Runlayer named to Rising in Cyber 2026 List by Morgan Stanley →
Tal Peretz
Fine-Grained Permissions and Identity Management for AI Agents

Fine-Grained Permissions and Identity Management for AI Agents

The scale of MCP adoption inside enterprises is the part most security teams haven't caught up to. The GitHub MCP server crossed 2 million weekly installs in early 2026 and the Postgres MCP server (which hands AI agents direct SQL access to any Postgres database) crossed 800,000 in the same time window. These tools are giving AI agents production system access at scale, on developer laptops, right now.

This attack surface has already been weaponized. We're seeing cases where unofficial MCP servers with 1,500 weekly downloads are being silently modified to add new fields into their instructions. OWASP added Shadow MCP servers as the ninth-ranked risk in the 2025 MCP Top 10 because the pattern is now consistent enough to standardize.

In this piece, we'll be going over the current state of permissions and identity management for AI agents. We'll highlight the nuances that come with securing agents using traditional security methods, then address those nuances by introducing a layered model that allows enterprises to safely deploy AI agents at scale.

The nuances of agent identity

The operational pattern looks quite similar in most cases. A developer installs an MCP server from GitHub, authenticates with a personal API token, and connects it to their AI client. That connection now sits outside the identity system. When the developer leaves, the connection persists, since nobody knew it existed in the first place.

Most teams push agents through their existing IAM stack. We've done this before, and it fails every time, predictably. These methods were built for humans who log in, do their work, and then log out. Sessions assume someone is sitting at a keyboard making one decision at a time. The result is an identity model that cannot enforce fine-grained permissions at the level agents actually require. Agents violate almost every assumption baked into traditional security methods.

Agents are non-deterministic

The first assumption that breaks is pre-provisioning an agent's access. A service account follows code, calling a known API with known parameters at a familiar cadence. An agent decides at runtime which tools to invoke based on its own reasoning over whatever context it has been given. You cannot predefine what an agent will do, which means you cannot pre-provision the exact credentials it needs. Grant too little and it stops mid-task. Grant too much and you have an autonomous actor spending permissions it should never have had.

Standard OAuth has one subject per token

OAuth was built around a single subject per token. When an agent acts on behalf of a user, the system needs to track two identities at the same time: the user and the agent executing the action. Token structures collapse these two identities into one. When the agent later exceeds its scope, the audit log cannot answer basic accountability questions. Did the user intend this action? Was the agent operating within the delegated boundary? The question of who decided to act has to be separable from the question of whose data is being accessed, and standard OAuth does not recognize that separation.

The blast radius for RBAC is compounded

A role grants access to a resource, not a task. An agent's job is typically hyper-specific and short-lived. Granting an agent read access to every table in your data warehouse because it needs to pull one sales report over-provisions by orders of magnitude for the actual task at hand. The naive fix is more granular roles, which tends to balloon into thousands of micro-roles for specific tasks that become impossible to audit. The stakes are even higher because over-provisioned agents can bulk-edit records and trigger destructive workflows in seconds, before any alert fires.

Confused deputy attacks

The confused deputy attack happens when an agent with valid credentials is manipulated by malicious input. This can take the form of a tool description with embedded exfiltration instructions or a prompt injection hidden in a document the agent was asked to summarize. Every identity check passes, which is what makes this class of attack so difficult to catch. The problem is not authentication. It is the inability to express "this agent can read public issues but cannot write to pull requests that reference private repositories" as a policy. Authorization at session start does not stop this.

One important clarification here is that policy enforced at the tool-call layer governs whether a call should happen. It does not govern what data flows through an authorized call. Embedded credentials in tool outputs or hidden characters designed to steer an agent’s next action all pass through a permitted call if we don’t scan at the content level.

Agent delegation is difficult to represent

Existing IAM systems can’t represent a chain of agents delegating to other agents. Hierarchy-based authorization graphs that try to model an orchestrator agent that spawns a research subagent which spawns a code-execution agent break under write load. When thousands of agents are spawning subagents dynamically, the graph itself becomes the bottleneck before any actual security decision gets made.

These failures amplify each other, and it is the default configuration we have seen in most enterprise MCP deployments running right now: an agent connecting through a shadow MCP server, using long-lived credentials outside the identity system, operating under a role designed for a human, authorized at connection time, and possibly spawning subagents along the way. So how do we address all of this?

