toolintermediate
Show HN: Pomerium Agentic Access Gateway – dynamic auth for AI agents
By bdesimonehackernews
View original on hackernewsPomerium introduces an Agentic Access Gateway, an open-source feature that extends their zero-trust identity proxy to secure AI agents with fine-grained, context-aware authorization. The solution provides centralized policy enforcement, just-in-time credentials, and audit trails for AI agents accessing internal apps and APIs, treating agents as first-class identities rather than relying on static OAuth scopes.
Key Points
- •Pomerium's Agentic Access Gateway treats AI agents as first-class identities with continuous authentication and authorization at every request, addressing the gap in Model Context Protocol (MCP) spec regarding per-request authorization
- •Centralized policy enforcement eliminates security sprawl by defining access rules in one place rather than embedding authorization logic into individual tools and APIs
- •Context-aware authorization checks agent requests against policies including the user/entity the agent acts for, target data, and behavioral anomalies to prevent unauthorized actions mid-task
- •Just-in-time credential issuance replaces static API keys with short-lived, task-scoped tokens that reduce exposure and eliminate long-lived secrets
- •Agents authenticate via standard OAuth2.1/OIDC flows, enabling permission inheritance from real users or service accounts while maintaining granular control over delegated access
- •Centralized audit logging and traceability provide compliance visibility by capturing all agent actions through a single gateway for forensic analysis and debugging
- •Zero-trust architecture requires no modification to existing internal APIs or tools—policies are configured in Pomerium and applied transparently across SaaS and internal resources
- •The solution addresses the operational overhead and inconsistency of pushing complex, context-aware authorization logic into every tool, aligning with zero-trust security principles
Found this useful? Add it to a playbook for a step-by-step implementation guide.
Workflow Diagram
Start Process
Step A
Step B
Step C
Complete
Concepts
Artifacts (1)
Agentic Access Gateway Key Featuresconfig
- Centralized Policy Enforcement: Pomerium acts as a gateway in front of MCP tools and APIs with unified access policy
- Context-aware policy enforcement: Every request checked against policy including agent identity, data access, and behavior anomalies
- Leverages Existing Identity: Agents authenticate via OAuth2.1/OIDC, tying actions back to real users or service accounts
- Just-in-time credentials: Short-lived tokens scoped to specific tasks instead of static API keys
- Audit & traceability: Centralized logging for compliance and debugging
- Works with existing tools: No modification needed to internal APIs, policies configured in one place