<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.4.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-chu-oauth-as-attested-user-cert-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="OAuth RAR for User Certs">OAuth 2.0 Rich Authorization Requests for AS-Attested User Certificates</title>

    <author initials="C." surname="Chu" fullname="Cheng-Kang Chu">
      <organization>Huawei Int. Pte Ltd</organization>
      <address>
        <email>chu.cheng.kang@huawei.com</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Ruochen Li">
      <organization>Huawei Int. Pte Ltd</organization>
      <address>
        <email>li.ruochen@h-partners.com</email>
      </address>
    </author>
    <author initials="H." surname="Wang" fullname="Haiguang Wang">
      <organization>Huawei Int. Pte Ltd</organization>
      <address>
        <email>wang.haiguang.shieldlab@huawei.com</email>
      </address>
    </author>
    <author initials="T." surname="Li" fullname="Tieyan Li">
      <organization>Huawei Int. Pte Ltd</organization>
      <address>
        <email>Li.Tieyan@huawei.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="02"/>

    <area>Security</area>
    <workgroup>OAuth</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 41?>

<t>This document defines an extension to the OAuth 2.0 Rich Authorization Requests (RAR) framework. It introduces a mechanism that allows a Client, such as an autonomous AI Agent, to request an Authorization Server (AS) to include an AS-attested Resource Owner public key certificate within, or bound to, an Access Token.</t>

<t>This mechanism enables the Resource Server (RS) to securely obtain the Resource Owner's trusted public key, which can then be used to verify application-layer delegation evidence (e.g., Verifiable Credentials) signed by the Resource Owner.</t>



    </abstract>



  </front>

  <middle>


<?line 47?>

<section anchor="introduction"><name>1. Introduction</name>

<t>With the rise of autonomous AI Agents acting on behalf of users, traditional OAuth 2.0 <xref target="RFC6749"></xref> scopes often fail to provide the fine-grained, user-signed intent verification required for high-stakes operations. A robust solution involves the Resource Owner (RO) issuing a Verifiable Credential (VC) to the Client. To exercise these delegated rights, the Client generates and presents a Verifiable Presentation (VP)-derived from the original VC-to the Resource Server (RS) to prove specific, user-signed delegation boundaries.</t>

<t>However, a trust gap exists: while the RO uses its private key to sign the VC, the RS lacks a standard mechanism to verify if the corresponding public key genuinely belongs to the RO. This specification bridges that gap by leveraging Rich Authorization Requests (RAR) <xref target="RFC9396"></xref>. It allows a Client to request an AS-attested certificate of the RO's public key. The RS can then extract this certificate from the Access Token to verify the signature of the RO-issued evidence contained within the VP.</t>

</section>
<section anchor="conventions-and-terminology"><name>2. Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref>.</t>

</section>
<section anchor="protocol-overview"><name>3. Protocol Overview</name>

<t>The protocol consists of two phases: Initial Bootstrapping and Autonomous Execution.</t>

<section anchor="phase-1-initial-bootstrapping-and-registration"><name>3.1. Phase 1: Initial Bootstrapping and Registration</name>

<t>The RO registers their public key and authorizes the Client to act on their behalf.</t>

<figure><sourcecode type="sourcecode"><![CDATA[
+------+          (1) Register Public Key (PK)          +---------------+
|      |----------------------------------------------->|               |
|  RO  |          (2) Acknowledge & Store PK            | Authorization |
|      |<-----------------------------------------------|  Server (AS)  |
+------+                                                |               |
   |                                                    |               |
   |      (3) Interactive Authz Request (via Client)    |               |
   +--------------------------------------------------->|               |
   |                                                    |               |
   |      (4) Explicit Consent for Refresh Token (RT)   |               |
   |<---------------------------------------------------|               |
   |                                                    |               |
   |              (5) Issue Refresh Token (RT)          |               |
   |   +------------------------------------------------|               |
   |   |                                                +---------------+
   v   v
+----------+                                            +---------------+
|          |      (6) Delegate Intent (e.g., via VC)    |               |
|  Client  |<-------------------------------------------|      RO       |
| (Agent)  |          (Signed with Private Key)         |               |
+----------+                                            +---------------+
]]></sourcecode></figure>

