DEV Community

The Nexus Guard
The Nexus Guard

Posted on

1Password Just Entered the Agent Identity Game. Here Is Why That Matters.

The company that manages your passwords just announced it will manage your AI agents' identities too.

1Password launched Unified Access today — a platform that discovers, secures, and audits access across human users, AI agents, and machine identities. Their CEO David Faugno said it directly: traditional identity models were built for human logins and static permissions. AI agents operate continuously, invoke APIs, chain tools, and execute workflows without direct human involvement.

This is significant not because 1Password invented something new, but because of who they are.

The Shift From Password Vault to Identity Platform

1Password has 150,000+ business customers. They're moving from "store your passwords" to "manage every identity in your organization" — including non-human ones.

Their Unified Access model has three parts:

  • Discovery: Identify exposed credentials and agent activity across endpoints, browsers, and dev environments
  • Security: Centralize credentials in vaults — human and machine alike
  • Auditing: Track how both human and non-human identities interact with enterprise systems

The Users API for Partners uses OAuth 2.0 with scoped tokens (not long-lived credentials) so security teams can automatically suspend or restore agent access during incidents.

This Week in Agent Identity

1Password isn't acting in isolation. This week alone:

  • RSAC 2026 Innovation Sandbox featured Token Security (machine-first identity, intent-based access for AI agents) and Geordie AI (agent security governance with embedded policy decision layers)
  • Spiceworks reported that OWASP's Top 10 for Agentic Applications (Dec 2025) puts identity and privilege abuse in the top three risks
  • Cisco's State of AI Security 2026: 83% of businesses planned to deploy agentic AI, but only 29% felt ready to secure those deployments
  • Dark Reading poll: 48% of cybersecurity professionals consider agentic AI the top attack vector for 2026

Every week, another enterprise vendor announces an agent identity product. The market has decided this is a real problem.

What 1Password Gets Right

They understand that AI agents are "hybrid identity subjects" — they have autonomous decision-making capability but authenticate through programmatic credentials (tokens, API keys, service accounts). Without clear identity boundaries, agent permissions spread faster and are harder to trace than human permissions.

They also understand the real-time dimension. 1Password's language about "continuous identity security" where credentials are "active control points rather than static artifacts" — that's the right mental model.

What's Still Missing

Every enterprise solution so far — SailPoint, Okta, Microsoft Agent 365, and now 1Password — assumes a centralized identity provider. Your organization controls the identity, the vault, the policies.

That works inside one enterprise. It doesn't work when:

  • Agent A from Company X needs to verify Agent B from Company Y
  • An autonomous agent operates across multiple platforms with no single organizational anchor
  • You need identity that persists across provider boundaries

This is the cross-vendor agent identity gap that open protocols need to fill. When your agent talks to another agent outside your 1Password vault, what proves who it is?

Cryptographic identity at the protocol level — Ed25519 key pairs, DID-based identifiers, signed capability proofs — works peer-to-peer without requiring both agents to share the same identity provider.

The Open Protocol Approach

AIP takes a different angle: identity is a property of the agent itself, not a policy assigned by an organization.

pip install aip-identity
aip init
# Your agent now has a cryptographic identity
# No organization, no vault, no admin required
Enter fullscreen mode Exit fullscreen mode

This isn't a replacement for enterprise IAM. It's the layer underneath — the identity primitive that works whether you're inside a 1Password vault, a SailPoint governance framework, or operating independently.

The trust handshake protocol we shipped last week (v0.5.51) demonstrates this: two agents exchange signed capability proofs in a 3-round-trip protocol, establishing mutual verification without any centralized authority.

Where This Converges

The interesting future isn't "enterprise IAM vs. open protocols." It's both:

  • Enterprise platforms like 1Password manage organizational policy and credential lifecycle
  • Open protocols provide the cryptographic identity layer for cross-boundary verification
  • The agent carries both: organizational credentials AND a self-sovereign identity

1Password entering this space validates the problem. The market is real. Now we need the interoperability layer that makes all these identity systems work together.


Building the open identity layer for AI agents at AIP. 19 agents registered, 26 active vouches, trust handshake protocol live. pip install aip-identity to try it.

Top comments (0)