September 16, 2025: Introducing Amazon Bedrock AgentCore: Securely deploy and operate AI agents at any scale (preview) | AWS News Blog

Start building secure, scalable AI agents today with Amazon Bedrock AgentCore Identity. Transform your proof-of-concept into production-ready systems that meet the highest enterprise security standards.

About the Authors

Rahul Sharma is a Principal Product Manager-Technical at Amazon Web Services with over 5 years of cumulative product management experience spanning Customer Identity and Access Management (CIAM), Infrastructure as Code (IaC), and most recently the agent identity space.

Fei Yuan is a Principal Engineer at AWS. During his 20+ years of experience, Fei has led different teams through various projects across Amazon and AWS, such as Amazon Lending Marketplace, Amazon Payment Services, Alexa ML Secure Computing, Amazon DataZone, Amazon SageMaker data governance, and Amazon Cognito. Most recently, he led the team that launched Amazon Bedrock AgentCore Identity service. Today he focuses on designing and implementing AWS products in the areas of agent identity, workload identity, and customer identity and access management.

Satveer Khurpa is a Sr. WW Specialist Solutions Architect, Amazon Bedrock at Amazon Web Services, specializing in Amazon Bedrock security. In this role, he uses his expertise in cloud-based architectures to develop innovative generative AI solutions for clients across diverse industries. Satveer uses his deep understanding of generative AI technologies and security principles to design scalable, secure, and responsible applications that unlock new business opportunities and drive tangible value while maintaining robust security postures.

Antonio Rodriguez is a Principal Generative AI Specialist Solutions Architect at Amazon Web Services. He helps companies of all sizes solve their challenges, embrace innovation, and create new business opportunities with Amazon Bedrock. Apart from work, he loves to spend time with his family and play sports with his friends.



Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenAI’s Sam Altman expects to spend ‘trillions’ on infrastructure – Orange County Register
Next Article OpenAI CEO Sam Altman: I don’t use Google anymore, I cannot tell you …
Advanced AI Editor
  • Website

Related Posts

How Infosys built a generative AI solution to process oil and gas drilling data with Amazon Bedrock

August 19, 2025

Simplify access control and auditing for Amazon SageMaker Studio using trusted identity propagation

August 19, 2025

Benchmarking document information localization with Amazon Nova

August 19, 2025

Comments are closed.

Latest Posts

Barbara Hepworth Sculpture Will Remain in UK After £3.8 M. Raised

After 12-Year Hiatus, Egypt’s Alexandria Biennale Will Return

Ai Weiwei Visits Ukraine’s Front Line Ahead of Kyiv Installation

Maren Hassinger to Receive Her Largest Retrospective to Date Next Year

Latest Posts

Zach + Richard’s Excellent Legal AI Adventure – Artificial Lawyer

August 20, 2025

Leveraging Large Language Models for Predictive Analysis of Human Misery – Takara TLDR

August 20, 2025

Google is adding “Projects” feature to Gemini to run research tasks

August 20, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Zach + Richard’s Excellent Legal AI Adventure – Artificial Lawyer
  • Leveraging Large Language Models for Predictive Analysis of Human Misery – Takara TLDR
  • Google is adding “Projects” feature to Gemini to run research tasks
  • IBM bags Vi project to launch AI Innovation Hub, modernise ops
  • DeepSeek-R1: Hype cools as India seeks practical GenAI solutions

Recent Comments

  1. Felixtip on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  2. SonersPougs on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  3. TimothyAreld on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  4. MatthewSaice on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  5. Charliecep on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10

Welcome to Advanced AI News—your ultimate destination for the latest advancements, insights, and breakthroughs in artificial intelligence.

At Advanced AI News, we are passionate about keeping you informed on the cutting edge of AI technology, from groundbreaking research to emerging startups, expert insights, and real-world applications. Our mission is to deliver high-quality, up-to-date, and insightful content that empowers AI enthusiasts, professionals, and businesses to stay ahead in this fast-evolving field.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

LinkedIn Instagram YouTube Threads X (Twitter)
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 advancedainews. Designed by advancedainews.

Type above and press Enter to search. Press Esc to cancel.