<t><list style="numbers" type="1">
  <t><strong>Public Key Registration:</strong> The RO registers their public key (PK) with the AS.</t>
  <t><strong>Storage:</strong> The AS stores the PK and binds it to the RO's identity.</t>
  <t><strong>Authorization Request:</strong> The Client initiates an interactive OAuth 2.0 flow.</t>
  <t><strong>Consent:</strong> The AS authenticates the RO and obtains consent for a Refresh Token (RT).</t>
  <t><strong>Token Issuance:</strong> The AS issues an RT to the Client.</t>
  <t><strong>Intent Delegation:</strong> The RO provides the Client with signed evidence (e.g., a VC) out-of-band.</t>
</list></t>

</section>
<section anchor="phase-2-autonomous-execution"><name>3.2. Phase 2: Autonomous Execution</name>

<t>The Client uses the Refresh Token to request an Access Token containing the RO's certificate.</t>

<figure><sourcecode type="sourcecode"><![CDATA[
+----------+      (A) Token Request (Refresh Token + RAR)       +---------------+
|          |--------------------------------------------------->|               |
|  Client  |                                                    | Authorization |
| (Agent)  |      (B) Access Token (includes AS-signed Cert)    |  Server (AS)  |
|          |<---------------------------------------------------|               |
+----------+                                                    +---------------+
     |
     |    (C) API Request + AT + RO-signed VC
     v
+----------+      (D) [Optional] Introspect AT                  +---------------+
| Resource |--------------------------------------------------->| Authorization |
| Server   |      (E) Return Certificate Data                   |  Server (AS)  |
|  (RS)    |<---------------------------------------------------|               |
|          |                                                    +---------------+
|          |-- (F) Extract Cert & Verify AS Signature
|          |-- (G) Verify VC Signature using User PK from Cert
|          |-- (H) Execute Authorized Operation
+----------+
]]></sourcecode></figure>

<t><list style="symbols">
  <t><strong>(A) Token Request:</strong> The Client calls the AS <spanx style="verb">/token</spanx> endpoint with <spanx style="verb">grant_type=refresh_token</spanx> and RAR <spanx style="verb">authorization_details</spanx>.</t>
  <t><strong>(B) AT Issuance:</strong> The AS validates the RT and issues an Access Token (AT) containing the RO's certificate.</t>
  <t><strong>(C) Resource Request:</strong> The Client presents the AT and the RO-signed VC to the RS.</t>
  <t><strong>(D-E) Introspection:</strong> The RS may retrieve certificate data via introspection if the AT is opaque.</t>
  <t><strong>(F-G) Verification:</strong> The RS verifies the certificate and then uses the RO's PK to verify the VC.</t>
</list></t>

</section>
</section>
<section anchor="authorization-details-type"><name>4. Authorization Details Type</name>

<t>This section defines the new RAR <spanx style="verb">authorization_details</spanx> type <spanx style="verb">urn:ietf:params:oauth:as-attested-user-cert</spanx>. This type enables the Client to explicitly request the RO's public key attestation.</t>

<section anchor="the-authorizationdetails-object"><name>4.1. The authorization_details Object</name>

<t>The following fields are defined for this RAR type:</t>

<t><list style="symbols">
  <t><strong><spanx style="verb">type</spanx></strong> (REQUIRED): MUST be set to <spanx style="verb">urn:ietf:params:oauth:as-attested-user-cert</spanx>.</t>
  <t><strong><spanx style="verb">cert_format</spanx></strong> (OPTIONAL): A string indicating the preferred format for the attestation. Supported values include <spanx style="verb">x509</spanx> (for [RFC5280] certificates) and <spanx style="verb">jwk</spanx> (for [RFC7517] JSON Web Keys). If omitted, the AS MAY return a format based on its local policy.</t>
  <t><strong><spanx style="verb">intended_rs</spanx></strong> (OPTIONAL): An array of strings containing the identifiers (e.g., URIs) of the Resource Servers. This allows the AS to restrict the audience of the issued certificate.</t>
</list></t>

</section>
<section anchor="example-token-request"><name>4.2. Example Token Request</name>

<t>```http
POST /token HTTP/1.1
Host: as.example.com
Content-Type: application/x-www-form-urlencoded</t>

