Skip to content

Commit 7a6f3de

Browse files
Merge pull request #12284 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-26 22:10 UTC
2 parents ee5ba02 + fbd9092 commit 7a6f3de

File tree

94 files changed

+293
-279
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

94 files changed

+293
-279
lines changed

docs/agent-id/identity-platform/agent-autonomous-app-oauth-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,4 +68,4 @@ The following is a sequence diagram for the app-only flow:
6868
6969
- [Oauth2.0 flows for agents](./agent-oauth-protocols.md)
7070
- [On-behalf-of flow in agents](./agent-on-behalf-of-oauth-flow.md)
71-
- [Agent user flow in agents](./agent-user-oauth-flow.md)
71+
- [Agent's user account flow in agents](./agent-user-oauth-flow.md)

docs/agent-id/identity-platform/agent-identities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ An account used by an AI agent is referred to as an **agent identity**. Much lik
3838

3939
- **Blueprint**. All agent identities are created from a reusable template called an agent identity blueprint. The agent identity blueprint establishes the kind of agent and records metadata shared across all agent identities of a common kind.
4040

41-
- **Agent user (optional)**. Some agents need access to systems that strictly require a Microsoft Entra user account be used for authentication. In these cases, an agent can be given a second account, called an **agent user**. This second account is a user account in the Microsoft Entra tenant that is decorated as an AI agent. It has a different `id` than the agent identity, but a 1:1 relationship is always established between an agent identity and its agent user.
41+
- **Agent's user account (optional)**. Some agents need access to systems that strictly require a Microsoft Entra user account be used for authentication. In these cases, an agent can be given a second account, called an **agent's user account**. This second account is a user account in the Microsoft Entra tenant that is decorated as an AI agent. It has a different `id` than the agent identity, but a 1:1 relationship is always established between an agent identity and its agent's user account.
4242

4343
These are the basic components of an agent identity that enable secure authentication and authorization. The full object schema of an agent identity is available in Microsoft Graph reference documentation.
4444

docs/agent-id/identity-platform/agent-oauth-protocols.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,4 +63,4 @@ There are three agent oauth flows:
6363

6464
- [Agent on-behalf of flow](./agent-on-behalf-of-oauth-flow.md): Agents operating on behalf of regular users (interactive agents).
6565
- [Autonomous app flow](./agent-autonomous-app-oauth-flow.md): App-only operations enable agent identities to act autonomously without user context.
66-
- [Agent user flow](./agent-user-oauth-flow.md): Agents operating on their own behalf using user principals created specifically for agents.
66+
- [Agent's user account flow](./agent-user-oauth-flow.md): Agents operating on their own behalf using user principals created specifically for agents.

docs/agent-id/identity-platform/agent-on-behalf-of-oauth-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,4 +96,4 @@ Agent identities can inherit delegated permissions from their parent agent ident
9696
9797
- [Oauth2.0 flows for agents](./agent-oauth-protocols.md)
9898
- [Autonomous app flow in agents](./agent-autonomous-app-oauth-flow.md)
99-
- [Agent user flow in agents](./agent-user-oauth-flow.md)
99+
- [Agent's user account flow in agents](./agent-user-oauth-flow.md)

docs/agent-id/identity-platform/agent-owners-sponsors-managers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.reviewer: jawoods
1212

1313
# Administrative relationships in Microsoft Entra Agent ID (Owners, sponsors, and managers)
1414

15-
The Microsoft agent identity platform introduces an administrative model that separates technical administration from business accountability, ensuring operational control and compliance oversight without excessive permissions. This document explains the administrative relationships for Microsoft Entra Agent ID identity types. This guidance applies to [agent identities](/graph/api/resources/agentidentity?view=graph-rest-beta&preserve-view=true), [agent identity blueprints](/graph/api/resources/agentidentityblueprint?view=graph-rest-beta&preserve-view=true), [agent identity blueprint principals](/graph/api/resources/agentidentityblueprintprincipal?view=graph-rest-beta&preserve-view=true), and [agent users](/graph/api/resources/agentuser?view=graph-rest-beta&preserve-view=true). The article covers owners, sponsors, and managers and their importance in maintaining secure operations.
15+
The Microsoft agent identity platform introduces an administrative model that separates technical administration from business accountability, ensuring operational control and compliance oversight without excessive permissions. This document explains the administrative relationships for Microsoft Entra Agent ID identity types. This guidance applies to [agent identities](/graph/api/resources/agentidentity?view=graph-rest-beta&preserve-view=true), [agent identity blueprints](/graph/api/resources/agentidentityblueprint?view=graph-rest-beta&preserve-view=true), [agent identity blueprint principals](/graph/api/resources/agentidentityblueprintprincipal?view=graph-rest-beta&preserve-view=true), and [agents' user accounts](/graph/api/resources/agentuser?view=graph-rest-beta&preserve-view=true). The article covers owners, sponsors, and managers and their importance in maintaining secure operations.
1616

