Skip to content

Traditional IAM answers one of two questions: “who is this user?” (user identity) or “what is this workload?” (Workload Identity: A unique, verifiable identity assigned to a workload by Aembit.Learn more). AI agents require both answers at the same time.

When an employee uses Claude Desktop to query Jira, two identities are in play:

  • User identity - the human, authenticated through your Identity Provider (Okta, Entra ID, Google). This determines who is responsible for the agent’s actions.
  • Workload identity - the AI agent application itself, identified by properties like its OAuth redirect URL. This determines which agent is making the request.

Blended identity is an access model where Aembit evaluates both identities together in a single Access Policy: Access Policies define, enforce, and audit access between Client and Server Workloads by cryptographically verifying workload identity and contextual factors rather than relying on static secrets.Learn more. Instead of asking “is this a trusted workload?” or “is this an authorized user?” separately, Aembit asks: “is this specific user, using this specific agent, authorized to access this specific resource right now?”

Without blended identity, organizations face a binary choice:

  • User-only identity (traditional IAM) - You know who the user is but treat all agents identically. Every AI assistant gets the same access regardless of its trust level or capabilities.
  • Workload-only identity (traditional workload IAM) - You know which agent is connecting but can’t distinguish between users behind it. All users of Claude Desktop get identical access with no per-user scoping.

Blended identity eliminates this trade-off. Access policies can express rules like:

  • “Engineers can use Claude Desktop to access Jira, but only the security team can use it to access the vulnerability scanner”
  • “This user can access Confluence through Claude Desktop but not through an untrusted third-party agent”
  • “Revoke this specific user’s AI agent access without affecting other users or rotating shared credentials”

Aembit implements blended identity through its Access Policy model, where policies evaluate user attributes and workload attributes simultaneously.

The MCP Authorization Server implements blended identity in a single access policy:

  • The Client Workload identifies the AI agent by its OAuth redirect URL
  • The Trust Provider: Trust Providers validate Client Workload identities through workload attestation, verifying identity claims from the workload's runtime environment rather than relying on pre-shared secrets.Learn more validates the user’s identity through your IdP (OIDC or SAML claims)
  • The Credential Provider: Credential Providers obtain the specific access credentials—such as API keys, OAuth tokens, or temporary cloud credentials—that Client Workloads need to authenticate to Server Workloads.Learn more issues a short-lived token scoped to both the user and the agent

The user authenticates through your IdP, the redirect URL identifies the agent, and the policy evaluates both before issuing a token.

The MCP Identity Gateway extends blended identity across two policy hops:

  • Client-to-Gateway policy - Validates the AI agent’s identity (redirect URL) and the user’s identity (IdP claims) together. The Credential Provider: Credential Providers obtain the specific access credentials—such as API keys, OAuth tokens, or temporary cloud credentials—that Client Workloads need to authenticate to Server Workloads.Learn more embeds the user’s identity into the access token using dynamic claim expressions like ${oidc.identityToken.decode.payload.email}.
  • Gateway-to-Server policy - Uses the Gateway’s workload identity plus the embedded user context to obtain per-user credentials for each downstream MCP server.

This architecture enables per-user credential isolation: each user’s AI agent receives different downstream credentials based on their identity, even though all users connect through the same Gateway.

A key benefit of blended identity is that Aembit scopes credentials to individual users, not shared across an agent type. When the MCP Identity Gateway connects to a downstream MCP server on behalf of a user:

  • The Gateway stores OAuth tokens per user, not per agent
  • Each user completes their own authorization flow for each MCP server
  • Revoking one user’s access doesn’t affect others

This means User A’s Claude Desktop session accesses Jira with User A’s permissions, while User B’s session uses User B’s permissions, even though both connect through the same Gateway with the same policies.

Every access event logged by Aembit includes both identity dimensions:

  • Who - The authenticated user (for example, user@example.com)
  • What agent - The AI agent that made the request (for example, Claude Desktop via https://claude.ai/...)
  • Which resource - The MCP server and operation accessed
  • Policy outcome - Which Access Policy evaluated and whether Aembit granted or denied access

This dual attribution satisfies compliance requirements (SOC 2, HIPAA, PCI) that need clear accountability for every action - something that workload-only or user-only identity models can’t provide for AI agent access.