<t>grant_type=refresh_token
&amp;refresh_token=tGzv3JOkF0XG5Qx2TlKWIA
&amp;client_id=ai-agent-client-123
&amp;authorization_details=[
  {
    "type": "urn:ietf:params:oauth:as-attested-user-cert",
    "cert_format": "x509",
    "intended_rs": ["<eref target="https://rs.example.com/api/v1">https://rs.example.com/api/v1</eref>"]
  }
]
```</t>

</section>
</section>
<section anchor="authorization-server-processing"><name>5. Authorization Server Processing</name>

<t>When the AS receives a token request with the <spanx style="verb">urn:ietf:params:oauth:as-attested-user-cert</spanx> type, it MUST perform the following processing steps:</t>

<t><list style="numbers" type="1">
  <t><strong>Grant Validation:</strong> Validate the <spanx style="verb">refresh_token</spanx> or other provided grant according to <xref target="RFC6749"></xref>.</t>
  <t><strong>RO Identification:</strong> Identify the RO associated with the authenticated session or grant.</t>
  <t><strong>Public Key Retrieval:</strong> Retrieve the RO's registered public key from the AS's secure storage. If no public key is registered for this RO, the AS MUST return an <spanx style="verb">invalid_request</spanx> error.</t>
  <t><strong>Certificate Generation:</strong> Generate a digital attestation (e.g., an X.509 certificate) that binds the RO's identity (the <spanx style="verb">sub</spanx> value) to the retrieved public key. The AS MUST sign this attestation using its own private key.</t>
  <t><strong>Issuance:</strong> Include the attestation data in the <spanx style="verb">authorization_details</spanx> claim of the issued Access Token.</t>
</list></t>

</section>
<section anchor="access-token-and-introspection"><name>6. Access Token and Introspection</name>

<t>The AS MUST provide the RO's certificate data to the RS, either by embedding it directly in a structured token (e.g., JWT) or by returning it via an introspection response.</t>

<section anchor="jwt-access-token-payload"><name>6.1. JWT Access Token Payload</name>

<t>For JWT-formatted Access Tokens [RFC9068], the AS MUST include the certificate in the <spanx style="verb">authorization_details</spanx> array:</t>

<figure><sourcecode type="sourcecode"><![CDATA[
{
  "iss": "[https://as.example.com](https://as.example.com)",
  "sub": "user_12345",
  "aud": "[https://rs.example.com/api/v1](https://rs.example.com/api/v1)",
  "exp": 1718293600,
  "authorization_details": [
    {
      "type": "urn:ietf:params:oauth:as-attested-user-cert",
      "certificate_data": "MIIDdzCCAl+gAwIBAgIE...<Base64_Encoded_Cert>..."
    }
  ]
}
]]></sourcecode></figure>

</section>
<section anchor="token-introspection-response"><name>6.2. Token Introspection Response</name>