1717
The administrative relationships available in Agent ID include:
1818

@@ -60,7 +60,7 @@ Sponsors are usually business owners, product managers, team leads, or stakehold
6060

6161
## Manager
6262

63-
Managers are individual users responsible for an agent identity within the organizational hierarchy. For agents that are active in user scenarios, consider setting a manager on the agent user. Managers can request access packages for their agent users, and will see agents designated as reporting to them in the Microsoft Entra admin center. Managers don't have authorization to modify or delete agents; owners, sponsors, or administrators are required to take those actions.
63+
Managers are individual users responsible for an agent identity within the organizational hierarchy. For agents that are active in user scenarios, consider setting a manager on the agent's user account. Managers can request access packages for their agents' user accounts, and will see agents designated as reporting to them in the Microsoft Entra admin center. Managers don't have authorization to modify or delete agents; owners, sponsors, or administrators are required to take those actions.
6464

6565
## Requirements and constraints
6666

docs/agent-id/identity-platform/agent-service-principals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,4 +78,4 @@ Agent service principals support both application permissions (for app-only oper
7878

7979
Agent service principals maintain distinct identities in audit logs and sign-in reports. When an agent identity performs operations, the logs show the agent identity as the acting client while indicating the relationship to the parent agent identity blueprint.
8080

81-
Sign-in logs differentiate between agent identity blueprints, agent identities, and agent users. This differentiation enables clear role identification (client, credential, subject) depending on the specific operation being performed. This enables audit trails for agent operations.
81+
Sign-in logs differentiate between agent identity blueprints, agent identities, and agents' user accounts. This differentiation enables clear role identification (client, credential, subject) depending on the specific operation being performed. This enables audit trails for agent operations.

docs/agent-id/identity-platform/agent-token-claims.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -60,13 +60,13 @@ You'd notice that the token includes a few claims that aren't previously seen in
6060
| ----------------- | ------------------------------------------------------------------------------------- |
6161
| `tid` | Tenant ID of the customer tenant where the agent identity is registered. It's the tenant where the token is valid. |
6262
| `sub` | Subject (the user, service principal, or agent identity being authenticated) |
63-
| `oid` | Object ID of the subject. User object ID for user delegation scenarios. Agent ID service principal OID for app-only scenarios. Agent user OID for user impersonation scenarios. |
63+
| `oid` | Object ID of the subject. User object ID for user delegation scenarios. Agent ID service principal OID for app-only scenarios. Agent's user account OID for user impersonation scenarios. |
6464
| `idtyp` | Type of entity the subject is. Values are `user`, `app`. |
6565
| `tid` | Tenant ID of the customer tenant where the agent identity is registered. |
6666
| `xms_idrel` | Relationship between the subject and the resource tenant. Learn [more](#xms_idrel). |
6767
| `aud` | Audience (the API that the agent is trying to access) |
6868
| `azp` or `appid` | Authorized party / actor. The application ID of the agent identity. Enables proper client attribution in audit logs. |
69-
| `scp` | Scope. Delegated permissions for user-context tokens. Only present in user delegation and agent user scenarios. Empty or `/` for app-only scenarios |
69+
| `scp` | Scope. Delegated permissions for user-context tokens. Only present in user delegation and agent's user account scenarios. Empty or `/` for app-only scenarios |
7070
| `xms_act_fct` | Actor facets claim. Learn [more](#xms_tnt_fct-xms_sub_fct-and-xms_act_fct-claims). |
7171
| `xms_sub_fct` | Subject facets claim. Learn [more](#xms_tnt_fct-xms_sub_fct-and-xms_act_fct-claims) . |
7272
| `xms_tnt_fct` | Tenant facets claim. Learn [more](#xms_tnt_fct-xms_sub_fct-and-xms_act_fct-claims) . |
@@ -153,9 +153,9 @@ In this scenario, the agent identity acts using its own identity. The access tok
153153
| `aud` | Resource audience for the token |
154154
| `scp` | Empty or `/` (unscoped). |
155155

