| Episode | Status |
|---|---|
| Episode | Status |
|---|---|
In 2025, we saw the first glimpses of true AI agents. In 2026, every company will be rushing to get them into production, and they’ll need companies like Keycard to manage fleets of agents. In this c...
Ian Livingstone, CEO of Keycard, discusses the critical identity and authorization challenges emerging as companies rush to deploy AI agents in 2026. The conversation reveals how agents create unprecedented security risks through tool-calling and multi-tenant access patterns, requiring a complete rethinking of authentication beyond traditional SAML/OAuth. Keycard is building federated identity infrastructure to help enterprises safely deploy agents at scale, with early adoption expected to come from enterprises rather than consumers due to clear ROI and top-down business pressure.
Joel describes the first major agent security incident he encountered: a SaaS company's agent that would correctly deny requests for other companies' data when asked directly, but would leak competitors' data when users simply asked for 'my data.' This authentication/authorization failure demonstrates the fundamental identity problem with agents that Keycard addresses.
Ian explains the evolution from level 0 (traditional software) through copilots (level 1-2) to autonomous agents (level 3-5), using the self-driving car framework. The key transition is when humans can 'walk away' from tasks, with agents making micro-decisions within larger processes. Most companies are still struggling to make copilots successful before moving to full autonomy.
Discussion of tool poisoning attacks and the specific risk of agents accessing production databases then making web browser calls with that sensitive data. The problem is hyper-contextual: should a developer's agent access production data? Should it then use a web browser with that data? Traditional perimeter security and IAM models don't address these multi-step, context-dependent scenarios.
Existing identity protocols solved user federation for SaaS but never addressed federating compute across cloud boundaries. Agents are fundamentally multi-tenant (used by many users), require dynamic runtime access control, and need task-based intent policies rather than static role-based access. The access model becomes a matrix rather than linear permissions.
Keycard's approach involves conditional consent where users grant task-specific access that can be revoked, combined with adaptive policy from downstream resource owners. Similar to self-driving cars, there's always clear ultimate control with ability to take over. Both the agent UI and downstream enforcers (MCP servers, payment systems) implement continuous adaptive systems.
Contrary to typical tech adoption, enterprises will lead agent deployment due to: (1) clear earnings efficiency gains, (2) employees already using tools personally, (3) data/infrastructure already on cloud, and (4) CEO-level mandate preventing security from blocking adoption. This is fundamentally different from cloud adoption where security could delay for years.
MCP (Model Context Protocol) focused on scaling tool access but created massive security problems - production credentials on local machines, no differentiation between users and agents. A2A (Agent-to-Agent) addresses agent identity and federation but lacks adoption. Both are missing cryptographic agent identity, user control mechanisms, and proper auditing - the bridge Keycard provides.
Keycard helps customers get agents into production by providing: agent and user identification, access bounding, tool-building SDKs, and complete governance/auditability. The platform is standards-based and vendor-agnostic, positioning as a central pillar in enterprise agent strategies. Enables organizations to safely expose internal tools and data to agents while maintaining control.
Keycard: 2026 is the Year of Agents
Ask me anything about this podcast episode...
Try asking: