back

How to Secure Agents using OAuth — Jared Hanson (Keycard, Passport.js)

Get SIGNAL/NOISE in your inbox daily

OAuth: the quiet protector of your agents

In the evolving landscape of AI agents and automation, security remains the fundamental but often overlooked foundation. Jared Hanson, the creator of Passport.js and co-founder of Keycard, recently delivered an illuminating talk on implementing OAuth for agent security. His presentation offers a critical roadmap for organizations looking to protect their autonomous systems from the increasing sophistication of security threats.

Key insights from Hanson's talk

  • The agent security challenge: As agents gain more autonomy and access to sensitive systems, traditional security models break down. Agents need tailored authentication approaches that maintain security without sacrificing their automated nature.

  • OAuth as the solution: OAuth 2.0 provides a framework perfectly suited for agent security, allowing controlled delegation of access without credential sharing. This creates clear boundaries and permissions that limit an agent's reach to only what's necessary.

  • Implementation patterns: Hanson outlines three distinct ways to implement OAuth for agents – client credentials for backend-only interactions, authorization code for user-delegated access, and device authorization for situations where direct user interaction isn't possible.

Why this matters now

The most compelling insight from Hanson's presentation is how OAuth fundamentally shifts the security paradigm for agents. Rather than trying to retrofit human-centered authentication to autonomous systems, OAuth provides purpose-built patterns that acknowledge the unique nature of agent operations.

This approach arrives at a critical inflection point in enterprise automation. Organizations are rapidly deploying AI agents across business functions, but security implementations haven't kept pace. According to recent IBM research, 74% of companies that have adopted AI acknowledge security gaps in their implementations. These vulnerabilities represent existential business risks as agents often require access to multiple systems containing sensitive data.

By implementing OAuth patterns as Hanson suggests, organizations create security guardrails that allow for innovation without exposing critical systems. This isn't merely about preventing breaches—it's about building sustainable automation infrastructure that scales safely.

Beyond the presentation: real-world applications

Hanson's technical focus leaves room for exploring how these patterns manifest in enterprise environments. Consider a financial services firm implementing an agent to process customer service requests. Without proper OAuth implementation, this agent might require overly broad system access, creating unnecessary risk vectors. By using the authorization code flow, the agent can request precisely

Recent Videos

Oct 6, 2025

How To Earn MONEY With Images (No Bullsh*t)

Smart earnings from your image collection In today's digital economy, passive income streams have become increasingly accessible to creators with various skill sets. A recent YouTube video cuts through the hype to explore legitimate ways photographers, designers, and even casual smartphone users can monetize their image collections. The strategies outlined don't rely on unrealistic promises or complicated schemes—instead, they focus on established marketplaces with proven revenue potential for image creators. Key Points Stock photography platforms like Shutterstock, Adobe Stock, and Getty Images remain viable income sources when you understand their specific requirements and optimize your submissions accordingly. Specialized marketplaces focusing...

Oct 3, 2025

New SHAPE SHIFTING AI Robot Is Freaking People Out

Liquid robots will change everything In the quiet labs of Carnegie Mellon University, scientists have created something that feels plucked from science fiction—a magnetic slime robot that can transform between liquid and solid states, slipping through tight spaces before reassembling on the other side. This technology, showcased in a recent YouTube video, represents a significant leap beyond traditional robotics into a realm where machines mimic not just animal movements, but their fundamental physical properties. While the internet might be buzzing with dystopian concerns about "shape-shifting terminators," the reality offers far more promising applications that could revolutionize medicine, rescue operations, and...

Oct 3, 2025

How To Do Homeless AI Tiktok Trend (Tiktok Homeless AI Tutorial)

AI homeless trend raises ethical concerns In an era where social media trends evolve faster than we can comprehend them, TikTok's "homeless AI" trend has sparked both creative engagement and serious ethical questions. The trend, which involves using AI to transform ordinary photos into images depicting homelessness, has rapidly gained traction across the platform, with creators eagerly jumping on board to showcase their digital transformations. While the technical process is relatively straightforward, the implications of digitally "becoming homeless" for entertainment deserve careful consideration. The video tutorial provides a step-by-step guide on creating these AI-generated images, explaining how users can transform...