Skip to content

Agent and Human Identity: The Connective Tissue

Agent + Human Identity: The Connective Tissue (Revised)

Section titled “Agent + Human Identity: The Connective Tissue (Revised)”

Storage is a commodity. Email is a commodity. Discovery is a marketplace. Identity is the platform.

The agent that has one identity across mail, storage, and skills is the agent that’s easiest to manage, audit, and trust. The human that has one dashboard to see all agent activity is the human most likely to trust and adopt the platform.

CrowdStrike paid $740M cash to acquire SGNL for agent identity/authorization (Jan 2026). That’s the market signal for how valuable this layer is.

New insight: Identity isn’t just for agents. The collaboration model requires both agent identity AND human identity in the same system. Every action — whether by agent or human — must be attributed, auditable, and permissioned.

MethodHow It WorksProblems
Shared OAuth tokensAgent uses human’s Google/Microsoft credentialsNo attribution, over-permissioned, audit nightmare
API keysAgent has a static API key per serviceKeys leak (7.1% of skills on ClawHub per Snyk), no scoping, no expiry
Service accountsAgent gets a dedicated service account per platformExplosion of accounts, each managed separately
No authAgent accesses public APIs or local filesNo governance, no audit trail
MethodHow It WorksProblems
Log filesHumans read agent logs (if they exist)Technical, not actionable, no commenting
Terminal outputHumans watch agent run in real-timeCan’t review after the fact, no persistence
Custom dashboardsTeams build bespoke monitoringExpensive, not standardized, no collaboration
NothingHumans have no visibility into agent workThe most common scenario — ~53% of agents unmonitored
  • 21.9% of organizations treat agents as identity-bearing entities (Gravitee, 750-respondent survey)
  • 18% of security leaders are “highly confident” in IAM for agents (CSA/Strata, 285 respondents). Note: 53% have at least “moderate” confidence.
  • 88% report security incidents with agents (includes “experienced or suspected” — Gravitee)
  • $740M — what CrowdStrike paid for SGNL’s agent identity technology
  • ~53% of agents operate without active monitoring (Gravitee)
  • By: OpenID Foundation
  • Status: Draft specification
  • Key idea: Agents get their own identity tokens, distinct from human tokens, with agent-specific claims
  • Collaboration relevance: Defines how agent tokens coexist with human tokens in the same system
  • By: IETF
  • Status: Internet-Draft
  • Key idea: Purpose-bound, time-limited authorization tokens for agents
  • Collaboration relevance: Delegation chains — a human authorizes an agent, which can be audited

NIST AI Agent Standards Initiative (Feb 2026)

Section titled “NIST AI Agent Standards Initiative (Feb 2026)”
  • By: NIST/NCCoE
  • Status: Concept paper published Feb 5, 2026. Full standards initiative launched Feb 19, 2026. Public comment deadline: April 2, 2026.
  • Key idea: Formal guidance on agent identity, authorization, and governance
  • Collaboration relevance: Explicitly calls for human oversight mechanisms — our dashboard is this
  • Significance: When NIST publishes guidance, compliance mandates follow

SAMEP (Secure Agent Memory Exchange Protocol)

Section titled “SAMEP (Secure Agent Memory Exchange Protocol)”
  • By: Academic/community
  • Status: Proposal
  • Key idea: Agents have verifiable memory that can be shared across sessions and platforms
  • Key requirement: High-risk AI systems must have human oversight mechanisms
  • Collaboration relevance: Our human dashboard with audit trails = built-in compliance
  • Opportunity: Every enterprise deploying agents in the EU will need human oversight tooling

Our Identity Architecture (Revised — Agents + Humans)

Section titled “Our Identity Architecture (Revised — Agents + Humans)”

One organization contains both agents and humans, with clear identity for each actor type.

Organization: Company Inc.
├── Humans (authenticated via OAuth)
│ ├── rakesh@company.com (admin)
│ │ ├── Role: admin
│ │ ├── Can: manage agents, manage humans, view all files, comment
│ │ └── Auth: Google OAuth → session cookie
│ │
│ └── priya@company.com (commenter)
│ ├── Role: commenter
│ ├── Can: view all files, add comments
│ └── Auth: Google OAuth → session cookie
├── Agents (authenticated via API keys → capability tokens)
│ ├── agent-content (agent-7x9k2)
│ │ ├── Services: Mailmolt + Workspace + Findable
│ │ ├── Can: read/write /workspace/*, /shared/campaigns/*
│ │ ├── Cannot: access /shared/finance/*, send external email
│ │ └── Delegated by: rakesh@company.com
│ │
│ ├── agent-analytics (agent-3m8p1)
│ │ ├── Services: Workspace + Findable
│ │ ├── Can: read/write /shared/analytics/*, read /shared/campaigns/*
│ │ └── Delegated by: rakesh@company.com
│ │
│ └── agent-social (agent-9k4r7)
│ ├── Services: Mailmolt + Workspace
│ ├── Can: read /shared/campaigns/final/*, send to social platforms
│ └── Delegated by: priya@company.com
├── Shared Workspaces
│ ├── /campaigns/q1-launch/ (all agents + all humans)
│ ├── /analytics/ (agent-analytics + rakesh only)
│ └── /finance/ (rakesh only — no agent access)
└── One audit trail, one permission model, one bill

