You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/agent-id/identity-platform/agent-identities.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ An account used by an AI agent is referred to as an **agent identity**. Much lik
38
38
39
39
-**Blueprint**. All agent identities are created from a reusable template called an agent identity blueprint. The agent identity blueprint establishes the kind of agent and records metadata shared across all agent identities of a common kind.
40
40
41
-
-**Agent user (optional)**. Some agents need access to systems that strictly require a Microsoft Entra user account be used for authentication. In these cases, an agent can be given a second account, called an **agent user**. This second account is a user account in the Microsoft Entra tenant that is decorated as an AI agent. It has a different `id` than the agent identity, but a 1:1 relationship is always established between an agent identity and its agent user.
41
+
-**Agent's user account (optional)**. Some agents need access to systems that strictly require a Microsoft Entra user account be used for authentication. In these cases, an agent can be given a second account, called an **agent's user account**. This second account is a user account in the Microsoft Entra tenant that is decorated as an AI agent. It has a different `id` than the agent identity, but a 1:1 relationship is always established between an agent identity and its agent's user account.
42
42
43
43
These are the basic components of an agent identity that enable secure authentication and authorization. The full object schema of an agent identity is available in Microsoft Graph reference documentation.
Copy file name to clipboardExpand all lines: docs/agent-id/identity-platform/agent-owners-sponsors-managers.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.reviewer: jawoods
12
12
13
13
# Administrative relationships in Microsoft Entra Agent ID (Owners, sponsors, and managers)
14
14
15
-
The Microsoft agent identity platform introduces an administrative model that separates technical administration from business accountability, ensuring operational control and compliance oversight without excessive permissions. This document explains the administrative relationships for Microsoft Entra Agent ID identity types. This guidance applies to [agent identities](/graph/api/resources/agentidentity?view=graph-rest-beta&preserve-view=true), [agent identity blueprints](/graph/api/resources/agentidentityblueprint?view=graph-rest-beta&preserve-view=true), [agent identity blueprint principals](/graph/api/resources/agentidentityblueprintprincipal?view=graph-rest-beta&preserve-view=true), and [agent users](/graph/api/resources/agentuser?view=graph-rest-beta&preserve-view=true). The article covers owners, sponsors, and managers and their importance in maintaining secure operations.
15
+
The Microsoft agent identity platform introduces an administrative model that separates technical administration from business accountability, ensuring operational control and compliance oversight without excessive permissions. This document explains the administrative relationships for Microsoft Entra Agent ID identity types. This guidance applies to [agent identities](/graph/api/resources/agentidentity?view=graph-rest-beta&preserve-view=true), [agent identity blueprints](/graph/api/resources/agentidentityblueprint?view=graph-rest-beta&preserve-view=true), [agent identity blueprint principals](/graph/api/resources/agentidentityblueprintprincipal?view=graph-rest-beta&preserve-view=true), and [agents' user accounts](/graph/api/resources/agentuser?view=graph-rest-beta&preserve-view=true). The article covers owners, sponsors, and managers and their importance in maintaining secure operations.
16
16
17
17
The administrative relationships available in Agent ID include:
18
18
@@ -60,7 +60,7 @@ Sponsors are usually business owners, product managers, team leads, or stakehold
60
60
61
61
## Manager
62
62
63
-
Managers are individual users responsible for an agent identity within the organizational hierarchy. For agents that are active in user scenarios, consider setting a manager on the agent user. Managers can request access packages for their agent users, and will see agents designated as reporting to them in the Microsoft Entra admin center. Managers don't have authorization to modify or delete agents; owners, sponsors, or administrators are required to take those actions.
63
+
Managers are individual users responsible for an agent identity within the organizational hierarchy. For agents that are active in user scenarios, consider setting a manager on the agent's user account. Managers can request access packages for their agents' user accounts, and will see agents designated as reporting to them in the Microsoft Entra admin center. Managers don't have authorization to modify or delete agents; owners, sponsors, or administrators are required to take those actions.
Copy file name to clipboardExpand all lines: docs/agent-id/identity-platform/agent-service-principals.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,4 +78,4 @@ Agent service principals support both application permissions (for app-only oper
78
78
79
79
Agent service principals maintain distinct identities in audit logs and sign-in reports. When an agent identity performs operations, the logs show the agent identity as the acting client while indicating the relationship to the parent agent identity blueprint.
80
80
81
-
Sign-in logs differentiate between agent identity blueprints, agent identities, and agent users. This differentiation enables clear role identification (client, credential, subject) depending on the specific operation being performed. This enables audit trails for agent operations.