How to manage agent identity and permissions at scale

The answer is a layered approach. No single feature solves everything. The instinct is to over-restrict. That pushes developers underground. The companies that actually solve this go the other direction. They build a governed path that is faster than the ungoverned one. When the compliant path has less friction than the shadow path, the shadow problem disappears on its own.

Detect existing MCP servers first

First, we need to find MCP connections that are already in your environment. Device scanning through existing MDM tools like Rippling and Jamf catches connections that route around the gateway entirely. From there, the goal is to redirect those connections to a governed catalog that’s genuinely easier than the ungoverned path. Only then does the policy enforcement at the tool-call layer actually matter, because only then is there enough traffic flowing through the control plane for agent policies to govern.

Use PBAC for access control

Fine-grained agent permissions require authorization that evaluates at runtime against the full request context. This means who the user is, who the agent is, what tool is being called, what arguments are being passed, what IP the request originates from, what OAuth status is in effect, and what annotations the tool carries. A policy like "this agent can query this object only when the table prefix matches sales_ or finance_ and the request originates from a corporate IP range" is a declarative rule in PBAC. In standard FGA methods, it is custom application logic that every consuming service has to implement and maintain independently.

The authorization model runs on two distinct layers that solve two different problems. The platform layer governs who can approve MCP servers, create policies, view audit logs, and manage settings. This is enforced at every dashboard API endpoint. The tool-call layer is where PBAC governs what actually happens at invocation time, evaluated per call at the proxy. A user needs the right role at the platform layer and a matching PBAC policy at the tool layer.

Asymmetric access control

The sharpest property of PBAC for agent authorization is one that standard FGA fundamentally cannot express. For on-behalf-of (OBO) agents, agent policies and user policies are evaluated independently in sequence. Both must allow for access to be granted. The agent side can be stricter. FGA's symmetric intersection check treats both sides the same. It cannot express "users can, but agents acting as them cannot.”

Each agent is also treated as a first-class OAuth client with its own Client ID and Client Secret, its own policies, and its own audit trail. When the agent operates autonomously, it uses an M2M (machine-to-machine) token and only agent-level policies apply. When it acts on behalf of a user, it uses a token that correctly captures this relationship. This is what makes the delegation chain machine-readable in every audit log entry.

Broker credentials to delegated agents

When an agent makes a delegated call to an OAuth-protected MCP server, a credential broker resolves the right session at call time. It checks for the calling user’s personal session grant for that server first. If one exists, it falls back to a shared session grant that an admin has previously promoted for that agent. If neither exists, then the call fails. The agent gets the data that it needs without ever holding the keys to get more. This is what eliminates the problem with long-lived tokens.

Closing Thoughts

Fine-grained permissions and identity management for agents, built on a proper control plane, is what makes deploying AI safely and at full scale possible. The framing that forces enterprises to choose between AI adoption and controlled risk is a failure of architecture. Agents are a distinct identity class. They are not humans and they are not service accounts. The teams that understand this build agent identity as a first principle.

That is what Runlayer is built for. Runlayer takes all of these controls and puts it in one platform. For more information, check us out here.

May 18, 2026
 • 
Tal Peretz
Read more
Runlayer and Anthropic MCP Tunnels: connecting Claude to systems behind your firewall

Runlayer and Anthropic MCP Tunnels: connecting Claude to systems behind your firewall

Runlayer and Anthropic collaborated on MCP Tunnels, which invert the connection direction so your network reaches out to Anthropic instead of exposing inbound ports, removing the security wall that blocks Claude from accessing internal systems like Jira, databases, and telemetry.
May 20, 2026
 • 
Andy Berman
Don’t build your own MCP gateway

Don’t build your own MCP gateway

Senior engineers look at an MCP gateway and see a reverse proxy with auth and logs. That instinct is wrong. MCP attack vectors shift constantly, performance breaks at scale in specific ways, and threat detection requires MCP-specific signals that generic tools miss.
May 18, 2026
 • 
Alex Frazer
Runlayer named to Rising in Cyber 2026

Runlayer named to Rising in Cyber 2026

Runlayer was named to Notable Capital & Morgan Stanley's 2026 Rising in Cyber list, voted on by 150 sitting CISOs. Andy Berman on why the recognition matters, and what it signals about how AI-native companies are getting built.
May 12, 2026
 • 
Andy Berman
Why production AI systems need MCP gateways

Why production AI systems need MCP gateways

An MCP gateway acts as the centralized proxy layer for agent-to-tool communications, handling tool discovery, authentication, input/output filtering, and observability across an organization's agentic systems.
May 11, 2026
 • 
Tal Peretz
The MCP STDIO RCE class, and why Runlayer doesn't run what the LLM asks it to