Every agent has a clear delegation chain back to a human:

agent-content
├── Authorized by: rakesh@company.com
├── Authority: "Create and manage marketing content for Q1 campaigns"
├── Scope:
│ ├── Workspace paths: /workspace/*, /shared/campaigns/*
│ ├── Email: internal only, company.com domain
│ └── Skills: content-generation, seo-analysis
├── Expires: 2026-04-01
├── Renewal: requires human re-authorization
└── Audit: all actions logged with delegation reference

Why delegation matters for collaboration:

  • When a human sees agent activity in the dashboard, they can immediately see WHO authorized that agent
  • If an agent writes something unexpected, the delegating human is accountable
  • Compliance officers can audit: “Which human authorized this agent to access financial data?”

Agent token:

{
"sub": "agent-7x9k2",
"iss": "identity.agentvault.dev",
"aud": ["mailmolt.com", "agentvault.dev", "findable.sh"],
"iat": 1709251200,
"exp": 1709337600,
"actor_type": "agent",
"delegated_by": "user:rakesh@company.com",
"purpose": "Process Q4 data and generate reports",
"capabilities": {
"mailmolt": {
"send": ["internal"],
"receive": true,
"domains": ["company.com"]
},
"storage": {
"paths": ["/workspace/*", "/outputs/*", "/shared/campaigns/*"],
"ops": ["read", "write", "list", "comment"],
"max_file_size": 10485760
},
"findable": {
"use_skills": ["data-analysis", "reporting"],
"publish_skills": false
}
}
}

Human token (dashboard session):

{
"sub": "user-rakesh",
"iss": "identity.agentvault.dev",
"aud": ["agentvault.dev"],
"actor_type": "human",
"role": "admin",
"org": "org-abc123",
"capabilities": {
"dashboard": {
"view_files": true,
"comment": true,
"upload_files": true,
"manage_agents": true,
"manage_humans": true,
"view_audit": true,
"manage_billing": true
}
}
}
RoleView FilesCommentUpload FilesManage AgentsManage HumansBilling
ViewerYesNoNoNoNoNo
CommenterYesYesNoNoNoNo
EditorYesYesYesYes (create/revoke)NoNo
AdminYesYesYesYesYesYes

Developer manages 3 API keys, 3 permission sets, 3 audit trails. Agent has no coherent “self.” Humans have no single dashboard to see all agent activity. Adding a new service = new integration effort.

One token, one permission model, one audit trail. Agent identity spans services. Human dashboard shows everything. Add a new service → agent automatically has access based on existing capabilities. This is the Google Account moat.

Identity as Revenue Multiplier (Updated with Human Seats)

Section titled “Identity as Revenue Multiplier (Updated with Human Seats)”
ScenarioWithout IdentityWith Identity
Customer uses 1 productEasy to churnEasy to churn
Customer uses 2 products2 integrations1 integration, 2 services
Customer uses 3 products3 integrations1 integration, 3 services
Customer adds new agentN signups, N configs1 signup, inherits org policies
Customer adds human viewerNot possibleInvite → instant dashboard access
5 humans want dashboard accessN/A5 human seats = expansion revenue

Human seats are the expansion revenue lever. Developers adopt for agents. Managers/reviewers get invited → human seats grow → revenue grows.

Competitive Position on Identity (Revised)

Section titled “Competitive Position on Identity (Revised)”
PlayerAgent IdentityHuman IdentityCross-Service?Agent-Human Collaboration?
Fast.ioAgent accounts (storage only)UnknownNoPartial
E2BSession-based (ephemeral)NoNoNo
Box MCPHuman identity (existing Box accounts)Yes (human-first)NoNo (human tools)
Google Workspace StudioGoogle Account (human-first)Yes (human-first)Within Google onlyNo (agents are tools)
Keycard ($38M)Identity layer (no services)NoYes, but no servicesNo
CrowdStrike/SGNLIdentity layer (no services)NoYes, but no servicesNo
UsCross-service agent identityDashboard + rolesYes (mail + storage + skills)Yes (core product)

The gap no one fills: Keycard/SGNL build identity layers but don’t have services or human dashboards. Fast.io has services but single-service identity and limited human features. Google/Microsoft have both but optimized for humans using agents as tools, not agents and humans as co-workers.

We’re the only ones building agent-native identity tied to agent-native services WITH a human collaboration layer. Identity is the moat, but collaboration is why humans adopt. That’s the thesis. Whether we can execute on it is the risk.