AI Identity for Agentic Systems: Integrating PAM and IAM for Secure Autonomy
DOI:
https://doi.org/10.22399/ijcesen.4985Keywords:
Agentic AI Identity, Privileged Access Management, Identity and Access Management, Autonomous Systems Governance, Non-Human Identity ManagementAbstract
Agentic AI systems, as autonomous agents that make decisions and take actions in enterprise environments, raise identity governance questions regarding agents that maintain state, collaborate, and request escalation of privileges to perform complex activities, different from the questions that human actors, service accounts, and API tokens raise in identity governance contexts. The article outlines the existing challenges of establishing customary IAM for agentic AI and proposes a thorough framework building on IAM and PAM elements for holistic oversight of agentic AI. This framework entails considering agentic AI as first-class identity subjects, being responsible for their lifecycle, and dynamically provisioning their credentials. It also provides context-aware policy enforcement and continuous behavior monitoring. Augmenting IAM's identity controls with PAM's privileged operations governance satisfies operational autonomy and security requirements, increases accountability and compliance, and ensures the trustworthiness of autonomous AI operations while countering privileged credential theft, privilege escalation, and audit trail deficiencies stemming from customary identity-centric approaches to PCC management of autonomous AI operations.
References
[1] Soodeh Hosseini and Seilani Hossein, "The role of agentic AI in shaping a smart future: A systematic review," Array, 2025. Available: https://www.sciencedirect.com/science/article/pii/S2590005625000268
[2] Andras Cser, "The Forrester Wave™: Privileged Identity Management, Q4 2018," Forrester Research, 2018. Available: https://softprom.com/sites/default/files/The%20Forrester%20Wave%E2%84%A2_%20Privileged%20Identity%20Management%2C%20Q4%202018.pdf
[3] Badal Bhushan, "An Explainable Zero Trust Identity Framework for LLMs, AI Agents, and Agentic AI Systems," EuroLexis Research Index Library For Open Access Journals, 2025. Available: https://www.ijcaonline.org/archives/volume187/number46/bhushan-2025-ijca-925777.pdf
[4] Erhan Yilmaz, "Machine Identity Management in Modern Enterprise Security: Concepts, Challenges, and the Role of Privileged Access Management Systems," Engineering, Technology & Applied Science Research, 2026. Available: https://etasr.com/index.php/ETASR/article/download/16202/6268
[5] Sahaya Jestus Lazer et al., "A Survey of Agentic AI and Cybersecurity: Challenges, Opportunities, and Use-Case Prototypes," arXiv preprint arXiv:2601.05293, 2026. Available: https://arxiv.org/pdf/2601.05293
[6] Ramanan Hariharan, "AI-Driven Identity and Access Management in Enterprise Systems," International Journal of IoT, 2025. Available: https://inlibrary.uz/index.php/Ijiot/article/download/114074/115754
[7] Surendra Vitla, "The Future of Identity and Access Management: Leveraging AI for Enhanced Security and Efficiency," Journal of Computer Science and Technology Studies, 2024. Available: https://al-kindipublishers.org/index.php/jcsts/article/download/8619/7322
[8] Oluchukwu Modesta Oluoha et al., "Designing advanced digital solutions for privileged access management and continuous compliance monitoring," World Scientific News, 2025. Available: https://worldscientificnews.com/wp-content/uploads/2025/05/WSN-203-2025-256-301.pdf
[9] Prakash Somasundaram, "Unified Secret Management Across Cloud Platforms: A Strategy for Secure Credential Storage and Access," International Journal of Computer Engineering and Technology, 2024. Available: https://www.researchgate.net/profile/Prakash-Somasundaram/publication/379435761_Unified_Secret_Management_Across_Cloud_Platforms_a_Strategy_for_Secure_Credential_Storage_and_Access/links/6608f46b390c214cfd2b056d/Unified-Secret-Management-Across-Cloud-Platforms-a-Strategy-for-Secure-Credential-Storage-and-Access.pdf
[10] Ian Coston et al., "Enhancing secure software development with AZTRM-D: An AI-integrated approach combining DevSecOps, risk management, and zero trust," Applied Sciences, 2025. Available: https://www.mdpi.com/2076-3417/15/15/8163
[11] Samson Oruma et al., "Architectural views for social robots in public spaces: business, system, and security strategies," International Journal of Information Security, 2024. Available: https://link.springer.com/content/pdf/10.1007/s10207-024-00924-x.pdf
[12] Shadma Parveen et al., "Integration of identity governance and management framework within universities for privileged users," International Journal of Advanced Computer Science and Applications, 2021. Available: https://www.researchgate.net/profile/Sultan-Ahmad/publication/353079051
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.