<t>If the Access Token is opaque, the RS MUST use Token Introspection <xref target="RFC7662"></xref>. The AS response MUST include the same <spanx style="verb">authorization_details</spanx> object as defined above:</t>

<figure><sourcecode type="sourcecode"><![CDATA[
{
  "active": true,
  "scope": "read write",
  "authorization_details": [
    {
      "type": "urn:ietf:params:oauth:as-attested-user-cert",
      "certificate_data": "MIIDdzCCAl+gAwIBAgIE..."
    }
  ]
}
]]></sourcecode></figure>

</section>
</section>
<section anchor="resource-server-processing"><name>7. Resource Server Processing</name>

<t>The RS MUST follow these steps to verify the AI Agent's request:</t>

<t><list style="numbers" type="1">
  <t><strong>AT Validation:</strong> Validate the Access Token (signature, expiration, and audience).</t>
  <t><strong>Certificate Extraction:</strong> Extract the <spanx style="verb">certificate_data</spanx> from the <spanx style="verb">authorization_details</spanx> claim.</t>
  <t><strong>AS Signature Verification:</strong> Verify the AS's signature on the certificate using the AS's well-known public key. This confirms that the RO's public key has not been tampered with.</t>
  <t><strong>Application Evidence Verification:</strong> Extract the RO's public key from the verified certificate and use it to verify the signature of the application-layer evidence (e.g., the VP/VC provided by the AI Agent).</t>
  <t><strong>Execution:</strong> Proceed with the requested operation only if all cryptographic signatures are valid.</t>
</list></t>

</section>
<section anchor="security-considerations"><name>8. Security Considerations</name>

<section anchor="integrity-and-authenticity-of-the-resource-owners-public-key"><name>8.1. Integrity and Authenticity of the Resource Owner's Public Key</name>
<t>The AS-attested certificate is the primary defense against key substitution attacks. The RS MUST NOT use any RO public key that is not accompanied by a valid AS signature. Any discrepancy in the AS signature MUST result in the immediate rejection of the request.</t>

</section>
<section anchor="proof-of-possession-pop"><name>8.2. Proof-of-Possession (PoP)</name>
<t>To prevent token/credential leakage risks, it is RECOMMENDED that the Client's request to the RS be protected by a Proof-of-Possession mechanism (e.g., DPoP or mTLS), ensuring the AT and the RO-signed evidence are bound to the current Client.</t>

</section>
<section anchor="validation-of-delegated-intent-boundaries"><name>8.3. Validation of Delegated Intent Boundaries</name>
