Skip to content
View mrsabath's full-sized avatar

Organizations

@IBM @fr8r

Block or report mrsabath

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mrsabath/README.md

Mariusz Sabath

Senior Technical Staff Member | IBM Research, Hybrid Cloud SPIFFE Steering Committee Member | Building zero-trust identity infrastructure for cloud-native AI agents

LinkedIn Web X


Current Focus

When AI agents act on behalf of users -- committing code, calling APIs, triggering workflows -- who holds the identity?

I'm building Kagenti -- an open-source platform for deploying, securing, and governing AI agents on Kubernetes. The security layer uses SPIFFE/SPIRE, OAuth 2.0 token exchange (RFC 8693), and transparent sidecar injection so agent developers never write auth code.

User (authorization) --> Agent (SPIFFE identity) --> Token Exchange (RFC 8693) --> Target Service
                          |                               |
                     Zero code changes              Subject preserved (audit trail)

The agent holds cryptographic identity. The user holds delegated authorization. The platform enforces policy.

Recent Talks

  • KubeCon + CloudNativeCon Europe 2026 -- "When an Agent Acts on Your Behalf, Who Holds the Keys?" -- Cryptographic identity and delegation for cloud-native AI agents

Key Projects

Project Role Description
kagenti/kagenti Creator & Maintainer Agentic platform -- installer, UI, orchestration for secure AI agents on Kubernetes
kagenti/kagenti-extensions Creator & Maintainer Admission webhook, AuthBridge (AuthProxy + client registration), Helm charts
kagenti/agent-examples Creator & Maintainer Reference agent implementations and demo tools
spiffe/tornjak Co-creator & Maintainer SPIRE management UI and API layer (CNCF)
Kuadrant/mcp-gateway Contributor Envoy-based MCP Gateway with Istio and policy attachment integration

Technical Interests

  • Workload Identity -- SPIFFE/SPIRE, JWT-SVIDs, attestation, chain-of-trust
  • Agent Security -- OAuth 2.0 token exchange, subject preservation, scope-based access control
  • Cloud-Native Infrastructure -- Kubernetes admission webhooks, Envoy sidecars, service mesh coexistence
  • Agent Attestation -- Stackable attestors enriching identity with agent provenance, capabilities, and SBOM verification

Writing

  • Kagenti Blog -- Technical deep-dives on agent identity, AuthBridge architecture, and zero-trust patterns
  • kagenti.io -- Project site, architecture, and getting-started guides

GitHub Activity

GitHub Stats Contribution Graph

Stats Productive Time


Contact: mrsabath at gmail.com | Ask me about: SPIFFE/SPIRE, zero-trust for AI agents, Kubernetes workload identity

Pinned Loading

  1. kagenti/kagenti kagenti/kagenti Public

    Main Kagenti repo - installer, UI and docs

    Python 163 65

  2. spiffe/tornjak spiffe/tornjak Public

    Tornjak is a UI and management layer used for brokering human access to one or more SPIRE deployments

    TypeScript 92 65

  3. kagenti/agent-examples kagenti/agent-examples Public

    Sample Agents and Tools for Kagenti platform

    Python 11 32

  4. Kuadrant/mcp-gateway Kuadrant/mcp-gateway Public

    An envoy-based MCP Gateway that integrates with Istio and policy attachment mechanisms for authN, authZ, rate limiting and more.

    Go 58 43

  5. mrsabath.github.io mrsabath.github.io Public

  6. mytechnotes mytechnotes Public

    Shell