PlainID
Policy-Based Access Management (PBAM) platform with dedicated agentic AI authorization — AI agents, RAG security, MCP control, and data access governance.
What it does
An authorization platform powered by Policy-Based Access Control (PBAC). PlainID enables organisations to discover, manage, and enforce access policies across SaaS applications, data stores, and AI agents. Named an Overall Leader in KuppingerCole's PBAM Leadership Compass. Dedicated agentic AI capabilities cover AI agent authorization, RAG security, MCP control, and data access governance for Material Non-Public Information (MNPI).
Security relevance
Addresses the authorization gap in AI deployments — PlainID enforces what AI agents can access at the data and API level, not just the network level. Particularly strong for regulated industries (financial services, pharma) where data-level access control is non-negotiable. Integrates with existing identity fabrics (Okta, Azure AD, Ping) to extend human identity policies to agentic contexts.
When to use it
Evaluate when you need enterprise-grade authorization for AI agents accessing sensitive data, especially in regulated environments. Particularly relevant when your AI agents access data stores with compliance requirements (MNPI, PII, PHI) and you need policy-based controls that go beyond network-level firewalling.
OWASP coverage
Risks addressed — mapped to both OWASP Top 10 standards. 4 in LLM, 2 in Agentic.
The raw record
What Yuntona stores. Single source of truth — fork it on GitHub.
name: PlainID slug: plainid type: Mixed category: Identity & AppSec url: https://www.plainid.com/plainid-platform reviewed: 2026-04 added: 2026-04 updated: 2026-04 risks: llm: [LLM01, LLM06, LLM07, LLM08] asi: [ASI02, ASI03] complexity: Enterprise Only pricing: — audience: Blue Team lifecycle: [deploy] tags: [ABAC, Agentic, AuthZ, MCP, PBAC, RAG]