User Experience (UX)
Table of Contents
- Q1: How do we handle delegation for shared accounts?
- Q2: Can we revoke delegation instantly while an agent is active?
- Q3: How do we enforce "step-up" authentication before delegation?
- Q4: How do we detect "MFA Fatigue" attacks triggered by agents?
Q1: How do we handle delegation for shared accounts?

Learn How to Master Digital Trust

The State of Consumer Digital ID 2024

Top CIAM Platform 2024
Q1: How do we handle delegation for shared accounts?
Shared accounts are a governance trap: you lose accountability and invite over-privilege.
Safer approach:
-
Replace “shared user” with “shared resource.” Keep individual identities, then grant access to a shared workspace/project via relationships (groups/teams) and enforce via graph authorization (Zanzibar-style).
-
If a shared account is unavoidable: force strong step-up, strict time-bounds, and per-action logging with explicit delegation_id and approver_id.
Q2: Can we revoke delegation instantly while an agent is active?
Yes, design for revocation as a real-time control, not a scheduled cleanup.
Mechanisms:
-
Token revocation endpoint: revoke access/refresh tokens and related tokens tied to the same grant.
-
Token introspection: resource servers check token active state at request time (best with opaque tokens).
-
Near-real-time session attenuation: use shared-signal patterns (CAEP/SSF) where receivers respond to security events quickly.
Practical “instant revocation” recipe:
-
Make access tokens short-lived
-
Use introspection or continuous evaluation for sensitive tools
-
Maintain a fast deny-list keyed by delegation_id
Q3: How do we enforce "step-up" authentication before delegation?
Treat delegation as a privileged operation and require step-up based on risk.
Implementation patterns:
-
Step-up if: new device, new region, high-impact tool, privileged data class, high spend, or long delegation duration.
-
Prefer phishing-resistant methods for step-up where possible (passkeys/FIDO2 are a common modern baseline).
-
Record “step-up satisfied” as a time-bound flag tied to the delegation grant (e.g., valid for 10 minutes).
Q4: How do we detect "MFA Fatigue" attacks triggered by agents?
“MFA fatigue” (push bombing) is a real risk when agents or automations can trigger repeated auth challenges.
Detection signals:
-
High-frequency push prompts for a single user within a short window
-
Repeated prompts with no successful primary auth or unusual IP/device
-
Prompts triggered by an agent outside its normal intent/tool boundaries
Mitigations that work:
-
Number matching for push to prevent blind approvals (CISA recommends it as a defense against push fatigue).
-
Rate-limit step-up prompts per user + per agent + per delegation.
-
Require “why” context in the prompt (show the triggering action/intent).
-
Use phishing-resistant factors for sensitive flows (reduce dependence on push).
-
LoginRadius has a clear overview of push-bombing mechanics and prevention concepts if you want a customer-friendly explainer.
Customer Identity, Simplified.
No Complexity. No Limits.See how simple identity management can be. Start today!