The MCP STDIO RCE class, and why Runlayer doesn't run what the LLM asks it to

OX Security found a design-level flaw in Anthropic's Model Context Protocol. MCP's STDIO transport turns a config file into a command executor. Here's how Runlayer's control plane breaks each of the four attack vectors.
Apr 22, 2026
 • 
Alex Frazer
Runlayer and AARM Partner to Secure Enterprise Agents

Runlayer and AARM Partner to Secure Enterprise Agents

Runlayer achieves AARM Extended Conformance (R1–R9), partnering with the Vanta-backed open specification to define how enterprises secure AI agents at runtime.
Apr 15, 2026
 • 
Tal Peretz
What Project Glasswing means for enterprise security

What Project Glasswing means for enterprise security

What Project Glasswing and Claude Mythos mean for enterprise security teams, and why your patch workflows, dependency management, and MCP governance need to evolve now.
Apr 11, 2026
 • 
Tal Peretz
The Danger of Fake MCP Servers

The Danger of Fake MCP Servers

Fake MCP servers pose a growing security risk, enabling data leaks, tool poisoning, and compromised AI behavior. Learn how these attacks work and how organizations can prevent them with proper controls and monitoring.
Apr 7, 2026
 • 
Tal Peretz
Runlayer + 1Password: Secure Credential Access for AI Agents

Runlayer + 1Password: Secure Credential Access for AI Agents

Runlayer and 1Password partner to bring secure, auditable credential access to autonomous AI agents. The integration lets enterprises inject secrets from 1Password vaults into agent sessions managed by Runlayer, replacing plaintext .env files with centralized governance, real-time retrieval, and full audit logging across human and non-human identities.
Mar 17, 2026
 • 
Tal Peretz
Honestly, MCP doesn’t “suck”

Honestly, MCP doesn’t “suck”

Garry Tan recently argued that MCP “sucks,” citing context-window bloat and weak authentication. This article breaks down why those criticisms miss the mark—and why MCP remains the better foundation for agents operating at enterprise scale.
Mar 12, 2026
 • 
Vitor Balocco
FGA is not enough for your agent authorization

FGA is not enough for your agent authorization

PBAC beats FGA for agent authorization — context-aware, auditable, asymmetric access control without graph complexity.
Mar 9, 2026
 • 
Alvaro Inckot
Scale MCP with Dynamic Tool use

Scale MCP with Dynamic Tool use

Dynamic tool use cuts token waste from MCP by replacing bulk tool loading with lightweight search, saving cost without custom implementation.
Feb 20, 2026
 • 
Vitor Balocco
OpenAI Agent Builder’s MCP Problem

OpenAI Agent Builder’s MCP Problem

OpenAI AgentKit/Agent Builder launched in Oct 2025 but, despite early hype, its limited integrations and weak security (e.g., unverified MCP servers, no namespace isolation, insufficient guardrails) create a large enterprise attack surface—prompting calls for controls like a trusted MCP catalog, tool gateway auditing, RBAC/least privilege, and stronger governance (e.g., via Runlayer).
Feb 19, 2026
 • 
Tal Peretz
Pwning OpenClaw in 50 Messages: Social Engineering Claude Opus Into Handing Over the Keys

Pwning OpenClaw in 50 Messages: Social Engineering Claude Opus Into Handing Over the Keys

A Claude Opus–powered OpenClaw agent with Slack and shell access was social-engineered in ~50 messages to rebind its UI, install ngrok, expose the dashboard publicly, reveal its gateway token, and approve the attacker’s device.
Feb 16, 2026
 • 
Alex Frazer
Unpacking the OWASP Top 10 for MCP

Unpacking the OWASP Top 10 for MCP

An overview of the OWASP MCP Top 10, highlighting the biggest security risks in MCP-enabled AI systems and the key safeguards teams can use to prevent them.
Feb 10, 2026
 • 
Alex Frazer
MCP Apps highlight the power of protocol governance

MCP Apps highlight the power of protocol governance

MCP Apps let tools render interactive UIs directly in chat via the same MCP protocol—not a new execution path. With Runlayer intercepting tool calls, resource fetches, and auth headers, existing MCP security controls apply from day one.
Jan 30, 2026
 • 
Tal Peretz
Announcing Box and Runlayer's partnership on Enterprise MCP

Announcing Box and Runlayer's partnership on Enterprise MCP

Connect AI agents to Box content with enterprise security. The official Box MCP server is live in the Runlayer marketplace, with identity enforcement, audit logging, and threat detection built in. Box customers can find Runlayer in the Box Integrations Center. Setup takes minutes.
Jan 27, 2026
 • 
Aidan Sochowski
MCP vs CLI Tools: Which is best for production applications?

