SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Reading: Curity looks to reinvent IAM with runtime authorization for AI agents – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > AI > Curity looks to reinvent IAM with runtime authorization for AI agents – Computerworld
AI

Curity looks to reinvent IAM with runtime authorization for AI agents – Computerworld

News Room
Last updated: April 15, 2026 4:04 am
News Room
Share
2 Min Read
SHARE

The problem it addresses is that traditional IAM tools assume that applications are being accessed by human users or machine identities, governed by a one-time authentication process. But agents, which assume long chains of actions conducted at incredible speed, don’t work like this. Instead, access becomes ephemeral, complex, and non-deterministic, which is to say, hugely unpredictable. Lock them down too much and they stop working; let them run free, and weak security follows in their wake.

Runtime enforcement

Curity’s approach is to treat agents as a special type of application. Like applications, agents call APIs, MCP servers, and each other, and are credentialed using OAuth tokens. Through a feature called Token Intelligence, Curity extends the role of OAuth tokens to not simply permit access, but to carry information on the agent’s purpose and intent. In Curity’s scheme, an agent can only access resources based on that purpose.

Instead of using static, pre-granted permissions, agent access is granted at runtime, on-the-fly. Each requested action generates a separate token that describes the access it needs. When an agent starts a new task, it needs a new token specifying a new set of permissions. If necessary, human authorization can be required when an agent is trying to perform a high-risk action such as transferring funds.

Read the full article here

You Might Also Like

Apple’s Mac grabs 11% of US enterprise market share – Computerworld

US Defense Department takes issue with Anthropic over ethical stance – Computerworld

compromise AI ethics or be banished from supply chain – Computerworld

In India, Nvidia eyes a different approach to sovereign AI – Computerworld

Jamf warns of massive app insecurities – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Software

IBM’s government DEI settlement could increase pressure to avoid tech hiring diversity – Computerworld

April 15, 2026
Games

Marathon’s mid-season patch is a big one: 11 new weapon variants, Recon buffs, and a ‘Mercy Kit’ for reviving strangers

April 15, 2026
AI

Apple devices’ satellite link is under new ownership – Computerworld

April 15, 2026
News

World Quantum Day serves as a cause for computer celebration – GeekWire

April 15, 2026
Games

Dwarf Fortress is coming to Magic: The Gathering and I’m beginning to suspect Wizards of the Coast is targeting me, specifically

April 15, 2026
Games

The director of sandbox vampire RPG The Blood of Dawnwalker doesn’t mind seeing it compared to The Witcher 3, which he also directed: ‘I feel really confident about our game’

April 15, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?