Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
History
Business
Sports
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/13/43/bd/1343bdee-c3b3-4b88-8841-ff026aeafd6e/mza_12244864361700508791.jpg/600x600bb.jpg
Pop Goes the Stack
F5
25 episodes
6 days ago
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
Show more...
Technology
RSS
All content for Pop Goes the Stack is the property of F5 and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/13/43/bd/1343bdee-c3b3-4b88-8841-ff026aeafd6e/mza_12244864361700508791.jpg/600x600bb.jpg
Now you see me, now you don't: Ephemeral Auth and AI agents
Pop Goes the Stack
24 minutes
1 month ago
Now you see me, now you don't: Ephemeral Auth and AI agents

Agents are popping up everywhere: tiny bots spinning up for a task, then dying off. They shouldn’t carry long-lived credentials any more than you carry a master key everywhere you go. What if each agent got a just-for-this-mission credential—scoped, temporary, context-aware, and gone when its task ends? That’s ephemeral authentication. 


In this episode, F5's Lori MacVittie, Joel Moses, and special guest Bill Church dig into why traditional IAM (OAuth tokens, persistent keys) fails in agentic worlds. They’ll show how ephemeral auth can reduce blast radius, prevent credential replay, and force “least privilege in the moment.” Then they walk through how it might be built: token issuance on mission start, embedded attestation, automatic revocation, and scope tunneling per action. And yeah, there are tradeoffs—latency, credential churn, throttling limits. Listen in for the best path forward.

Read the arXiv article, A Novel Zero-Trust Identity Framework for Agentic AI: Decentralized Authentication and Fine-Grained Access Control: https://arxiv.org/html/2505.19301v1?utm_source=chatgpt.com


Find out more about the importance of policy in payload: https://www.f5.com/resources/white-papers/policy-in-payload-preparing-for-ai-agent-architectures

Pop Goes the Stack
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.