{"id":15043,"date":"2026-05-23T10:52:16","date_gmt":"2026-05-23T10:52:16","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=15043"},"modified":"2026-05-23T10:52:16","modified_gmt":"2026-05-23T10:52:16","slug":"proton-launches-credential-tokens-to-sort-out-ai-agent-safety-hole","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=15043","title":{"rendered":"Proton Launches Credential Tokens to Sort out AI Agent Safety Hole"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A rising rigidity sits on the coronary heart of enterprise AI deployments: organisations need brokers to behave autonomously, but handing over passwords and API keys to automated programs represents a big and largely unresolved safety danger. <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/proton.me\/\">Proton<\/a> is now trying to shut that hole with the launch of Proton Go for AI Brokers, a functionality that wraps credential sharing in a structured token framework constructed across the precept of least-privilege entry.<\/p>\n<div class=\"jeg_ad jeg_ad_article jnews_content_inline_ads  \">\n<div class=\"ads-wrapper align-right \"><a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/bit.ly\/jnewsio\" aria-label=\"Visit advertisement link\" target=\"_blank\" rel=\"nofollow noopener\" class=\"adlink ads_image align-right\"><br \/>\n                                    <img decoding=\"async\" class=\"lazyload\" src=\"https:\/\/itsecguru.dessol.com\/wp-content\/uploads\/2018\/08\/ad_300x250.jpg\" alt=\"\" data-pin-no-hover=\"true\"\/><br \/>\n                                <\/a><\/div>\n<\/div>\n<p>Introduced at this time, the characteristic introduces AI entry tokens: devoted permission units that permit a consumer or administrator to grant an AI agent entry to particular vault objects inside Proton Go, with out exposing broader credential shops. Each token is read-only, scoped to designated objects, and might be configured with an expiration date or revoked immediately.<\/p>\n<h5>The Credential Downside in Agentic Workflows<\/h5>\n<p>Many present AI agent implementations depend on ad-hoc credential sharing, passwords pasted into system prompts, API keys saved in plain-text configuration recordsdata, or tokens with overly broad permissions. Safety practitioners have flagged these patterns as a systemic danger as agentic programs acquire wider enterprise adoption.<\/p>\n<p>A current McKinsey survey discovered that whereas 62% of organisations are experimenting with AI brokers, solely 23% are scaling utilization broadly, with safety issues cited as a major barrier. Proton\u2019s method goals to offer safety groups a proper mechanism for authorising and monitoring what AI brokers can entry.<\/p>\n<h5>How Proton Go AI Tokens Work<\/h5>\n<p>Every AI entry token is generated inside Proton Go settings and tied to a particular vault or subset of vault objects. The controls obtainable to directors and particular person customers embrace:<\/p>\n<ul>\n<li><strong>Learn-only entry:<\/strong> Brokers can&#8217;t create, edit, or delete credentials.<\/li>\n<li><strong>Vault segmentation:<\/strong> Entry is proscribed to designated objects solely.<\/li>\n<li><strong>Necessary entry justification:<\/strong> The agent should present a said purpose every time credentials are requested.<\/li>\n<li><strong>Configurable expiration dates:<\/strong> Tokens routinely lapse after an outlined interval.<\/li>\n<li><strong>Actual-time audit logs:<\/strong> Each credential request is recorded and reviewable.<\/li>\n<li><strong>On the spot revocation:<\/strong> Tokens might be cancelled at any level.<\/li>\n<\/ul>\n<p>The underlying information stays protected by Proton\u2019s end-to-end encryption, which means credential payloads should not uncovered in transit or at relaxation in an unencrypted type.<\/p>\n<p><em>\u201cAI brokers have the potential to dramatically enhance productiveness, however customers ought to by no means should sacrifice safety or management,\u201d <\/em>stated <strong>Son Nguyen Kim, Head of Proton Go.<\/strong><\/p>\n<h5>Enterprise Use Instances<\/h5>\n<p>Proton highlights a variety of enterprise workflow eventualities the place the token system is designed to offer safe automation, together with:<\/p>\n<ul>\n<li>Authorising AI brokers to summarise CRM interactions forward of gross sales conferences.<\/li>\n<li>Delegating Jira ticket administration to automated workflows.<\/li>\n<li>Enabling AI-driven evaluation of operational or monetary information.<\/li>\n<li>Granting managed entry to banking information for transaction categorisation instruments.<\/li>\n<\/ul>\n<p>The framework is explicitly designed to be composable. Customers present the token and related setup directions to whichever AI agent or automation platform they&#8217;re working with, making it vendor-agnostic.<\/p>\n<h5>Availability and Pricing<\/h5>\n<p>AI entry tokens can be found instantly at no further price for subscribers on Proton Go Plus, Go Skilled, Go Household, Proton Limitless, and Proton Workspace plans. Proton is positioning the characteristic as an ordinary element of enterprise-grade password administration somewhat than a premium add-on.<\/p>\n<p>Extra data is obtainable by way of the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/proton.me\/blog\/pass-access-tokens\">Proton Weblog<\/a>. Safety groups evaluating the aptitude can start testing straight inside the Proton Go settings panel.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A rising rigidity sits on the coronary heart of enterprise AI deployments: organisations need brokers to behave autonomously, but handing over passwords and API keys to automated programs represents a big and largely unresolved safety danger. Proton is now trying to shut that hole with the launch of Proton Go for AI Brokers, a functionality [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":15045,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[75,1428,1433,199,9177,211,4907,6356],"class_list":["post-15043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-agent","tag-credential","tag-gap","tag-launches","tag-proton","tag-security","tag-tackle","tag-tokens"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/15043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15043"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/15043\/revisions"}],"predecessor-version":[{"id":15044,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/15043\/revisions\/15044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/15045"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-23 20:11:06 UTC -->