<t>The RS MUST strictly parse and validate the claims within the presented VP to ensure the requested action falls within the explicit boundaries signed by the RO.</t>

</section>
</section>
<section anchor="iana-considerations"><name>9. IANA Considerations</name>

<section anchor="oauth-authorization-details-types-registry"><name>9.1. OAuth Authorization Details Types Registry</name>

<t>This document requests the registration of the following type in the "OAuth Authorization Details Types" registry:</t>

<texttable>
      <ttcol align='left'>Type Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Change Controller</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">urn:ietf:params:oauth:as-attested-user-cert</spanx></c>
      <c>Request an AS-attested RO public key certificate</c>
      <c>IETF</c>
      <c>[[This Document]]</c>
</texttable>

</section>
</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>
<reference anchor="RFC6750">
  <front>
    <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="D. Hardt" initials="D." surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6750"/>
  <seriesInfo name="DOI" value="10.17487/RFC6750"/>
</reference>
<reference anchor="RFC7519">
  <front>
    <title>JSON Web Token (JWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7519"/>
  <seriesInfo name="DOI" value="10.17487/RFC7519"/>
</reference>
<reference anchor="RFC7662">
  <front>
    <title>OAuth 2.0 Token Introspection</title>
    <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7662"/>
  <seriesInfo name="DOI" value="10.17487/RFC7662"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC9396">
  <front>
    <title>OAuth 2.0 Rich Authorization Requests</title>
    <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
    <author fullname="J. Richer" initials="J." surname="Richer"/>
    <author fullname="B. Campbell" initials="B." surname="Campbell"/>
    <date month="May" year="2023"/>
    <abstract>
      <t>This document specifies a new parameter authorization_details that is used to carry fine-grained authorization data in OAuth messages.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9396"/>
  <seriesInfo name="DOI" value="10.17487/RFC9396"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA81ae28aSbb/H4nvcMSVMpC4O7YTOwnaWS3BTuLJAxaIsyvL
MkX3AWrcVPVWVYOZ68lnvzpV1Q8wTuKZuVcXKQpuqk/Vef3Oq4IgqNcMNwm2
odHrZGYOh+E+DHg0B/pLKv4bM1wKGOB/MtRGw1Qq6AyDjjGoDcbwWaOCLirD
pzxiBnWjXmOTicJlQXLQGdjXiqW0JpaRYAtsQ6zY1ATRPAsky8w8YDpgnniQ
aVRBhMoE+/v1GpGfSbVugzZxvcZT1QajMm0O9/df7R/Wa0wha8MQo0xxs67X
VlJdz5TM0jbYk9Rr17heSRW34UwYVAJNcELb12v1mjZMxFcskQLbsEZdr6W8
DRdGRnugpTIKp3oP9HpBXy7pDWYl1K7XIAAudBu6IXTnWb0GAI637hzFLHjP
xKz4QaoZE16qbXiXsRVyOk0IfYPwgRgDAFwwnrQhmmdhRDTCayZm/5jb1WEk
