Acting on Its Own
In this walkthrough, John asks the Wayfinder Concierge for flights from Colombo to Singapore and follows up with a request for recommendations. The Concierge answers from the booking API catalog. No popup, no extra consent — it makes the calls under its own identity, using its M2M token.
Complete Setup before starting this walkthrough.
Connect to Services → The agent acts on its own covers the requirements story behind this use case.
Walk Through the Use Case
-
Sign in to Wayfinder as
john.doeand open the chat widget. -
Send:
What flights are there from Colombo to Singapore?The AI Agent recognises this as a browsing tool. It calls the
search_flightsMCP tool with its own M2M token, and replies in the chat with the list of available flights. -
Send a follow-up:
Suggest a few flight deals.This calls the
recommend_flightsMCP tool, which requires thebooking:recommendscope. The agent gets it because it requestsscope=booking:recommendwhen fetching its M2M token. TheRecommenderrole you assigned toWAYFINDER-CONCIERGEduring setup grants exactly that permission.
No consent popup appears at any point. The user never sees the agent's M2M token — it lives entirely inside the AI Agent.
Try a Variant
- Tail the AI Agent logs while sending the message. You can see the
client_credentialstoken request go out to ThunderID withscope=booking:recommend, and theAuthorization: Bearer …header on the MCP call. - Remove the
Recommenderrole assignment from the agent in the Console. Ask for recommendations again and watch the agent surface the403back to you in natural language — the M2M token no longer carriesbooking:recommend.
Agent identity. WAYFINDER-CONCIERGE is a first-class principal in ThunderID with its own credentials. Treating it as an identity — not just an API key — is what lets you grant, restrict, audit, and revoke its access independently of any user. See Manage Agents and Agent Authentication.
Authorization. The recommend_flights tool is protected by booking:recommend on the booking-api resource server. The agent's M2M token carries that permission because the agent holds the Recommender role — exactly the same requireScope check that gates user tokens applies to the agent's. See Authorization.