|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 46 |
| Published: October 2025 |
| Authors: Badal Bhushan |
10.5120/ijca2025925777
|
Badal Bhushan . An Explainable Zero Trust Identity Framework for LLMs, AI Agents, and Agentic AI Systems. International Journal of Computer Applications. 187, 46 (October 2025), 42-52. DOI=10.5120/ijca2025925777
@article{ 10.5120/ijca2025925777,
author = { Badal Bhushan },
title = { An Explainable Zero Trust Identity Framework for LLMs, AI Agents, and Agentic AI Systems },
journal = { International Journal of Computer Applications },
year = { 2025 },
volume = { 187 },
number = { 46 },
pages = { 42-52 },
doi = { 10.5120/ijca2025925777 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2025
%A Badal Bhushan
%T An Explainable Zero Trust Identity Framework for LLMs, AI Agents, and Agentic AI Systems%T
%J International Journal of Computer Applications
%V 187
%N 46
%P 42-52
%R 10.5120/ijca2025925777
%I Foundation of Computer Science (FCS), NY, USA
The rapid exponential growth of Artificial Intelligence (AI), more so Large Language Models (LLMs), AI Agents, and Agentic AI, has ushered in revolutionary efficiencies and automation in business operations. As they become increasingly autonomous, smart, and rooted in workflows, however, they introduce a new wave of identity and access management (IAM) challenges. Traditional IAM controls, broadly designed to serve in large part static human identities, do not serve the behavior-based and dynamic nature of AI objects. This paper introduces an end-to-end, Zero Trust-based IAM system specifically for LLMs, AI agents, and agentic AI systems. The adopted model contains authentication mechanisms such as OAuth 2.0, mTLS, and TPM-bound tokens; ABAC and PBAC models based on AI-specific metadata (i.e., confidence values, model origin); and Just-in-Time privilege access mechanisms guarded by secrets vaults. Enterprise use cases modeled for the framework—payroll automation, document generation, CI/CD pipeline orchestration—underscore its significance. Metrics include a 75% reduction in credential exposure windows, 60% enhancement in audit traceability, and 40% enhancement in the effectiveness of anomaly detection. This effort addresses a critical void by putting IAM not as a bottleneck nor an inhibitor but as an underpinning facilitator to scale, secure integration of AI. The proposed architecture aligns with NIST AI Risk Management Framework, OWASP Agentic Threat recommendations, and CSA’s Zero Trust Maturity guidance. It also sets the stage for future agent identity schema standards, AI behavior policy declaration, and governance automation.