Skip to main content

Announcing native AI agent support in HashiCorp Vault

HashiCorp Vault now enables enterprises to manage agentic IAM including trusted identities, delegated authorization, fine-grained controls and end-to-end tracing.
A visual summary of Vault's approach to agentic identity management. It shows how safe, authorized agent actions sit right at the center of four key requirements: human policies, agent policies, safety guardrails, and per-request context.

Traditional IAM was designed for deterministic users and workflows. Agentic AI introduces autonomous, non-deterministic actors that require a fundamentally different authorization model, one that combines identity, delegation, runtime policy evaluation, and ephemeral authorization. AI agents require more than access controls; they need access to map closely to their identity via authorization that is temporary and tightly scoped to a specific request’s transaction context.

Traditional identity and access management (IAM) toolsets are facing a gap when it comes to AI agents. Because these traditional systems often rely on static secrets and broad API tokens, they struggle to enforce least privilege for non-deterministic actors. When an agent acts as a proxy for a human without its own distinct identity, it inherits broad scopes. As a result, a single request can unlock access to many possible workflows, leading to long-lived access and a significant security risk of over-authorization.

Figure 1: Traditional IAM models grant broad, long-lived access, creating security risks when agents act without an explicit identity.

As organizations adopt AI agents across their environments, HashiCorp Vault customers are increasingly looking for new identity and security controls designed specifically for autonomous systems, including: 

  • The ability to enforce guardrails for agents that operate less predictably than humans or traditional NHIs 

  • Fine-grained authorization that can be evaluated at runtime and scoped to individual actions or workflows 

  • Clear attribution and auditability for actions performed on behalf of users 

  • A standardized approach for securing AI agents across environments and workflows 

The unique operational and security characteristics of AI agents led us to build new capabilities in Vault designed specifically for agentic workflows. These capabilities include an agent registry, granular identity-based policies for agents, and per-request authorization (ephemeral authorization) controls to reduce risk by granting temporary access rights that expire after a specific task or timeframe.  Select customers are currently evaluating these capabilities through an early access program, with broader public beta availability planned for a future Vault release this summer. 

»Agentic identities: a new primitive in Vault’s agent registry 

The agent registry allows developers to register and manage agent activity separately from human and traditional non-human identities (NHIs). This agent-specific oversight is particularly critical in delegation flows, where an agent utilizes an on-behalf-of (OBO) pattern from a human user with delegation and consent. By ensuring that this delegation is explicitly tracked, the agent registry forms the starting point for a dedicated framework of registration, authorization, credential management, and observability.  

»Enforcing granular identity-based policies 

Least privilege access is a top priority for organizations today, and this is especially true when it comes to agents. Vault addresses this through a rich set of policy-based runtime controls that allow administrators to strictly govern agent activity. Because agent behavior can be non-deterministic, we apply deterministic guardrails and per-request access control. Additionally, because agents often operate in delegation mode – carrying the authority of a human user – Vault must evaluate trust across multiple dimensions as agents use Vault to carry out actions like accessing secrets and credentials for target systems.  

Similar to a Venn diagram, an action is only permitted if it exists within the intersection of these four policy sets:  Human policies: Does the human have access?  Baseline access policies: Does the agent have access?  Ceiling policies: Is the action within the safety limit?  Authorization details: Is the agent asking for access right now?  This addition of transactional context works in concert with the other policies to ensure tight scopes for agents on a per-request basis, actively avoiding the risk of over-authorization.

Figure 2: Authorized actions are determined by the intersection of human, agent, and ceiling policies, as well as per-request authorization details. 

In this model, authorization is determined by the intersection of three policy layers: the human owner’s policies, the agent’s baseline access policies, and a set of overriding ceiling policies. These ceiling policies apply specifically to delegation flows and establish an absolute blast radius, defining the maximum permissions an agent can ever possess when acting on behalf of a human, regardless of other settings. Much like a Venn diagram, an action is only permitted if it exists within the intersection of these policy sets. 

»Ephemeral authorization: scoping access to each agentic request 

The policy intersection defines the maximum set of actions an agent can take. In addition, Vault now supports per-request authorization to provide tight scopes for agents, a capability built into the authorization token (based on OAuth 2.0 Rich Authorization Request specification). This addition of transaction context works in concert with ceiling policies, allowing customers to limit what access credentials are granted on a per-request basis to avoid the risk of over-authorization.   

To enable ephemeral authorization, the Authorization Server specifies a set of permissions in the authorization_details claim of the JWT’s body. This binds the permission to the token’s lifecycle rather than the agent’s identity, so when the token expires, the agent cannot take further action. This provides per-request resource control that is more secure than entity-based policies alone. Rather than issuing broadly scoped standing permissions, Vault evaluates authorization in the context of a specific request or workflow.  

As an illustration, the following JWT claim could be set to allow access to a specific secret in a Vault KV mount called ‘secrets’:

"authorization_details": [
  {
    "action": "read",
    "path_constraint": "secrets/my-secret",
    "type": "vault:path_access"
  }
],
To secure AI agent actions and prevent over-authorization, Vault now supports per-request authorization to provide tight scopes for agents. When a human delegates access, Vault evaluates tamper-proof, per-request authorization details that are part of the authorization token itself. This transaction context ensures that authorization is strictly scoped to a single request or a single workflow, rather than granting access to all possible workflows. This allows organizations to connect identity, access, and execution, ensuring every agent action is explicitly authorized and auditable at runtime.

Figure 3: Vault utilizes ephemeral, per-request authorization to tightly scope AI agent access on demand.

Vault can evaluate tamper-proof, per-request authorization details that are part of the authorization token itself. This means that authorization can be scoped to a single request or a single workflow, instead of all possible workflows. Because this model removes the need for a separate token exchange, it reduces operational complexity and simplifies tracking agents' actions. 

»Learn more 

As AI agents move into production systems, static secrets and broad API tokens are no longer sufficient. Organizations now require runtime identity, bounded delegation, and authorization models designed for autonomous actors. Vault’s emerging agentic identity capabilities secure this transition by ensuring that each agent action is attributable to a specific identity, auditable, and governed by real-time enforcement. This expands Vault’s role from managing secrets and machine identities to governing runtime trust for autonomous systems. Learn more on our use case page

Native support for AI agents in Vault is currently available to a limited set of customers through an early access program. We expect these capabilities to enter public beta this summer in HashiCorp Vault, so check back soon for additional updates and availability details.

More posts like this