<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-hood-independent-agtp-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="AGTP">Agent Transfer Protocol (AGTP)</title>

    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>

    <date year="2026" month="March" day="20"/>

    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword> <keyword>agentic systems</keyword> <keyword>protocol</keyword> <keyword>agent traffic</keyword> <keyword>agent transfer</keyword>

    <abstract>


<?line 89?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as "agent
protocols" including MCP, ACP, A2A, and ANP, are messaging-layer
constructs that presuppose HTTP as their transport. They do not address
the underlying transport problem.</t>

<t>This document defines the Agent Transfer Protocol (AGTP): a dedicated
application-layer protocol for AI agent traffic. AGTP provides agent-native
intent methods (QUERY, SUMMARIZE, BOOK, SCHEDULE, LEARN, DELEGATE,
COLLABORATE, CONFIRM, ESCALATE, NOTIFY), protocol-level agent identity
and authority headers, and a status code vocabulary designed for the
conditions AI agent systems encounter. AGTP SHOULD prefer QUIC for new
implementations and MUST support TCP/TLS for compatibility and fallback.
It is designed to be composable with existing agent frameworks, not to
replace them.</t>



    </abstract>



  </front>

  <middle>


<?line 110?>

<section anchor="introduction"><name>Introduction</name>

<t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that extensions and certain mechanisms referenced in this
document -- including the Agent Certificate extension (Section 7.2),
the ACTIVATE method, the Agent Birth Certificate mechanism
(Section 5.7), and the <spanx style="verb">.agent</spanx> and <spanx style="verb">.nomo</spanx> file format
specifications (Section 2) -- may be subject to pending patent
applications by the author.  The core AGTP specification is intended
for open implementation without royalty obligation.  The licensor is
prepared to grant a royalty-free license to implementers consistent
with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>

<section anchor="background"><name>Background</name>

<t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows, querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals, with minimal or no human supervision per transaction.</t>

<t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>

</section>
<section anchor="limitations-of-http-for-agent-traffic"><name>Limitations of HTTP for Agent Traffic</name>

<t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP being stateless, resource-oriented,
human-initiated request/response, creates specific failures when applied
to agentic systems at scale:</t>

<t><list style="symbols">
  <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
  <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent, summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
  <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
  <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
</list></t>

</section>
<section anchor="why-not-evolve-http"><name>Why Not Evolve HTTP?</name>

<t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>

<t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully, a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>

<t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>

<t>Third, the observability goal making agent traffic distinguishable from
human traffic at the infrastructure layer cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>

<t>AGTP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and AGTP coexist: human traffic continues to flow over
HTTP; agent traffic flows over AGTP. The two protocols serve different
classes of network participant.</t>

<t>Note: The abbreviation AGTP is used in this document to distinguish
the Agent Transfer Protocol from the Authenticated Transfer Protocol
(ATP) working group currently chartered within the IETF. The URI
agtp:// is proposed for IANA registration as a new and distinct scheme.</t>

</section>
<section anchor="motivation-for-a-dedicated-protocol"><name>Motivation for a Dedicated Protocol</name>

<t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>

<t>AGTP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions AI systems encounter.</t>

</section>
<section anchor="scope-and-target-audience"><name>Scope and Target Audience</name>

<t>This document covers AGTP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>

<t>The Agent Certificate extension for cryptographic binding of agent
identity to AGTP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="AGTP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>