81
+
Sign-in logs differentiate between agent identity blueprints, agent identities, and agents' user accounts. This differentiation enables clear role identification (client, credential, subject) depending on the specific operation being performed. This enables audit trails for agent operations.
|`tid`| Tenant ID of the customer tenant where the agent identity is registered. It's the tenant where the token is valid. |
62
62
|`sub`| Subject (the user, service principal, or agent identity being authenticated) |
63
-
|`oid`| Object ID of the subject. User object ID for user delegation scenarios. Agent ID service principal OID for app-only scenarios. Agent user OID for user impersonation scenarios. |
63
+
|`oid`| Object ID of the subject. User object ID for user delegation scenarios. Agent ID service principal OID for app-only scenarios. Agent's user account OID for user impersonation scenarios. |
64
64
|`idtyp`| Type of entity the subject is. Values are `user`, `app`. |
65
65
|`tid`| Tenant ID of the customer tenant where the agent identity is registered. |
66
66
|`xms_idrel`| Relationship between the subject and the resource tenant. Learn [more](#xms_idrel). |
67
67
|`aud`| Audience (the API that the agent is trying to access) |
68
68
|`azp` or `appid`| Authorized party / actor. The application ID of the agent identity. Enables proper client attribution in audit logs. |
69
-
|`scp`| Scope. Delegated permissions for user-context tokens. Only present in user delegation and agent user scenarios. Empty or `/` for app-only scenarios |
69
+
|`scp`| Scope. Delegated permissions for user-context tokens. Only present in user delegation and agent's user account scenarios. Empty or `/` for app-only scenarios |
70
70
|`xms_act_fct`| Actor facets claim. Learn [more](#xms_tnt_fct-xms_sub_fct-and-xms_act_fct-claims). |
@@ -153,9 +153,9 @@ In this scenario, the agent identity acts using its own identity. The access tok
153
153
|`aud`| Resource audience for the token |
154
154
|`scp`| Empty or `/` (unscoped). |
155
155
156
-
### Agent identity acts autonomously via agent user
156
+
### Agent identity acts autonomously via agent's user account
157
157
158
-
In this scenario, the agent obtains a token using the agent user associated with its agent identity. The access token includes the following claims:
158
+
In this scenario, the agent obtains a token using the agent's user account associated with its agent identity. The access token includes the following claims:
### Tokens in agent's user account impersonation scenarios
65
65
66
-
Agent user impersonation scenarios enable agent users to operate like human users. These tokens support scenarios where agents need user-like context but with controlled, predefined identities.
66
+
Agent's user account impersonation scenarios enable the agent's user account to operate like a human user. These tokens support scenarios where agents need user-like context but with controlled, predefined identities.
67
67
68
68
In this scenario, tokens have the following key characteristics:
69
69
70
-
- Use specialized agent user identities
70
+
- Use specialized agent's user account identities
71
71
- Maintain user-context behavior patterns
72
72
- Include scoped delegated permissions
73
73
- Require explicit assignment to agent identities
74
74
75
-
In this scenario, the agent identity blueprint impersonates the agent identity, which then impersonates the assigned agent user. Access is scoped to delegated permissions assigned to the agent identity, ensuring the agent can't exceed its granted permissions even when operating with user context. Agent users can only be used when assigned to an agent identity and can't authenticate independently.
75
+
In this scenario, the agent identity blueprint impersonates the agent identity, which then impersonates the assigned agent's user account. Access is scoped to delegated permissions assigned to the agent identity, ensuring the agent can't exceed its granted permissions even when operating with user context. The agent's user account can only be used when assigned to an agent identity and can't authenticate independently.
76
76
77
77
## Nonagentic API integration
78
78
@@ -112,7 +112,7 @@ Example of the validation process would be to do the following actions:
112
112
HttpContext.User.GetParentAgentBlueprint()
113
113
```
114
114
115
-
-Checkifatokenwasissuedfor an agent user identity.
115
+
-Checkifatokenwasissuedfor an agent's user account identity.
Copy file name to clipboardExpand all lines: docs/agent-id/identity-platform/agent-user-oauth-flow.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,17 @@
1
1
---
2
-
title: Agent user impersonation protocol
3
-
description: Learn how agent identities operate with user context through agent users using the agent user impersonation protocol with OAuth 2.0 token exchange.
