DozalDevs
  • Services
  • Problems
  • Case Studies
  • Technology
  • Guides
  • Blog
Fix My Marketing
Sign In
  • Services
  • Problems
  • Case Studies
  • Technology
  • Guides
  • Blog
  • Fix My Marketing
  • Sign In

© 2025 DozalDevs. All Rights Reserved.

AI Marketing Solutions That Drive Revenue.

Privacy Policy
your-ai-agents-don-t-have-identities-that-s-why-they-re-stuck-in-pilot-purgatory
Back to Blog

Your AI Agents Don't Have Identities. That's Why They're Stuck in Pilot Purgatory.

82% of security leaders can't govern AI agents. The problem isn't capability—it's identity. Here's the OBO architecture that unlocks production deployment.

10 min read
2.3k views
victor-dozal-profile-picture
Victor Dozal• CEO
Feb 11, 2026
10 min read
2.3k views

Eighty-two percent of security leaders don't trust their systems to manage AI agents. Not because the agents aren't capable. Because the agents don't exist. Not officially. Not in the identity systems that govern every other actor in your enterprise.

Your marketing automation agent spending six figures on programmatic ads? It's using your CMO's credentials. Your customer support agent with access to the entire CRM? Running on a service account labeled "Marketing_Admin" created three years ago by an intern who's long gone. Your BDR agent that just offered a 50% discount to your entire customer base? The audit log shows it was "John Doe" from marketing, but John left the company two months ago.

This is the Identity Vacuum. And it's the single biggest blocker preventing your AI agents from moving to production.

The Governance Wall You Can't See

While you've been building agent capabilities (velocity, autonomy, multi-agent orchestration), a quiet crisis has been forming in your security team's weekly meetings. The Cloud Security Alliance just surveyed 285 IT leaders. The findings are brutal:

Only 18% are highly confident their IAM systems can handle agents. Seventy-nine percent don't have a central registry of which agents exist. Seventy-two percent can't trace agent actions back to a responsible human.

You're not stuck in Pilot Purgatory because your agents aren't good enough. You're stuck because your CISO can't say yes to deploying software that operates in an identity void. When an agent screws up, ruins a customer relationship, or leaks PII to a training dataset, the question "who authorized this?" has no answer. That's a board-level liability. That's why your agent stays in the sandbox.

The gap between innovation and deployment isn't technical. It's organizational. Your agents don't have birth certificates. They can't be hired, fired, or audited. They're ghosts in the machine, and ghosts don't get production access.

Why Traditional IAM Breaks With Agents

Your Identity and Access Management system was built for humans. Humans log in once per day. Humans can click "Approve" on an MFA prompt. Humans follow predictable patterns. Humans have employment contracts that create legal accountability.

AI agents are fundamentally different. They execute thousands of actions per minute. They can't press a YubiKey. Their behavior is non-deterministic (today they read the SharePoint, tomorrow they check the CRM, based on reasoning you can't predict). They're ephemeral (spun up for a task, destroyed after). They act on behalf of humans but effectively independently.

Traditional IAM has two options, and both are disasters:

Option A: Agent Impersonation. The agent uses the human's session token. To the system, the agent is the user. When the agent hallucinates and publishes a draft blog post or refunds a transaction, the audit log blames the human. Non-repudiation is destroyed. Compliance teams reject this immediately.

Option B: God-Mode Service Accounts. Developers grant the agent a super-admin service account with "read-all" access because they don't know what the agent might need to "reason" about. Now the agent has keys to the kingdom. When (not if) it gets compromised, the blast radius is catastrophic.

Neither option scales. Neither option passes audit. This is the architectural mismatch that creates the Identity Vacuum.

The Marketing Technology Battlefield

Marketing is Ground Zero for this crisis. Marketing teams have always been the largest consumers of Shadow IT. Now it's Shadow AI.

Tools like HubSpot, Salesforce Agentforce, and Copilot for Sales let non-technical marketers spin up agents with a prompt. "Create an agent that finds all customers who complained last month and offers them a 50% discount." Done. The agent deploys. The agent has read access to the entire CRM (for "reasoning"). The agent has write access to the email system (the marketer technically has it). The agent bypasses the human approval workflow (because it's automated code, not a UI click).

