The Enterprise AI Conversation Is Still Incomplete
Most enterprise AI conversations still begin in familiar places: use cases, model performance, productivity gains, adoption plans, and operating value. Those are all legitimate concerns. But they are no longer enough once AI moves beyond generating outputs and begins participating in execution. The issue changes when AI starts initiating tasks, shaping decisions across workflows, triggering downstream actions, or operating across systems under delegated authority. At that point, it is no longer behaving only as a capability layer. It is beginning to behave more like an actor inside an enterprise control environment.
That is where many organizations are still under-designed. Traditional identity and access models were built around known users, defined roles, bounded permissions, and applications with relatively clear technical purpose. Segregation of duties was designed around the same assumptions. One role initiates. Another approves. A third reviews. The control works because authority is intentionally separated, visible enough to inspect, and structured well enough to defend. AI agents place pressure on those assumptions. The question is no longer only whether an agent can access a system. The harder question is what kind of actor the enterprise has allowed into the control model, what authority that actor is exercising, and whether existing identity and SoD structures still mean what leaders think they mean once AI begins participating across workflows. That is not a side issue in AI adoption. It sits at the center of enterprise control design.
Why Traditional Identity Logic Starts to Strain
Most enterprises still govern access through a familiar set of questions. Who is the user? What role do they hold? What systems can they access? Which combinations of permissions create a conflict? Those questions still matter. They are simply no longer enough. A copilot that surfaces information inside a bounded workflow is one thing. An agent that can gather context across systems, recommend a path, initiate a transaction, route work, or trigger downstream activity is something else. It may not look like a traditional user, but it is participating in authority that has historically been treated as user authority, process authority, or tightly governed application behavior.
This is where ambiguity begins to accumulate. Is the agent acting as the employee? As the application? As a service identity? As a delegated actor operating within a business function? In many enterprise environments, the honest answer is some version of all of the above, depending on the workflow. Once that becomes true, the control model is already under strain. Many organizations respond by assuming that if access is technically routed through an existing platform identity or service account, the governance problem is already addressed. Usually it is not.
The technical identity may exist. The governance meaning of that identity often does not.
That distinction matters because governance is not only about whether an identity authenticated correctly or whether an entitlement was granted through a known mechanism. It is about whether the enterprise can still explain who exercised authority across a consequential business action, under whose mandate, and within what control boundaries. That is where the conversation moves beyond basic IAM mechanics and into enterprise control design.
Traditional identity model vs AI-enabled authority model
Traditional identity models explain access. They do not fully explain agent authority across workflows.
The traditional model works when the actor, role, application, and transaction path are clear. AI weakens that clarity because the actor may participate through a user, a service account, and a workflow at the same time.
Why the SoD Assumption No Longer Holds Cleanly
Segregation of duties depends on visible separation of authority. That separation is not valuable only because tasks are distributed across different steps. It is valuable because judgment, initiation, approval, and review are intentionally prevented from collapsing into a single point of influence. AI changes that in ways that are easy to underestimate. First, it compresses the distance between process steps. Recommendation, validation, initiation, routing, and escalation can begin to operate as one tightly connected flow rather than as clearly separated control moments. The boundaries may still exist in documentation, but the practical distance between them weakens.
Second, AI makes it less clear where authority is actually being exercised. A formal SoD model may still show different human approvers at different points in the workflow. But if an agent is assembling context, shaping the recommendation, preparing the action path, and orchestrating downstream steps, then the visible handoffs may no longer represent where meaningful control truly sits. This is where many organizations have not yet fully reclassified their control assumptions.
SoD can appear intact while effective authority shifts underneath it.
That does not mean AI eliminates segregation of duties. It means AI can change how authority is concentrated inside a workflow without formally changing the role matrix that was meant to control it. That distinction matters more than many enterprises realize. A control can remain present on paper while becoming materially weaker in practice. Approval steps can still exist, reviewers can still be named, and role matrices can still look clean. Yet if system-assisted orchestration has already concentrated judgment and action preparation into one path, the enterprise may be relying on the appearance of separation more than the substance of it.
SoD compression across process steps
SoD can remain present on paper while authority concentrates inside system-assisted flows.
What This Looks Like in Practice
The pattern is already visible in operating environments. In finance, an AI-enabled workflow may prepare entries, pull supporting context, draft a recommendation, and route an item for approval. On paper, the preparer and approver may still be separated. In practice, the approver may be reviewing an output assembled through multiple data sources, logic layers, and system interactions they did not directly perform and may not fully interrogate. The formal control remains. The effective control may be weaker.
In procurement, an agent may help create supplier records, validate information across systems, initiate onboarding steps, and participate in exception handling or approval routing. None of those permissions may appear excessive in isolation. The issue emerges when one agent-driven flow begins to assemble influence across activities that were originally separated to avoid concentration of authority.
In identity and access operations, the same pattern can appear when AI participates in access request triage, role recommendation, entitlement analysis, and control evidence preparation. Even where final approval remains human, the concentration of influence across the decision path may exceed what the existing control model was designed to evaluate.
Across these examples, the underlying pattern is the same. The enterprise has introduced a new form of actor into a control environment that was designed around human roles, explicit authority boundaries, and more easily understood decision trails.