F+WegxA+8MqWg0zSG/nDB22X8FC51/8xD1KmjEClN7d7F8IXJmaVDd8xPsuI
w+K5VLPvbrViYhbO/auhnnNM4oRNdrI42mJxxHHNqhx+d7cPPHQvbdCv14RU
C2b4EkmJMHjTPTw4eJV/P37xvPL9aD///uKoXPPi+Pgw//7y4MXz/PurZ6+O
27RDEATAJtooFlkrG825hlhG2QKFgRinXKAGJgBvDApNrmYkmDnCj7ljc9AZ
tGCq2ALJ2kM4M8CFUTLOIiIMC4zmTHC9ADNnBliSyBU97yYchdkDnUVzYPYI
LDNSyIXMNHTOoDOzvxsJym1GSzZPMUS1RAXNzrBF67iIkixGu25YODEMUMtM
RQi9lUAFaTZJeATXuIaohA1YcTPnYg+kgonMRAxG7llKUYRaw0heowihEGHJ
Fgo2SVBbmRVb5ScbuJNpggRM1iAnhnGxudYe6yftoATjygH3YDUn2UfMviJg
gpBppLPBEhWfroGlaUIMcCmChK1RQYwJzpx8cMljFBFCE8NZuAfn9A6n40JX
YYzCcJboFmg+ExjDZL3jYGFuRQsexwnSX/8FByGZulUybUQPv3Azt68rrhHk
dJc2NbDIcDEDSazMWTKlhQSyeg+MYjEnaiyp2N6Fd4RL0JFMUYOcGhQwZTwh
KaRKEo92YzLlYKYYFxjvWaqBZ4wLQ9ZuReaFZY2KK4xtZJjz2TzQhl3TBikq
u0SH0AElJ5k2oGWS2de4WMpkua1uZ1nNQa8FXOuMWGS7pQ3N824rdzHnAyGM
JOANqogkZ+aoMVcixqD4bG5IPMV6mKGgI1q/jSFVqJ1sqzv23VPHa/O83wpi
VHxJ/Cq5sNSk4jNO0j7vBv5A99kviRlBpxiRADeFW7E36zhMcdTWat7JFS5R
7QFztg0zlgLecG10myw7cXob9IieBm40pIovyRvJO8lv+Mw5y3nXSWAwhIRF
18SsjZdMxVWEKdyCT+3ySCqFOpUiJpVUPH+GIuOCPHKCiRQznatk0AvBOnjO
rOdM8Xhmtc4cG5M1JMQcmxHl7yPkhQflS4uQWyi4DXIV8KpClJz6I/6kK7zQ
ea1gCpTAGwv3YIiPKoFC9VVQq0iNfiKRM5OpynYB2TTGJZxEUhjrZh41nYr6
oQOHwxC6UizJ3qVwNjpCteBCJnK2dgjqNEypkIbGx8/DUWPP/Q+fevb74PSf
n88Gpyf0ffiu8+FD8SVfMXzX+/zhpPxWvtntffx4+unEvfypN4KtRx87/27s
2XM1ev3RWe9T50MDLBfV2MgUkmgmaOFDpQpJH0xDjDpSfGJxBV53+3Dw3KqX
Yvel/UaR+NJL41kIfSWNjGQCvSWqJcdVLoM0/yGSQpNbWJmvJKRzplFTlsgt
aLyW0lAMT1MLLSImY8vR9fQGIwtObkfa8iCEPpGAg2/RGOCM05McwkfOGZV9
jMpiHN8ImPQW82buMbC0YDI5KfxLDt7tib5+/epQJZIx1mtPAvt5AsWnedDy
Z0EFfbfbe1xDs/++Va7y7xWfJ/XarfvlNnjY5++3sPm5taQGPYDKL83DFnSi
ayFXCcYzhEcwNFIh9N9vvLrl9rflqf72wGPdwkZCQ6TuyurHPjsY3PH0z5Nq
Pmu5Sobi+hKtLH7LoQ+aS54jXOt+Utt6/aMa/N9h8HkLTm8oxeKGUI1iqs0Y
BjhVqOceQpuDUet+Ug81BG8M/ycM5p/mUQvOCOZ3c/ZdUg/W4v2kHszkDmQA
gCX9K1woeKgb3Q83FUE0j1tw4lM16wjC5Lk22T6leruldgs5cD7MPDwpgqqS
VNMm161N9Bq67IwCNPR9VvUe16Uyd5zqL5TV169fCfsPQnj8uALp1ZDTfvwY
vh9ybBBY5cVFZxjWa4dElMCYzTAn0hmCJnh2Qan/3oaqCRcx5ZVlcveTBm4z
cbMO67VnRGhn2paT9UriNoa6jNulAx7wykJlmshVWK89J5IeKCpno6BJ29oO
VZ710hFdQahtBpBjC9vhg2G9dkSk3RPyVCaiKvc2R7PnG4y26ot67Zhe9fZ5
UuTrFQX4OmojpFuh+yR/u5J0ti0zE8hpMGEiLnOPwzz3OGzvzFLyTMPvYlN/
V3tUed7KiKv5qs8+KYsplFrJcr+Rc1QMu9lpeXJFtNo8wBOwefsPgcEDHDj/
3JODFKDwEPcrPXpHLrINDs3XrU1xNn3bRFPd4dVNTdIcurZzkirjf1Fk+6O4
k392B4A8pnjWm90WdPpnhb6fQGdEWu7lTJ93/fKdUaN50oKLXuoaFJeu/UE1
oiEyP3Ki27K6/oMGs0O7Xjmldk8plTaZEtWeOJwww3YazC7t2qL/L9Tu3bD5
p7W76XzQfENZmit6iW145FohawLGYV7Q3n3tbStfd94t10GmCVvstKD/3hXN
RPXu++9aHtaw0A3G0MsbSJtmVMTEx/D48R342Qo4EUsS7SMejJ8aWjoGFHEq
eQ7N45liwlyZdYo/K4ddV36hre46AxizqslcxWgYT/Q49IcgKBjtCiZLlvC4
DFUjS7CMMJv40Rm1fgCT7YbdVukEuxkvulmWd7ex70IUblqE82FO9yQ4bVVc