<t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
  </dd>
  <dt>Principal:</dt>
  <dd>
    <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
  </dd>
  <dt>Agent-ID:</dt>
  <dd>
    <t>A unique identifier for a specific agent instance, present in all AGTP
request headers.</t>
  </dd>
  <dt>Principal-ID:</dt>
  <dd>
    <t>The identifier of the principal on whose behalf an agent operates.</t>
  </dd>
  <dt>Authority-Scope:</dt>
  <dd>
    <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format domain:action or domain:*.</t>
  </dd>
  <dt>Intent Method:</dt>
  <dd>
    <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
  </dd>
  <dt>Delegation Chain:</dt>
  <dd>
    <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
  </dd>
  <dt>Escalation:</dt>
  <dd>
    <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
  </dd>
  <dt>Attribution Record:</dt>
  <dd>
    <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
  </dd>
  <dt>Session:</dt>
  <dd>
    <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
  </dd>
  <dt>SEP (Scope-Enforcement Point):</dt>
  <dd>
    <t>An AGTP-aware infrastructure component, load balancer, gateway, and proxy,
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="AGTP-CERT"/>).</t>
  </dd>
  <dt>Agent Package (.agent):</dt>
  <dd>
    <t>A portable, open deployment artifact for an AI agent. An <spanx style="verb">.agent</spanx> file
contains an embedded Agent Manifest, an integrity hash covering all
package contents, and a behavioral trust score computed at packaging
time. The <spanx style="verb">.agent</spanx> format is an open specification. It is analogous to
a container image: a self-describing, portable unit of deployment. The
<spanx style="verb">.agent</spanx> suffix is a file format designator and <strong>MUST NOT</strong> appear as
a hostname component or top-level label in <spanx style="verb">agtp://</spanx> URIs. Note: the
<spanx style="verb">.agent</spanx> file format specification may be subject to pending patent
claims by the author; see Section 7.7.</t>
  </dd>
  <dt>Governed Agent Package (.nomo):</dt>
  <dd>
    <t>A deployment artifact in the <spanx style="verb">.nomo</spanx> format, which extends the <spanx style="verb">.agent</spanx>
format with a CA-signed certificate chain binding the package to a
verified governance zone and issuing principal. The <spanx style="verb">.nomo</spanx> format is
to <spanx style="verb">.agent</spanx> as HTTPS is to HTTP: the same structural foundation with
an added layer of cryptographic trust. A <spanx style="verb">.nomo</spanx> package is required
for agents operating at Trust Tier 1 (see Section 5.2). The <spanx style="verb">.nomo</spanx>
suffix is a file format designator and <strong>MUST NOT</strong> appear as a
hostname component in <spanx style="verb">agtp://</spanx> URIs.
</t>

    <t>The name derives from the Greek <em>nomos</em> (νόμος), meaning law, rule,
or governance, the same root that underlies <em>autonomy</em> (self-law),
<em>nomocracy</em> (rule of law), and <em>onomastics</em>. A <spanx style="verb">.nomo</spanx> package is
literally an agent operating under law: its behavior is bounded by a
cryptographically enforced governance context at the packaging layer.
Note: the <spanx style="verb">.nomo</spanx> file format specification may be subject to pending
patent claims by the author; see Section 7.7.</t>
  </dd>
  <dt>Agent Transfer Document (.agtp):</dt>
  <dd>
    <t>The wire-level manifest document format defined by this specification.
An <spanx style="verb">.agtp</spanx> document is a signed JSON structure containing the fields
defined in Section 5.5 (Agent Manifest Document). It is the output
format returned by all AGTP URI resolution requests. Both <spanx style="verb">.agent</spanx> and
<spanx style="verb">.nomo</spanx> packages produce <spanx style="verb">.agtp</spanx> documents when queried; the <spanx style="verb">.agtp</spanx>
format is the protocol's canonical representation of agent identity
and is independent of the underlying packaging format. The <spanx style="verb">.agtp</spanx>
suffix <strong>MAY</strong> appear in filenames for stored manifest documents but
<strong>MUST NOT</strong> appear in <spanx style="verb">agtp://</spanx> URIs. The Content-Type for <spanx style="verb">.agtp</spanx>
documents is <spanx style="verb">application/agtp+json</spanx>.</t>
  </dd>
  <dt>URI (AGTP):</dt>
  <dd>
    <t>An <spanx style="verb">agtp://</spanx> scheme URI that identifies an agent or agent namespace.
AGTP URIs are addresses, not filenames. File extensions (<spanx style="verb">.agent</spanx>,
<spanx style="verb">.nomo</spanx>, <spanx style="verb">.agtp</spanx>) <strong>MUST NOT</strong> appear in canonical AGTP URIs. See
Section 5.1 for the canonical URI forms and resolution semantics.</t>
  </dd>
  <dt>Agent Namespace Document:</dt>
  <dd>
    <t>A cryptographically signed <spanx style="verb">application/agtp+json</spanx> document returned
in response to a request targeting an organization's agent registry
root (e.g., <spanx style="verb">agtp://acme.tld/agents</spanx>). Lists all Active agents
registered under the organization's governance zone. The document is
generated and re-signed by the governance platform on any registry
change. It is not a manually editable file. See Section 5.4.</t>
  </dd>
  <dt>Agent Manifest Document:</dt>
  <dd>
    <t>A cryptographically signed <spanx style="verb">application/agtp+json</spanx> document returned
in response to a request targeting a specific agent
(e.g., <spanx style="verb">agtp://acme.tld/agents/customer-service</spanx>). Contains the
agent's birth certificate fields, lifecycle state, behavioral trust
score, authority scope categories, supported methods, and governance
zone. Derived directly from the agent's <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> package;
the package integrity hash is verified before the manifest is served.
See Section 5.5.</t>
  </dd>
  <dt>Agent Birth Certificate:</dt>
  <dd>
    <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The Birth Certificate is
the genesis record of an agent's existence: it establishes the agent's
identity, ownership, authorized scope, behavioral archetype, and
governance zone before the agent takes any action. Authority is issued
through the Birth Certificate; it is never self-assumed.
</t>

