Agent Identity as Permission System

Diving deeper into

Reed McGinley-Stempel, CEO of Stytch, on authentication for AI agents

Interview
it’s going to pale in comparison to agent identity.
Analyzed 5 sources

Agent identity expands auth from a login feature into the permission system for every action an AI assistant takes. Passwordless mostly improved how a human gets into an app. Agent identity forces apps to decide what an agent can read, what it can write, when a human must approve it, and how to revoke and audit those permissions across every MCP or OAuth connection.

  • The closest historical analogy is Auth0 in the mobile shift. Mobile let one user log in across web and app. Agent identity goes further, because each user can now have multiple delegated software actors with separate scopes, lifetimes, and approval rules.
  • This is bigger than passwordless because it pulls far more apps into identity infrastructure work. Many consumer and SaaS products never needed to act like Google, letting another service access calendars or inboxes. MCP now pushes them to become OAuth identity servers with consent screens, token refresh, revocation, and audit logs.
  • It also opens a new competitive layer beyond human login. Stytch is packaging Connected Apps, fraud tooling, and agent controls for customer facing apps, while companies like WorkOS extend enterprise auth and companies like Keycard focus on short lived machine credentials and delegation chains for agents.

The next phase of identity will be about managing fleets of delegated actors, not just signing in people. As agents move from reading data to taking actions across SaaS tools, identity vendors that can make OAuth delegation, fine grained permissions, and agent auditability feel like a drop in component will capture a much larger share of the software stack.