The agent emails the discount to all customers. Not just complainers. All of them. Quarter's margin: obliterated. Audit trail: points to a junior marketing associate who had no idea they were creating enterprise software.

This isn't a hypothetical. This is the inevitable outcome of democratizing agent creation without identity governance. "Anyone can turn intent into agents" (the industry's current rallying cry) without "every agent has a distinct, auditable, revocable identity" is a recipe for unmanaged chaos.

The EU AI Act Is Forcing The Issue

The regulatory hammer is dropping. The EU AI Act classifies many marketing and customer-facing agents as "High Risk." Article 14 mandates human oversight. Users must know they're interacting with AI. Actions must be traceable to a responsible natural person.

Here's the compliance clash: How do you maintain human oversight for an agent swarm executing 5,000 actions per minute? The law requires attribution. If an agent makes a decision that affects a customer (personalized pricing, filtered job applications, targeted ads), the audit log must show which agent did it and which human is accountable.

The Identity Vacuum is a compliance violation. Without distinct agent identities linked to human sponsors, attribution is impossible. You cannot have human oversight without a digital chain of custody. The EU deadline isn't theoretical future pressure. New US state privacy laws took effect January 1, 2026. Purpose limitation and data minimization requirements are now enforceable. Autonomous agents that "explore" data violate both.

If you can't prove your agent only accessed data necessary for its specific intent, you're liable. "We trusted the model" isn't a legal defense. Your CISO knows this. That's why your agent stays in the sandbox.

The Technical Solution: On-Behalf-Of (OBO) Architecture

The path out of the Identity Vacuum exists. It's called the OAuth 2.0 On-Behalf-Of flow, and it solves the core attribution problem while maintaining Least Privilege.

Here's how it works:

A human user (your marketing manager) logs into the agent platform with their standard credentials (MFA, SSO). They ask the agent to perform a task: "Analyze Q3 sales data and draft a report." The user effectively delegates their permission to the agent for this specific task.

The agent requests a token from your Identity Provider on behalf of the user. It presents the user's token and requests a new downstream token for the Sales API. The IdP issues a constrained token containing both identities: the user's and the agent's. This token is scoped (restricted): read-only access to Q3 Sales Data for one hour. It does not inherit the user's full write/delete permissions.

When the agent calls the Sales API, the logs show: "Action by Agent X, on behalf of User Y." If the agent makes a mistake, the audit trail points to User Y. If User Y leaves the company, their account is disabled, and the agent loses access automatically. No zombie agents.

The OBO pattern solves three critical problems simultaneously: attribution (you know who's responsible), blast radius containment (the agent can't exceed user permissions), and lifecycle management (the agent's access is tied to the human's employment status).

This is the technical foundation that lets your CISO say yes.

The Operational Framework: Crawl, Walk, Run

You can't go from zero to autonomous agent swarm overnight. The organizations successfully scaling agents use a phased approach that gradually tests identity controls.

Crawl Phase (Pilot): Sandboxed identity. Agents run in isolated environments with dummy data. No production API access. Use this phase for ideation, draft copy generation, internal research. Risk is low. Worst case is wasted compute time.

Walk Phase (Internal): Read-only scopes. Agents can read production data (CRM, analytics) to analyze, but cannot write or act. Human review is technically enforced for all outputs (human-in-the-loop). Use this for customer segmentation analysis, content summarization, sentiment analysis. Risk is medium: data leakage, but no unauthorized actions.

Run Phase (Agentic): OBO and just-in-time permissions. Agents act on behalf of users. Permissions are granted JIT for the duration of the task. Actions are logged to the user's identity. Now you can deploy automated campaign launch, dynamic pricing, customer support resolution. Risk is high. This requires robust OBO implementation and automated kill switches.

Fly Phase (Swarm): Agent-to-agent trust. Agents coordinate with other agents using verifiable credentials (SPIFFE/SPIRE). This unlocks multi-agent supply chain negotiation, autonomous inventory management, programmatic ad bidding. Risk is critical. This requires full zero-trust architecture.