    <t>The Birth Certificate is the source document from which the Agent
Manifest Document (Section 5.5) is derived when an AGTP URI is
resolved. The <spanx style="verb">certificate_hash</spanx> field of the Birth Certificate is
the basis for the agent's canonical Agent-ID. In this sense the Birth
Certificate functions as the agent's social security number: issued
once at creation, permanently bound to the individual, and the
authoritative identity record from which all other identity
representations derive.</t>

    <t>Birth Certificate fields map directly to AGTP protocol headers:
<spanx style="verb">agent_id</spanx> maps to the <spanx style="verb">Agent-ID</spanx> header; <spanx style="verb">owner</spanx> maps to the
<spanx style="verb">Principal-ID</spanx> header; <spanx style="verb">scope</spanx> maps to the <spanx style="verb">Authority-Scope</spanx> header.
See Section 5.7.</t>

    <t>Anonymous agents are ungovernable. Without a Birth Certificate, there
is no mechanism to trace decisions to a responsible principal, enforce
scope boundaries, or maintain a meaningful audit trail. Note: the
Agent Birth Certificate mechanism may be subject to pending patent
claims by the author; see Section 7.7.</t>
  </dd>
  <dt>Governance Token:</dt>
  <dd>
    <t>A signed, time-limited JWT artifact issued by a governance runtime
that encodes a specific governance decision for a specific action.
Governance tokens are the runtime companion to the static Birth
Certificate: where the Birth Certificate establishes persistent
identity, the Governance Token carries a bounded authorization for a
single action or session. Tokens carry the governance verdict
(ALLOW, DENY), the agent ID, action details, trust score dimensions,
issuer identity, and expiry. Default TTL: 30 seconds. Tokens
<strong>MUST NOT</strong> be reused across actions; each action requires a fresh
evaluation and a fresh token.</t>
  </dd>
  <dt>Trust Tier:</dt>
  <dd>
    <t>A classification assigned to an agent based on the strength of
identity verification backing its registration. Tier 1 (Verified):
org anchor is a real DNS domain with confirmed ownership and a <spanx style="verb">.nomo</spanx>
governed package. Tier 2 (Org-Asserted): org label is present but
DNS ownership is unverified; <spanx style="verb">.agent</spanx> package acceptable. Tier 3
(Experimental): X- prefix required; not discoverable through the
public AGTP registry. See Section 5.2.</t>
  </dd>
</dl>

