Meet us at RSAC 2026 to explore runtime security for agentic workloads.
Solutions

Agent Identity

Every agent request carries two things: which agent process is running, and whose authority it's acting on. Riptides binds both into a single SPIFFE identity — so you always know who did what, and on whose behalf.

AI Agents Are Anonymous

"An agent deleted a production database record. It took two days to figure out which agent, which user's session triggered it, and whether it happened to anyone else."

— Security Lead, Enterprise SaaS company

No attribution

All your agents use the same credentials. Logs show "agent-service-account" made 10,000 requests. Which agent? Which user? Which workflow? Unknown.

Permissions only grow

The service account gradually accumulates every capability needed by different agents and different users. Removing a permission risks breaking something — so permissions grow. Human lifecycle events never reach the agent's credentials.

No agent-to-agent auth

Multi-agent systems have agents calling each other. Without mutual authentication, any process can impersonate any agent. A compromised agent in a LangGraph pipeline or CrewAI crew can call any other agent in the system.

Incident response is guesswork

Something went wrong. You need to answer: which agent, which user, which action, which time. With shared identities, you're correlating timestamps across logs from different systems and hoping they line up.

Sound familiar?

If you lead IAM or identity security Agent identity is the non-human identity gap that your NHI governance program needs to cover. Every agent is a machine identity — and today they're unmanaged.
If you lead AI/ML platform engineering This is the identity layer your agents need before security will approve multi-agent systems in production.

Composite Agent Identity

Every agent process gets a cryptographic SPIFFE identity — automatically, at the kernel level. When an agent acts on behalf of a user, the human's authorization context is bound to the agent's identity. Downstream services see both: which agent is running, and whose authority it carries.

2

Know who authorized what

When an agent acts on behalf of a user, Riptides binds the human's authorization to the agent's request. Downstream services see both: which agent is running, and whose authority it carries.

3

Identity powers every control

The same identity is used for agent-to-agent authentication, egress policies, credential bindings, and audit logs. One identity, consistent across every system.

What Changes for You

End the confused deputy problem

Every request carries both the agent's workload identity and the delegating human's authorization. Resource servers know exactly who is acting and on whose behalf. When a human's access changes, the agent's delegated authority changes with it.

Per-agent audit trails

Every connection logged with the specific agent's SPIFFE identity, the destination, the policy decision, and the delegating user. Not "service-bot" — the exact agent, the exact user, the exact time.

Agent-to-agent mutual authentication

Every connection between agents in a multi-agent system uses mTLS. Both sides prove their identity cryptographically. A compromised agent cannot impersonate another — the certificate is bound to the process, not a shared secret.

Cryptographic proof, not bearer tokens

SPIFFE SVIDs are X.509 certificates proven via TLS handshake. They can't be stolen via prompt injection, copied from environment variables, or replayed from logs. This is infrastructure-level identity, not application-level tokens.

No code changes, any framework

Works with LangChain, CrewAI, AutoGen, LangGraph, and custom frameworks. The kernel module assigns identity automatically based on process attributes. Learn how →

Why not just...

OAuth tokens or service accounts?

OAuth tokens and service accounts are application-layer credentials that the agent possesses. If the agent is compromised, those credentials are compromised. They're bearer tokens — anything that has them can use them. SPIFFE SVIDs are X.509 certificates bound to the agent process at the kernel level. The agent proves its identity through a TLS handshake, not by presenting a stealable credential. And composite identity — binding human delegation to workload identity — isn't possible with shared service accounts.

Where to Start

The First Step

See Which Agent Is Which

Deploy Riptides on the cluster where your agents run. Each agent process gets a unique identity automatically. Before enforcing any policies, you immediately see per-agent audit trails: which agent made which request, when, and to where.

This is the deployment that answers "which agent did it?" — and gives your NHI governance program coverage for AI agents.

Then Expand

Add egress control

Per-agent access policies based on identity. Different agents get different network permissions. Learn more →

Add credential injection

Per-agent credential bindings replace shared API keys. Learn more →

Bind human delegation

Connect agent identities to the humans who trigger them. End the confused deputy problem for authorization decisions.

Shared Service Accounts vs. Riptides

Shared Service Accounts Riptides Agent Identity
Identity granularity One credential for all agents Unique SPIFFE identity per agent process
Human attribution Lost — agents act as "service-bot" Composite identity: agent + delegating human
Agent-to-agent auth None or shared secret Mutual TLS per agent
Credential type Bearer tokens (stealable) Cryptographic proof (cannot be stolen or replayed)
Permission scoping Union of all agents' needs Per-agent based on individual identity
Incident investigation Correlate timestamps across logs Cryptographic identity on every connection
Lifecycle management Manual; human offboarding doesn't propagate Automatic issuance, rotation, and revocation
Audit posture "We use service accounts" "Every agent has a unique SPIFFE identity tied to the authorizing human"

Ready to secure your
workloads?

Kernel-level identity and enforcement. No code changes. Deploy in minutes.