2
+
title: Agent's user account impersonation protocol
3
+
description: Learn how agent identities operate with user context through an agent's user account using the agent's user account impersonation protocol with OAuth 2.0 token exchange.
4
4
titleSuffix: Microsoft Entra Agent ID
5
5
ms.topic: concept-article
6
6
ms.date: 10/30/2025
7
7
ms.custom: agent-id-ignite
8
8
ms.reviewer: jmprieur
9
-
#Customer intent: As a developer implementing agent user scenarios, I want to understand the agent user impersonation protocol so that I can enable agents to operate with user context and delegated permissions.
9
+
#Customer intent: As a developer implementing agent's user account scenarios, I want to understand the agent's user account impersonation protocol so that I can enable agents to operate with user context and delegated permissions.
10
10
---
11
11
12
-
# Agent user impersonation protocol
12
+
# Agent's user account impersonation protocol
13
13
14
-
Agent user impersonation enables agent identities to operate with user context through agent users, combining user permissions with autonomous operation. In this scenario, an agent identity blueprint (actor 1) impersonates an agent identity (actor 2) that impersonates an agent user (subject) using FIC. Access is scoped to delegations assigned to the agent identity. Agent user can be impersonated only by a single agent identity.
14
+
Agent's user account impersonation enables agent identities to operate with user context through an agent's user account, combining user permissions with autonomous operation. In this scenario, an agent identity blueprint (actor 1) impersonates an agent identity (actor 2) that impersonates an agent's user account (subject) using FIC. Access is scoped to delegations assigned to the agent identity. The agent's user account can be impersonated only by a single agent identity.
15
15
16
16
[!INCLUDE [Use Microsoft SDKs](./includes/use-microsoft-libraries.md)]
17
17
@@ -21,7 +21,7 @@ Agent user impersonation enables agent identities to operate with user context t
21
21
22
22
Then following are the protocol steps.
23
23
24
-
:::image type="content" source="media/agent-user-oauth-flow/agent-user-flow.png" alt-text="Diagram showing the illustration of agent user token acquisition flow for agents.":::
24
+
:::image type="content" source="media/agent-user-oauth-flow/agent-user-flow.png" alt-text="Diagram showing the illustration of agent's user account token acquisition flow for agents.":::
25
25
26
26
1. The agent identity blueprint requests an exchange token (T1) that it uses for agent identity impersonation. The agent identity blueprint presents client credentials that could be a secret, a certificate, or a managed identity token used as an FIC.
27
27
@@ -41,7 +41,7 @@ Then following are the protocol steps.
41
41
42
42
Where TUAMI is the MSI token for user assigned managed identity (UAMI). This returns token T1.
43
43
44
-
1. The agent identity requests a token (T2) that it uses for agent user impersonation. The agent identity presents T1 as its client assertion. Microsoft Entra ID returns T2 to the agent identity after validating that T1 (aud) == Agent identity parent app == Agent identity blueprint.
44
+
1. The agent identity requests a token (T2) that it uses for agent's user account impersonation. The agent identity presents T1 as its client assertion. Microsoft Entra ID returns T2 to the agent identity after validating that T1 (aud) == Agent identity parent app == Agent identity blueprint.
45
45
46
46
```
47
47
POST /oauth2/v2.0/token
@@ -66,18 +66,18 @@ Then following are the protocol steps.
1. Microsoft Entra ID then issues the resource token.
76
76
77
77
### Sequence diagram
78
78
79
-
The following sequence diagram shows the agent user impersonation flow
79
+
The following sequence diagram shows the agent's user account impersonation flow
80
80
81
-
:::image type="content" source="media/agent-user-oauth-flow/agent-user-flow-token-sequence.png" alt-text="Diagram showing the token sequence of agent user token acquisition flow for agents.":::
81
+
:::image type="content" source="media/agent-user-oauth-flow/agent-user-flow-token-sequence.png" alt-text="Diagram showing the token sequence of agent's user account token acquisition flow for agents.":::
82
82
83
-
Agent user impersonation requires credential chaining that follows the pattern agent identity blueprint → Agent identity → Agent user. Each step in this chain uses the token from the previous step as a credential, creating a secure delegation pathway. The same client ID must be used for both phases to prevent privilege escalation attacks.
83
+
Agent's user account impersonation requires credential chaining that follows the pattern agent identity blueprint → Agent identity → Agent's user account. Each step in this chain uses the token from the previous step as a credential, creating a secure delegation pathway. The same client ID must be used for both phases to prevent privilege escalation attacks.
0 commit comments