shrbhrBga1BoFMclbrRDYvIKytN49c28d9QZAaduIPtPVpz/TZCbjG8MVbZx
3UUvsuo2ngVRCXUknv77rc7Lede3DJ6HW65+4vQGo3WKRQda++PmPXwiIXD1
Lb0D2QqMMyXaHM20nTLFFrpt517tnXOvse+G2Rerne6y7EdfHiXrImLv6FKB
o82qfYrn1Kcg6e08LfQmv2I+tECYSuqZkYFNaVajbX/G8e56uLZ7Q8zTWdu5
o43pr/Hjx9DMO0qtNthG0wRBo+XgYQLxdOmPq6md31jyeSep1YYOaKPopFzE
1k68V6QKp6h8z3nBjD82bsgGhlmaSkW9piVLyOHyscb45mj/1Ria9BZ1mY4O
X+5fVi1Nt6ytjX9dXVeWvTg6eHEJvwx7n+ALTigL160QzqYgF9wYapV7mPnY
+Tf5CcUOlp9wwmjcQE5hNCQyYgmkMuHROheDba3HGF8pfUcMAphSbE1NLScQ
vY0TLhefcsr8fWb5eXCmW0XvcbMfrb01+vapP7dNFWmDyFkey2Juc1VPxHcv
t1NEa4CHIZzesEWa4CYc04LxeDw3Jq3X+r3hCBwGw7vRqP/0IDyg7rY2bWA6
REfAzfS60mbZAblquzqdeXoTrFargOQaZCpBQZlpTPvcB+P12qONv382b39b
Pvuld/1m/19vj/55czhK3n8569RrjyLrjFc8/pnxgFG+F7hHwcHhs3rt0U7/
+vmC0p3/djlPg7ZvtKHxAFdo7Pl3K65AJMhMi98q9tFow0XjgkSq20+fqg3B
PWUpf7o8uGx+8+dW45LI/l6vXVr1OLg82oZLn9P0laQwxWkqXK99IQT2FqMw
Qr6040mn1Ry4ijrzQZBgEWeP6kwLLCkqEoabSRWolRanAW0w1e2iPH5L+odz
F3J9TPF/uQHJeCu6SwXSzGmU6aq2GKwJAYsiqeykw8hycJYXzIMenHl3K2OX
f7IuSlKtZcTt4KmQRbV2jUETE1LQIeyueRm9UeTbYMsS2mGQR94iKOTF/sao
szKbGP6k/cDUlvRshhauhKwu5xt0SvzvlXBGusjxTMCYC5vVXHldjwGVkqoo
2SsB+62br3kR+b8QGMR8xg1LqnhdFMQC/hUe7b+qwkzLjYtcF+JO/wGaVrc6
m4wd0hdjwTxZie9MeXK2/FyMoLByFJe3ElLLlaiO0vLmQTXTO/NRZSv+uKTI
j3TuSyOihPHFFrxuzMmdYx6Hm5kiBaeNJC2P7Tlb1WnudgrpDlZkfnuA3PrA
ZA24mGAcO94h5gojSka4sENClUWU1Mfe0726fvkyatlR/9qbiH+bskHX4qkk
hG6EqIuwcUx5yy9fRpvc9dk6kcwi+hup6PfAYaLZko52w8D945eXm8bKKyqp
cv4dbdgg297R9bDY3uCakLcE3s2IVSLu5vOWQ/CGziY2LGhUVweHz54f+ecs
izeo/jE4d7TwJm204eDFwcvDV8+O9/fzHXZwSzHERRYfuP5c6PLBywv6ikyM
KH08OzuJf+t2O8mTWWd19rozOzsNw/Bvr5nG4+dXpy52XxFm/D0Mw4Yj9jv9
d1mv/V5UetZWDkNvIBumT6mNNSpadza9O5Utao9i8G1tJNO4k9yFvwx0WQBF
brV3bUuzxf3WJG3W7eacLrlmE7nE++3LdUIb9ioceqOhqxokSIUshpXiBhv/
X5V6v/LgRXjnQsRmTjGqKMZFen99w0b4rfIuvwRjI6ArfYsUoDP6VvzfLLeL
Af0elV7cBao9P5p1mW8rj/nVqOYbJH6D0+KOAMJ4W1zjMhp/MwQULfRKl+VO
eXxeEYEN7eUFA3EH6lwIK9auMEkCGsGKrVDIbSkx5Wrh72TsKjnnTIOQBiZI
qR9bpDZXoLwmj/qdMj+H07zFvc1AVVTbWxRy8tV/fKfyJ4d1E4hvXbK4e41r
u+Purlg8Pe+WWd9k07CKGUHRaqfTW4utpnPe+KisyxtVIEVi78ywJIFIrVMj
Z4qlcx6VJ3UFt02hfHh/GRZXXe1olMf5xSmPfS9Dd08MZ3aNv7bgckl6sF3k
5RfhylQyTw9234fh2pfVfMHUmvAKCe/YjCYqxupHZxNtuHF3t5gxdHeouDCT
3zexOmJibQchpW6tXXFnQpRaL1ImuBM7c4KwU6dcQCF0xBpiriOFKRPROo/b
1UV5VqqzxOS/88UCY8q5QeGvHs69aLyuwkKgh/Y2iZzS2KUvdZ6MN/uy36rX
RnRTC5euMXON4mlU3jtLkF2zmb2ed61tsULpcnkxpnQj19opYapMuqhnQndW
MDK5HHadpryQ5W33pC/7lG0tRh+GrT1AoTNV+PmuHl9h/GRz+XVMBxaZUsRf
MdrygnkWVhCUxHdS3KDzc6/XxeW0TeB2nYNkDSlT2vnssoq+Ful09aaT71FS
L7JvO2DED245l4NamNpGbuXlvF1WuSy3ff+y5x3sVQhnnU+d3c71ipzLjR/v
bxbqfOC6vnv3V+UX1Ny5y7lsbnxl7Wq7f/78je/u2cipuaT01j4l7WQIt3Bi
b0+lboQB3TkTMyQOjZJJggpoTDJFZbVvhwdtuny6+z/6+WGV+m0x/tm+JNy7
72LwLZydjt7ALVxcWAGeeAFeXtIB3N3YCYuua/8DIOJYCc0wAAA=

-->

</rfc>