156-
### Agent identity acts autonomously via agent user
156+
### Agent identity acts autonomously via agent's user account
157157

158-
In this scenario, the agent obtains a token using the agent user associated with its agent identity. The access token includes the following claims:
158+
In this scenario, the agent obtains a token using the agent's user account associated with its agent identity. The access token includes the following claims:
159159

160160
| Claim Name | Description |
161161
| ------------- | --------------------------------------------------- |
@@ -164,7 +164,7 @@ In this scenario, the agent obtains a token using the agent user associated with
164164
| `xms_idrel` | `1` (indicating a member user; others possible too) |
165165
| `azp` / `appid` | Application ID of the agent identity |
166166
| `scp` | Delegated permissions granted to the agent identity |
167-
| `oid` | Object ID of the agent user |
167+
| `oid` | Object ID of the agent's user account |
168168
| `xms_act_fct` | `11` (Agent identity) |
169-
| `xms_sub_fct` | `13` (Agent user) |
169+
| `xms_sub_fct` | `13` (Agent's user account) |
170170
| `aud` | Resource audience for the token |

docs/agent-id/identity-platform/agent-tokens.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ These tokens enable secure communication between:
1919

2020
- Agent identity blueprints and their agent identities
2121
- Agent identities and resource APIs
22-
- Agent users and the services they interact with
22+
- Agents' user accounts and the services they interact with
2323
- Complex delegation chains involving multiple agent entities
2424

2525
## Token claims entity identifiers
@@ -61,18 +61,18 @@ In this scenario, tokens have the following key characteristics:
6161
- Enable unscoped access within granted permission boundaries. Delegated permissions aren't applied.
6262
- Support fully autonomous background operations
6363

64-
### Tokens in agent user impersonation scenarios
64+
### Tokens in agent's user account impersonation scenarios
6565

66-
Agent user impersonation scenarios enable agent users to operate like human users. These tokens support scenarios where agents need user-like context but with controlled, predefined identities.
66+
Agent's user account impersonation scenarios enable the agent's user account to operate like a human user. These tokens support scenarios where agents need user-like context but with controlled, predefined identities.
6767

6868
In this scenario, tokens have the following key characteristics:
6969

70-
- Use specialized agent user identities
70+
- Use specialized agent's user account identities
7171
- Maintain user-context behavior patterns
7272
- Include scoped delegated permissions
7373
- Require explicit assignment to agent identities
7474

75-
In this scenario, the agent identity blueprint impersonates the agent identity, which then impersonates the assigned agent user. Access is scoped to delegated permissions assigned to the agent identity, ensuring the agent can't exceed its granted permissions even when operating with user context. Agent users can only be used when assigned to an agent identity and can't authenticate independently.
75+
In this scenario, the agent identity blueprint impersonates the agent identity, which then impersonates the assigned agent's user account. Access is scoped to delegated permissions assigned to the agent identity, ensuring the agent can't exceed its granted permissions even when operating with user context. The agent's user account can only be used when assigned to an agent identity and can't authenticate independently.
7676

7777
## Nonagentic API integration
7878

@@ -112,7 +112,7 @@ Example of the validation process would be to do the following actions:
112112
HttpContext.User.GetParentAgentBlueprint()
113113
```
114114

115-
- Check if a token was issued for an agent user identity.
115+
- Check if a token was issued for an agent's user account identity.
116116

117117
```csharp
118118
HttpContext.User.IsAgentUserIdentity()

docs/agent-id/identity-platform/agent-user-oauth-flow.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Agent user impersonation protocol
3-
description: Learn how agent identities operate with user context through agent users using the agent user impersonation protocol with OAuth 2.0 token exchange.
2+
title: Agent's user account impersonation protocol
3+
description: Learn how agent identities operate with user context through an agent's user account using the agent's user account impersonation protocol with OAuth 2.0 token exchange.
44
titleSuffix: Microsoft Entra Agent ID
55
ms.topic: concept-article
66
ms.date: 10/30/2025
77
ms.custom: agent-id-ignite
88
ms.reviewer: jmprieur
9-
#Customer intent: As a developer implementing agent user scenarios, I want to understand the agent user impersonation protocol so that I can enable agents to operate with user context and delegated permissions.
9+
#Customer intent: As a developer implementing agent's user account scenarios, I want to understand the agent's user account impersonation protocol so that I can enable agents to operate with user context and delegated permissions.
1010
---
1111