Consider a wider cross-functional workflow involving supplier onboarding, access provisioning, and downstream financial processing. An agent reviews submitted information, pulls reference data from multiple systems, identifies exceptions, drafts recommendations, routes approvals, and initiates next-step actions. None of those individual steps necessarily appears unreasonable. No single entitlement may look extreme. The formal role model may still show separation between requestor, approver, and reviewer. But that is not where the real issue sits. The issue is the authority assembled across the flow. The same agent logic is now participating in judgment, validation, workflow initiation, escalation, and action preparation across connected systems. Human checkpoints may still exist. The role matrix may still appear clean. Yet practical authority has already moved closer to the system-assisted path than the control design may acknowledge. That is the point enterprises need to confront. The question is not only whether the workflow still contains a human approval. It is whether the organization can still explain who exercised authority across the decision path in a way that would stand up to audit, risk, or operational scrutiny.
From access to accountable action.
AI risk does not stop at system access. The control question moves through authority, workflow participation, and business-auditable attribution.
The Harder Question Enterprises Need to Answer
Most organizations can explain what an AI tool does. Far fewer can explain what it is in control terms. That is now the harder question. If an AI agent can access systems, shape decisions, trigger actions, and operate across functional boundaries, it cannot be treated merely as a feature embedded inside a user experience. It needs a defined place in the enterprise identity and control model.
At minimum, leaders need clear answers to a set of practical questions. What identity does the agent operate under? What authority is being delegated to it? Which actions remain assistive, and which begin to cross into operative authority? Which combinations of permissions create SoD risk when exercised through an agent-driven flow rather than a human role? How is agent activity attributed, reviewed, and defended in business terms rather than only technical logs? If those answers are vague, the enterprise may still have access controls. It does not yet have a complete access governance model for AI.
That is the difference between authentication and governance.
Five questions that expose agent authority risk
Use this as a practical diagnostic when AI begins participating in enterprise workflows.
Actor classification
AI activity disappears behind user sessions, inherited service accounts, or vague platform identities.
Define the agent as a distinct actor category with ownership, accountable function, and permitted operating context.
Why This Is Bigger Than IAM Alone
It would be easy to frame this as an identity issue and stop there. That would be too narrow. This is also an enterprise architecture issue, an ERP control issue, a risk and audit issue, and an operating-model issue. The reason is simple. AI agents do not stay inside one clean system boundary. They move across business processes, integration paths, policy layers, and decision points. They connect technical design with delegated business authority. That means the identity question cannot be separated from the authority question.
IAM can answer important parts of the problem: who authenticated, what identity was used, what entitlements existed, and what policy allowed the action. But that alone does not answer whether authority was concentrated across a multi-step business flow in a manner the enterprise would still consider controlled. That is why this issue matters to CIOs and enterprise architects as much as it matters to IAM and security leaders. It sits at the seam between system design and control integrity. This is also where many enterprise AI conversations start to fragment. Architecture teams may focus on integration, operating models, and platform patterns. IAM and security teams may focus on authentication, entitlements, policy, and traceability. Risk and audit teams may focus on evidence, defensibility, and control design. The problem is that AI agents cut across all of those concerns at once. If those perspectives remain disconnected, the enterprise can end up with technically functioning AI layered onto a control structure that has not been reclassified for what the technology is actually doing.
What Leaders Need to Define Now
This does not require reinventing identity governance from scratch. It does require extending enterprise control thinking into a world where non-human actors are participating more directly in consequential workflows. A practical starting point is to classify AI agents as a distinct control category rather than treating them as a minor variation of user identity or application identity.
That means defining agent identity explicitly instead of letting agent behavior disappear behind generic service accounts or inherited application roles. It means distinguishing assistive authority from operative authority so enterprises do not treat recommendation and action as the same control condition. It means extending SoD analysis beyond static permission conflicts to examine workflow-level concentration of authority when the same agent participates across multiple stages. And it means making agent activity auditable in business terms, not only technical telemetry, so organizations can explain what decision was influenced, what action was initiated, and under whose authority the system operated. These are not theoretical enhancements. They are the minimum conditions required to keep identity governance and SoD meaningful as AI moves closer to execution.
Control model for agent governance
Agent governance requires explicit control design, not just inherited identity controls.
Define the actor type, owner, and accountable function before treating AI as another identity variant.
What Happens When Control Models Do Not Evolve
The likely failure mode is not immediate breakdown. It is gradual control ambiguity. Access paths become harder to explain. Approval steps remain in place but lose practical weight. SoD controls continue to exist in documentation while operational authority moves into system-assisted workflows that were never fully reclassified in governance terms. The technology appears to work. The control logic becomes harder to defend. That is not a minor governance gap. It is a leadership blind spot.
In many enterprises, AI is being introduced into workflows faster than control models are being reclassified to reflect what the technology is actually doing. The organization may believe it has preserved segregation of duties because the approval boxes are still present. But control is not preserved by leaving the boxes on the diagram. Control is preserved only when authority remains genuinely separated, attributable, and reviewable in practice. That is where the risk sharpens.
The issue is not only access. It is poorly understood delegated authority operating inside critical workflows under the appearance of intact control.
Closing Perspective
AI agents are not just another interface layer on top of enterprise systems. They introduce a new control problem into environments designed around human roles, explicit approvals, and visible separation of authority. That does not mean enterprises should avoid them. It does mean identity, access, and SoD models need to evolve before leaders assume those controls still hold under AI-assisted execution.
The question is no longer just who has access. It is what kind of actor the enterprise has introduced into the control model, how authority is being exercised across workflows, and whether that authority is still properly understood once AI begins operating at scale. AI does not remove segregation of duties. It exposes whether the enterprise ever defined it properly for non-human actors in the first place.
