May 15, 2026

AI

The Agentic Era Just Got the Authentication Model It Needs

Pieter Kasselman picture
Pieter Kasselman
VP of Open Standards

Workload identity federation has come to AI agents. The agentic identity era starts here.

Using API Keys to access AI platforms was never going to survive the agentic era. Anthropic’s support for Workload Identity Federation is a confirmation of that reality. By supporting Workload Identity Federation, AI agents can now authenticate with short-lived, cryptographically verifiable credentials instead of API Keys. This is a quantum leap in risk reduction and a clear signal of where agentic authentication is heading. 

Read that as a feature announcement and you’ll miss the moment. 

What changed is that Anthropic moved identity from the periphery to the center of how agents authenticate. For most of the agentic era, AI providers have treated agent identity as an afterthought or a problem to be papered over with more secret management, vaults and rotation cadences. As we know from bitter experience over the last two decades, API keys look like set-and-forget but quickly turn into set-and-regret. They look free at issuance and accumulate risk silently. Vaulting helps. Rotation helps. Neither changes the model. A rotated key is still a key.

The cost of staying on that model showed up in the same news cycle. Days after Anthropic’s announcement, Braintrust, an AI evaluation platform that holds customer API keys for cloud-based AI models, disclosed unauthorized access to one of its AWS environments and asked every customer to rotate their keys. The pattern is familiar. A third-party AI tool is compromised, and every customer that trusted it with long-lived API keys spends the week rotating and suffering outages in the process. 

In the age of AI, stolen API Keys are an open line of credit against your AI provider, waiting for someone else to draw on it and hitting the bottom line directly. Earlier this year, Google Cloud developers were hit with five- and six-figure bills after API key abuse, some pushed toward bankruptcy. A stolen API key is both a security incident and a financial one. LLMjacking, the grey-market trafficking of stolen LLM credentials, has built an organized criminal industry on exactly these financial incentives. With Workload Identity Federation, those keys would not have existed to leak.

For enterprises already running AI agents in production, last week’s shift opens two doors at once: a path to retire the API-key debt already on the books, and a way to stop accruing more.

Workload identity federation is becoming the baseline

Workload identity federation has moved from a niche security pattern to the preferred cross-platform enterprise access pattern for workloads and agents. It is rooted in standards and is becoming the baseline for agent authentication because it is platform-neutral and framework-neutral by design. 

The same JWT credential that authenticates an agent to its LLM today can authenticate it to cloud APIs, to on-premise enterprise services, and, with the new emerging standards, to MCP servers. One identity, federated across the agent’s actual operating surface, evaluated by infrastructure the enterprise already operates.

That matters more than it sounds. Most enterprises have already invested in identity infrastructure, federation, attestation, policy engines, audit. Workload identity federation lets agents inherit that investment. There is no need to stand up a parallel API-key infrastructure for AI workloads if you’re using Workload Identity Federation.

What comes next: the patterns that complete the picture

Workload identity federation is the foundation, not the finish. Above it sit four patterns enterprises are now starting to operationalize. This is where the next round of standards and product work is happening.

Decouple identity infrastructure from agent infrastructure. Agent identity belongs in your enterprise non-human identity infrastructure, not the agent platform. Workload Identity Federation lets every platform the agent connects with federate from that single source, eliminating the credential silos and per-platform identity management that would otherwise pile up.

Carry on-behalf-of context. Agents act on behalf of users, often through chains of other agents. Audit trails today show “the agent did it” without recording who it was acting for. Authorization and incident response both the originating user, intermediate agents, and the agent making the final call..

Authorization goes beyond tokens. A token is one input to an authorization decision, not the decision itself. Use tokens to carry relevant context to augment the authorization systems your team already deploys to protect internal and external systems.

Treat authorization as dynamic. Static access lists and annual reviews don’t survive agent velocity. Authorization has to be evaluated in real time, per request, against verifiable identity and current policy — the next frontier, as described in the AI Agent Authentication and Authorization (AIMS) draft.

A baseline, not a finish line

What Anthropic shipped is a baseline, not a finish line. They will not be the last AI provider to support Workload Identity Federation. This is a signal that API Keys, a longtime anti-pattern, is not the way forward for AI agents, identities are.

Above the baseline, four things complete the picture: platform-neutral identity infrastructure, on-behalf-of context, authorization beyond tokens, and dynamic authorization. That’s where the next round of standards and product work happens.

One thing is clear. The agentic era will run on short-lived, cryptographically verifiable identities, not long-lived secrets.

If you’re securing AI agents at scale and want to talk about agentic identity, we’d love to hear from you.