</section>
<section anchor="problem-statement"><name>Problem Statement</name>

<t>AGTP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>

<section anchor="problem-1-undifferentiated-agent-traffic-on-http"><name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>

<t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result,
operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>

<t>AGTP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>

</section>
<section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods"><name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>

<t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, BOOK a resource, and SCHEDULE a sequence,
all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>

<t>AGTP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>

</section>
<section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents"><name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>

<t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>

<t>AGTP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>

</section>
<section anchor="problem-summary"><name>Problem Summary</name>

<texttable title="Summary of Problems Addressed by AGTP">
      <ttcol align='left'>#</ttcol>
      <ttcol align='left'>Problem</ttcol>
      <ttcol align='left'>Current Failure</ttcol>
      <ttcol align='left'>AGTP Response</ttcol>
      <c>1</c>
      <c>Undifferentiated traffic</c>
      <c>HTTP cannot separate agent traffic</c>
      <c>Dedicated protocol environment</c>
      <c>2</c>
      <c>Semantic mismatch</c>
      <c>HTTP verbs obscure agent intent</c>
      <c>Native intent-based method vocabulary</c>
      <c>3</c>
      <c>No protocol-level identity</c>
      <c>Attribution is untraceable</c>
      <c>Agent identity and scope in headers</c>
</texttable>

</section>
</section>
<section anchor="related-work-and-existing-approaches"><name>Related Work and Existing Approaches</name>

<section anchor="httprest-as-the-de-facto-standard"><name>HTTP/REST as the De Facto Standard</name>

<t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>

</section>
<section anchor="existing-agent-protocols"><name>Existing Agent Protocols</name>

<dl>
  <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
  <dd>
    <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
  </dd>
  <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
  <dd>
    <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
  </dd>
  <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
  <dd>
    <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
  </dd>
  <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
  <dd>
    <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
  </dd>
</dl>

<t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>

</section>
<section anchor="transport-layer-alternatives"><name>Transport-Layer Alternatives</name>

<dl>
  <dt>gRPC:</dt>
  <dd>
    <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
  </dd>
  <dt>WebSockets:</dt>
  <dd>
    <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
  </dd>
  <dt>QUIC <xref target="RFC9000"/>:</dt>
  <dd>
    <t>Modern multiplexed transport with reduced connection overhead. AGTP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; AGTP is the application-layer protocol above it.</t>
  </dd>
</dl>

</section>
<section anchor="the-critical-distinction-messaging-vs-transport"><name>The Critical Distinction: Messaging vs. Transport</name>

<t>The most important positioning principle for AGTP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols, they define what agents say. AGTP defines how agent
traffic moves.</t>

<t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. AGTP defines the transport environment those messages move through.</t>

</section>
<section anchor="agtp-positioning-the-proposed-stack"><name>AGTP Positioning: The Proposed Stack</name>

<figure title="AGTP in the Protocol Stack" anchor="protocol-stack"><artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork></figure>

<t>AGTP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over AGTP and gain transport-level observability and
identity without modifying the messaging layer. AGTP-native agents that do
not use a separate messaging protocol interact with AGTP methods directly.</t>

</section>
</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<section anchor="stack-position"><name>Stack Position</name>

<t>AGTP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>

<t><list style="symbols">
  <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
  <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
  <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
</list></t>

<t>Suggested port assignment (subject to IANA assignment. See Section 8):</t>

<t><list style="symbols">
  <t>AGTP/QUIC: port 8443 (proposed)</t>
  <t>AGTP/TCP+TLS: port 8080 (proposed)</t>
</list></t>

