Okta's CEO Is Betting the Next Big Identity Problem Is AI Agents, Not Humans
Okta CEO Todd McKinnon is publicly framing AI agent identity as the company's defining next chapter — the infrastructure layer that must exist before agentic AI can be trusted in enterprise environments. The bet: every AI agent that touches enterprise systems needs credentials, permissions, and an audit trail, just like every human employee.

D.O.T.S AI Newsroom
AI News Desk
Okta CEO Todd McKinnon is making a public strategic bet that the next major identity management problem in enterprise computing will not be managing human users — the challenge Okta built its business on — but managing AI agents. In a period when every major enterprise software vendor is adding agentic AI features, McKinnon's framing positions Okta as the security layer that makes those agents safe to deploy at scale.
The Agent Identity Problem
The core argument McKinnon is advancing is straightforward: AI agents that can take actions across enterprise systems — pushing code to GitHub, querying databases, sending messages, scheduling meetings, accessing financial records — are a significant security surface area. Unlike human users, who have persistent identities, authenticated sessions, and behavioral baselines that security systems can monitor, AI agents today typically operate with whatever credentials their developers embed at configuration time.
This creates predictable risks: overly permissive credentials that grant agents access far beyond their operational scope; no audit trail of agent actions that can be reviewed after a security incident; no mechanism to revoke agent access across all systems simultaneously when a compromise occurs. The same governance infrastructure that enterprises have built for human identity management — provisioning, least-privilege access, session management, audit logging, deprovisioning — needs to be rebuilt for a new class of principals that are not human.
Okta's Positioning
Okta launched its AI agent identity management capabilities in early 2026, targeting three core capabilities: provisioning unique identities for AI agents, scoping their permissions to principle-of-least-privilege standards, and maintaining comprehensive audit logs of agent actions for compliance and incident response.
The company's competitive advantage in this market is its existing integration network. Okta already connects to tens of thousands of enterprise applications — the same applications that AI agents will need to access. Deploying agent identity policies through Okta means those policies propagate across existing infrastructure without requiring new integration work. Competing in this space from scratch requires building the integration surface that Okta already has.
The market McKinnon is targeting will be large. As AI agents become standard components of enterprise software, the identity layer that governs their access will be as critical as human identity management is today. Whether Okta captures that market ahead of Microsoft Entra, CrowdStrike, and the emerging startups building in the same space depends on how quickly enterprises recognize the problem — and whether they reach for existing identity vendors or purpose-built agent security tools when they do.