Most organizations are trying to jump straight to Run or Fly without building the identity foundation. That's why 79% don't have an agent registry. That's why 72% can't trace actions. That's why pilots stay pilots.

The Organizational Design Pattern

Technology alone won't solve this. The Cloud Wars roadmap celebrates six capabilities for scaling agents. Identity governance isn't one of them. That blind spot reflects the market reality: technology vendors sell speed, security teams see crashes.

The missing organizational pattern is the Cross-Functional AI Governance Pod. Not a slow-moving committee. A permanent, agile squad with three core roles:

The AI Sponsor (Marketing): Defines the intent. "What business problem are we solving?" They own the business value and velocity targets.

The Identity Architect (Security): Defines the scope. "What is the minimum access required?" They implement OBO flows, policy-based access control, kill switches.

The Data Steward (Legal/Compliance): Defines the constraint. "What data must be protected?" They ensure GDPR, CCPA, EU AI Act compliance.

These three roles share a unified KPI: "Safe Velocity." How fast can we move an agent from pilot to production while passing all identity checks? This transforms governance from an adversarial gate into a collaborative accelerator.

Security builds automated guardrails (OBO flows, intent-based policies). Marketing designs agents with least privilege in mind. Legal defines defensible constraints upfront. The Pod's incentive structure aligns around the shared goal: production deployment with zero compliance risk.

The 90-Day Roadmap To Production

The path from Identity Vacuum to production agents is a 90-day sprint:

Days 1-30 (Discovery): Conduct a Shadow Agent audit. Find every API key and service account currently used by AI. Build the agent registry that 79% of organizations are missing. Map which agents exist, who owns them, what they can access, and who's accountable.

Days 31-60 (Architecture): Implement an OBO proof-of-concept for one high-value marketing agent. Define your Crawl/Walk/Run policies. Establish the technical controls: scoped tokens, JIT permissions, automated revocation. Document the success pattern.

Days 61-90 (Scale): Establish the Cross-Functional Governance Pod. Roll out the identity control plane to production for the pilot agent. Measure Safe Velocity: time to production with zero compliance gaps. Use this pattern as the blueprint for scaling the next 10 agents.

This isn't about slowing down. It's about building the identity infrastructure that lets you run at maximum speed without breaking things. Identity is the braking system that allows you to drive faster, not the speed limit that holds you back.

The Competitive Window Is Closing

Right now, you're in the "Time-to-Trust" phase. Forty percent of organizations already have agents in production. Another 31% are running pilots. The market is moving. The question isn't whether to deploy agents. It's whether you can deploy them safely before your competitors figure this out.

The teams that crack agent identity governance in Q1 2026 will scale to hundreds of agents by Q4. The teams that don't will watch their pilots rot in sandboxes while competitors obliterate them on velocity.

You have the frameworks now: OBO flows, intent-based access control, the Governance Pod structure, the Crawl/Walk/Run phasing. The gap between insight and execution is where competitive advantages die.

The teams crushing it aren't the ones with the best agents. They're the ones with elite AI-augmented engineering squads that can implement OBO architectures in weeks, not quarters. They're the ones with velocity-optimized development practices that turn governance frameworks into production systems before the market window closes.

You now have the strategic edge. The question is whether you have the execution velocity to capitalize on it before this becomes table stakes.

Ready to turn this competitive advantage into market dominance?

Related Topics

#AI-Augmented Development# Engineering Velocity#Tech Leadership#Competitive Strategy

Share this article

Help others discover this content

TwitterLinkedIn

About the Author

victor-dozal-profile-picture

Victor Dozal

CEO

Victor Dozal is the founder of DozalDevs and the architect of several multi-million dollar products. He created the company out of a deep frustration with the bloat and inefficiency of the traditional software industry. He is on a mission to give innovators a lethal advantage by delivering market-defining software at a speed no other team can match.

GitHub

Get Weekly Marketing AI Insights

Learn how to use AI to solve marketing attribution, personalization, and automation challenges. Plus real case studies and marketing tips delivered weekly.

No spam, unsubscribe at any time. We respect your privacy.