</section>
<section anchor="design-principles"><name>Design Principles</name>

<dl>
  <dt>Minimalist core:</dt>
  <dd>
    <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
  </dd>
  <dt>Extensible by design:</dt>
  <dd>
    <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
  </dd>
  <dt>Agent-native:</dt>
  <dd>
    <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
  </dd>
  <dt>Secure by default:</dt>
  <dd>
    <t>TLS 1.3 or higher is mandatory. Unencrypted AGTP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
  </dd>
  <dt>Observable by design:</dt>
  <dd>
    <t>Native metadata in every AGTP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
  </dd>
  <dt>Composable:</dt>
  <dd>
    <t>AGTP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
  </dd>
</dl>

</section>
<section anchor="connection-model"><name>Connection Model</name>

<t>AGTP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An AGTP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>

<t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>

</section>
<section anchor="header-format"><name>Header Format</name>

<section anchor="request-headers"><name>Request Headers</name>

<texttable title="AGTP Request Header Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>AGTP-Version</c>
      <c><strong>MUST</strong></c>
      <c>Protocol version. Current: AGTP/1.0</c>
      <c>AGTP-Method</c>
      <c><strong>MUST</strong></c>
      <c>The agent intent method (see Section 6)</c>
      <c>Agent-ID</c>
      <c><strong>MUST</strong></c>
      <c>Opaque identifier for the requesting agent instance</c>
      <c>Principal-ID</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the human or system that authorized this agent</c>
      <c>Authority-Scope</c>
      <c><strong>MUST</strong></c>
      <c>Declared scope of actions this agent is authorized to take</c>
      <c>Session-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Identifies the current task/workflow context</c>
      <c>Task-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Unique identifier for this specific method invocation</c>
      <c>Delegation-Chain</c>
      <c><strong>MAY</strong></c>
      <c>Ordered list of Agent-IDs if this request was delegated</c>
      <c>Priority</c>
      <c><strong>MAY</strong></c>
      <c>Request priority hint: critical, normal, background</c>
      <c>TTL</c>
      <c><strong>MAY</strong></c>
      <c>Maximum acceptable response latency in milliseconds</c>
</texttable>

</section>
<section anchor="response-headers"><name>Response Headers</name>

<texttable title="AGTP Response Header Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>AGTP-Version</c>
      <c><strong>MUST</strong></c>
      <c>Protocol version</c>
      <c>AGTP-Status</c>
      <c><strong>MUST</strong></c>
      <c>Numeric status code (see Section 5.5)</c>
      <c>Task-ID</c>
      <c><strong>MUST</strong></c>
      <c>Echo of request Task-ID for correlation</c>
      <c>Server-Agent-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Identity of the responding server or agent</c>
      <c>Attribution-Record</c>
      <c><strong>SHOULD</strong></c>
      <c>Signed record of the action taken, for audit</c>
      <c>Continuation-Token</c>
      <c><strong>MAY</strong></c>
      <c>Token for retrieving additional results in streaming contexts</c>
      <c>Supported-Methods</c>
      <c><strong>SHOULD</strong> (on session open)</c>
      <c>List of AGTP methods supported by this server</c>
</texttable>

</section>
</section>
<section anchor="status-codes"><name>Status Codes</name>

<t>AGTP defines its own status code space. Codes 451, 550, and 551 are
AGTP-specific with no HTTP equivalent and are registered in the IANA AGTP
Status Code Registry (see Section 8.3).</t>

