Understand agent identities and permissions
Agents in Microsoft Security Copilot need an identity to authenticate and access resources when they run. The identity determines what data the agent can access and what actions it can perform. Understanding how identities and permissions work for agents is essential for securely deploying and managing them in your organization.
Types of agent identities
During agent setup, you choose from two identity types.
Agent identities (Microsoft Entra Agent ID)
An agent identity is a dedicated identity created specifically for an AI agent using the Microsoft Entra Agent ID capability. These identities provide unique identification and authentication for AI agents and help address key security challenges:
- Distinguishing AI agent operations from those of workforce, customer, or workload identities.
- Granting agents right-sized access across systems.
- Preventing agents from gaining access to the most critical security roles.
- Scaling identity management for agents that might be rapidly created and retired.
When you create an agent identity, you grant it only the specific permissions needed. Organizations can create agent identities in bulk, apply consistent policies, and retire agents without leaving orphaned credentials behind.
Note
Currently, the option to create an agent identity is only available for Microsoft-built agents.
Existing user account
This option lets the agent use an existing user's credentials to run. The agent inherits that user's access and permissions while active, meaning it can access the same data and services as the connected account.
How agent identities differ from other identity types
- Versus application identities: Application identities (service principals) in Microsoft Entra ID are designed for long-lived services with stable ownership. Agents are often created dynamically and may exist only briefly. Agent identities are built for this scale and ephemerality, reducing operational complexity of managing short-lived autonomous systems.
- Versus human user identities: Human identities are tied to authentication mechanisms like passwords, multifactor authentication, and passkeys, and have associated data like mailboxes and organizational hierarchy. Agent identities represent software systems, not human beings, and don't use human authentication mechanisms. However, certain scenarios require agents to operate as if they're human users. For these scenarios, agent identities can be paired with special user accounts that maintain a one-to-one relationship with their agent identity, providing system compatibility while keeping clear separation.
What agent identities enable
An AI agent can use its identity to:
- Access web services: Request access tokens from Microsoft Entra to call Microsoft Graph, organization-built services, or non-Microsoft APIs.
- Autonomous access: Act independently using rights assigned directly to the agent identity, including Microsoft Graph permissions, Azure RBAC roles, and Microsoft Entra directory roles.
- Delegated access (on-behalf-of): Act on behalf of a human user, using rights the user controls and delegates. In this flow, the agent accesses resources with the user's identity and permissions to retrieve data or perform actions the user can also do.
- Authenticate incoming messages: Accept and validate requests from other clients, users, or agents using Microsoft Entra access tokens.
Permissions for agents
Permissions define the authorization level an agent is given during configuration, enabling it to access specific information or carry out its tasks. These might include reading data from solutions like Microsoft Defender External Attack Surface Management or Microsoft Threat Intelligence.
When an agent identity is created, the required permissions are assigned automatically. For example, the Conditional Access Optimization Agent receives permissions like Policy.Read.All, User.Read.All, and RoleManagement.Read.Directory. The permissions an agent identity receives can't be changed or removed by administrators—they're scoped to what the agent needs to perform its defined tasks.
Securing agent identities
Microsoft Entra extends many of the same protections to agent identities that it provides for user identities:
- Conditional Access for agents: Organizations can define and enforce adaptive policies that evaluate agent context and risk before granting access to resources. This includes enforcing access control policies across assistive, autonomous, and agent user account types, using real-time risk signals to block compromised agents, and deploying policies at scale using custom security attributes.
- ID Protection for agents: Microsoft Entra ID Protection detects and blocks threats by flagging anomalous activities involving agents, providing risk signals to Conditional Access, and enabling automatic remediation of compromised agents.
- ID Governance for agents: Agent identities are brought into the same governance processes as users, enabling lifecycle management from deployment to expiration. Sponsors and owners can be assigned to each agent identity, preventing orphaned agents, and access can be made time-bound through access packages.
Role-based access control and agents
RBAC determines who can view and manage agent outputs in Security Copilot. The Security Copilot platform defines two roles:
- Security Copilot owner: Set up agents, manage settings, assign permissions, and perform all platform tasks. Build, test, and publish agents at workspace scope.
- Security Copilot contributor: Run agents, create sessions, and interact with agent outputs. Build, test, and publish agents at user scope.
These roles are managed within Security Copilot and are separate from Microsoft Entra ID roles. They control platform access only and don't grant access to security data by themselves. The data an agent can access is still governed by the user's existing Microsoft Entra and Azure RBAC roles—Security Copilot never exceeds the access a user already has.
Certain Microsoft Entra and Microsoft Purview roles—such as Global Administrator, Security Administrator, and Compliance Administrator—automatically inherit Security Copilot owner access, ensuring the platform always has at least two owners.
Partner agent permissions
Setting up a partner-built agent that accesses Microsoft product data (such as Microsoft Intune, Microsoft Entra, Microsoft Sentinel, or Microsoft Defender) requires a Global Administrator to approve the required permissions. After approval, Security Copilot owners and contributors can complete the agent setup. Agents that don't access Microsoft product data don't require this approval.