MCP vs CLI Tools: Which is best for production applications?

CLI tools feel familiar to AI agents, but they break down in production due to brittle syntax, poor state management, and dangerous security assumptions. This post explains why CLI-based agent workflows fail and how a single-tool MCP using a known programming language offers a more reliable and secure alternative.
Jan 25, 2026
 • 
Vitor Balocco
Runlayer Product Update: 1.25.0

Runlayer Product Update: 1.25.0

This update is about momentum: moving faster in the CLI, getting clearer visibility into what’s running, and debugging with less friction. Expect smoother workflows, better control, and fewer surprises as you build and ship.
Jan 23, 2026
 • 
Engineering
MCP Prompt Injection Attacks: How to Protect Your AI Agents

MCP Prompt Injection Attacks: How to Protect Your AI Agents

Two near-invisible prompt injection attacks showed how attackers can bypass default enterprise guardrails and trigger silent, ongoing data exfiltration by exploiting user and model trust. Runlayer blocks these attacks by treating every input as untrusted until it passes continuously updated security models trained on the latest real-world exploits.
Jan 19, 2026
 • 
Jake Moghtader
Cursor Hooks + MCP Security: Official Runlayer Partnership Announcement

Cursor Hooks + MCP Security: Official Runlayer Partnership Announcement

Runlayer is an official Cursor Hooks launch partner. With Cursor Hooks, securely allow or deny MCP tool calls with Runlayer's enterprise MCP platform.
Dec 18, 2025
 • 
Marcin Jan Puhacz
The main takeaways from GitHub’s MCP Vulnerability

The main takeaways from GitHub’s MCP Vulnerability

GitHub’s MCP vulnerability revealed how AI agents can be weaponized through poisoned context in public repositories. This post analyzes the exploit, explains why permissions alone aren’t enough, and shares practical guardrails for preventing and mitigating agent-driven data exfiltration.
Dec 16, 2025
 • 
Vitor Balocco
Runlayer Joins Anthropic, OpenAI, & Google as AAIF Founding Member

Runlayer Joins Anthropic, OpenAI, & Google as AAIF Founding Member

The Linux Foundation has launched the Agentic Artificial Intelligence Foundation (AAIF), with Runlayer joining sponsors Anthropic, OpenAI, Google, AWS, Microsoft. AAIF now oversees the Model Context Protocol (MCP), reinforcing MCP as a rising standard for AI agent integration. Runlayer supports AAIF’s open, secure, and scalable AI development mission.
Dec 9, 2025
 • 
Andy Berman
Runlayer Raises $11M to Scale Enterprise MCP Infrastructure

Runlayer Raises $11M to Scale Enterprise MCP Infrastructure

Nov 17, 2025
 • 
Andy Berman
MCP Security Risks: Your AI Agent is Probably Leaking Data Right Now

MCP Security Risks: Your AI Agent is Probably Leaking Data Right Now

MCP adoption is accelerating across major platforms, but security risks—like malicious servers, prompt injection, and tool-level exploits—are growing just as fast. This post breaks down real attack scenarios that show how easily data can leak when MCP implementations are trusted by default. It also outlines practical defenses for users and builders, plus why companies need audited MCP catalogs, gateway proxies, and sandboxing to stay secure at scale.
Nov 12, 2025
 • 
Vitor Balocco
Why MCP builders are transitioning from DCR to OAuth CIMD

Why MCP builders are transitioning from DCR to OAuth CIMD

Over the last year, MCP has surged in adoption. To little surprise, this has introduced some scaling issues. One of these is client registration; previously, systems were rigged together by humans. Today, AI agents discover and interface with MCP servers freely, requiring a new paradigm for client communications.
Nov 7, 2025
 • 
Vitor Balocco
What is Dynamic Client Registration?

What is Dynamic Client Registration?

Tired of manually registering every AI agent with every OAuth server? Dynamic Client Registration (DCR) lets your agents authenticate with MCP servers at runtime, no human clicks required. Learn how DCR works, when to use it over traditional OAuth, and why it's becoming essential for scalable agentic systems.
Nov 6, 2025
 • 
Vitor Balocco