12-
# Agent user impersonation protocol
12+
# Agent's user account impersonation protocol
1313

14-
Agent user impersonation enables agent identities to operate with user context through agent users, combining user permissions with autonomous operation. In this scenario, an agent identity blueprint (actor 1) impersonates an agent identity (actor 2) that impersonates an agent user (subject) using FIC. Access is scoped to delegations assigned to the agent identity. Agent user can be impersonated only by a single agent identity.
14+
Agent's user account impersonation enables agent identities to operate with user context through an agent's user account, combining user permissions with autonomous operation. In this scenario, an agent identity blueprint (actor 1) impersonates an agent identity (actor 2) that impersonates an agent's user account (subject) using FIC. Access is scoped to delegations assigned to the agent identity. The agent's user account can be impersonated only by a single agent identity.
1515

1616
[!INCLUDE [Use Microsoft SDKs](./includes/use-microsoft-libraries.md)]
1717

@@ -21,7 +21,7 @@ Agent user impersonation enables agent identities to operate with user context t
2121

2222
Then following are the protocol steps.
2323

24-
:::image type="content" source="media/agent-user-oauth-flow/agent-user-flow.png" alt-text="Diagram showing the illustration of agent user token acquisition flow for agents.":::
24+
:::image type="content" source="media/agent-user-oauth-flow/agent-user-flow.png" alt-text="Diagram showing the illustration of agent's user account token acquisition flow for agents.":::
2525

2626
1. The agent identity blueprint requests an exchange token (T1) that it uses for agent identity impersonation. The agent identity blueprint presents client credentials that could be a secret, a certificate, or a managed identity token used as an FIC.
2727

@@ -41,7 +41,7 @@ Then following are the protocol steps.
4141
4242
Where TUAMI is the MSI token for user assigned managed identity (UAMI). This returns token T1.
4343
44-
1. The agent identity requests a token (T2) that it uses for agent user impersonation. The agent identity presents T1 as its client assertion. Microsoft Entra ID returns T2 to the agent identity after validating that T1 (aud) == Agent identity parent app == Agent identity blueprint.​
44+
1. The agent identity requests a token (T2) that it uses for agent's user account impersonation. The agent identity presents T1 as its client assertion. Microsoft Entra ID returns T2 to the agent identity after validating that T1 (aud) == Agent identity parent app == Agent identity blueprint.​
4545
4646
```
4747
POST /oauth2/v2.0/token
@@ -66,18 +66,18 @@ Then following are the protocol steps.
6666
&scope=https://resource.example.com/scope1
6767
&client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer
6868
&client_assertion={T1}
69-
&assertion={T2}
69+
&user_federated_identity_credential={T2}
7070
&username=agentuser@contoso.com
71-
&grant_type=urn:ietf:params:oauth:grant-type:jwt-bearer
71+
&grant_type=user_fic
7272
&requested_token_use=on_behalf_of
7373
```
7474
7575
1. Microsoft Entra ID then issues the resource token.
7676
7777
### Sequence diagram
7878
79-
The following sequence diagram shows the agent user impersonation flow
79+
The following sequence diagram shows the agent's user account impersonation flow
8080
81-
:::image type="content" source="media/agent-user-oauth-flow/agent-user-flow-token-sequence.png" alt-text="Diagram showing the token sequence of agent user token acquisition flow for agents.":::
81+
:::image type="content" source="media/agent-user-oauth-flow/agent-user-flow-token-sequence.png" alt-text="Diagram showing the token sequence of agent's user account token acquisition flow for agents.":::
8282
83-
Agent user impersonation requires credential chaining that follows the pattern agent identity blueprint → Agent identity → Agent user. Each step in this chain uses the token from the previous step as a credential, creating a secure delegation pathway. The same client ID must be used for both phases to prevent privilege escalation attacks.
83+
Agent's user account impersonation requires credential chaining that follows the pattern agent identity blueprint → Agent identity → Agent's user account. Each step in this chain uses the token from the previous step as a credential, creating a secure delegation pathway. The same client ID must be used for both phases to prevent privilege escalation attacks.

0 commit comments

Comments
 (0)