<texttable title="AGTP Status Codes">
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <c>200</c>
      <c>OK</c>
      <c>Method executed successfully</c>
      <c>202</c>
      <c>Accepted</c>
      <c>Method accepted; execution is asynchronous</c>
      <c>204</c>
      <c>No Content</c>
      <c>Method executed; no response body</c>
      <c>400</c>
      <c>Bad Request</c>
      <c>Malformed AGTP request</c>
      <c>401</c>
      <c>Unauthorized</c>
      <c>Agent-ID not recognized or not authenticated</c>
      <c>403</c>
      <c>Forbidden</c>
      <c>Agent lacks authority for requested action per Authority-Scope</c>
      <c>404</c>
      <c>Not Found</c>
      <c>Target resource or agent not found</c>
      <c>408</c>
      <c>Timeout</c>
      <c>TTL exceeded before method could execute</c>
      <c>409</c>
      <c>Conflict</c>
      <c>Method conflicts with current state (e.g., BOOK on unavailable resource)</c>
      <c>410</c>
      <c>Gone</c>
      <c>Agent has been Revoked or Deprecated; canonical ID is permanently retired</c>
      <c>422</c>
      <c>Unprocessable</c>
      <c>Request well-formed but semantically invalid</c>
      <c>429</c>
      <c>Rate Limited</c>
      <c>Agent is exceeding permitted request frequency</c>
      <c>451</c>
      <c>Scope Violation</c>
      <c>Requested action is outside declared Authority-Scope. AGTP-specific</c>
      <c>500</c>
      <c>Server Error</c>
      <c>Internal failure in the responding system</c>
      <c>503</c>
      <c>Unavailable</c>
      <c>Responding agent or system temporarily unavailable or Suspended</c>
      <c>550</c>
      <c>Delegation Failure</c>
      <c>A delegated sub-agent failed to complete the requested action. AGTP-specific</c>
      <c>551</c>
      <c>Authority Chain Broken</c>
      <c>Delegation chain contains an unverifiable or broken identity link. AGTP-specific</c>
</texttable>

<t>Status code 451 (Scope Violation) is a governance signal: the agent
attempted an action outside its declared Authority-Scope, caught at the
protocol level. Status code 551 (Authority Chain Broken) indicates that
one or more Agent-ID entries in the Delegation-Chain header cannot be
verified as part of a valid delegation sequence. Status code 410 (Gone)
is returned when an agent's Birth Certificate has been revoked or the
agent deprecated; the canonical Agent-ID is permanently retired and
<strong>MUST NOT</strong> be retried. All three are operational signals, not protocol
errors, and <strong>MUST</strong> be logged for audit purposes.</t>

</section>
<section anchor="wire-format-and-content-type"><name>Wire Format and Content-Type</name>

<t>AGTP request and response bodies are encoded as JSON. The registered
Content-Type for AGTP message bodies is:</t>

<figure><artwork><![CDATA[
Content-Type: application/agtp+json
]]></artwork></figure>

<t>Implementations <strong>MUST</strong> include this Content-Type on all AGTP requests and
responses that carry a message body. Responses with no body (e.g., 204 No
Content) <strong>MUST NOT</strong> include a Content-Type header. Binary or streaming
extensions <strong>MAY</strong> define additional Content-Type values as part of their
companion specifications.</t>

<t>The common structure for all AGTP request bodies:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode></figure>

<t>And for all AGTP response bodies:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode></figure>

</section>
<section anchor="early-implementations"><name>Early Implementations</name>

<t>AGTP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>

<ul empty="true"><li>
  <t>If you are building an AGTP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
</li></ul>

<t>Implementers wishing to experiment before the formal IANA port assignment
may use port 8443 (AGTP/QUIC) and port 8080 (AGTP/TCP+TLS) as working
values. These values are subject to change upon final IANA assignment.</t>

<t>The ACTIVATE method extension, which binds <spanx style="verb">.nomo</spanx> governed agent packages
to AGTP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core AGTP
implementations need not support ACTIVATE to be compliant with this
specification.</t>

</section>
</section>
<section anchor="agent-identity-uri-structure-and-registration"><name>Agent Identity, URI Structure, and Registration</name>

<section anchor="uri-structure-and-resolution-mechanics"><name>URI Structure and Resolution Mechanics</name>

<section anchor="foundational-principle"><name>Foundational Principle</name>

<t>AGTP URIs are addresses, not filenames. File format suffixes
(<spanx style="verb">.agent</spanx>, <spanx style="verb">.nomo</spanx>, <spanx style="verb">.agtp</spanx>) <strong>MUST NOT</strong> appear in canonical
<spanx style="verb">agtp://</spanx> URIs. A URI resolves to an Agent Manifest Document or
Agent Namespace Document derived from the underlying package; it
does not expose or serve the package itself.</t>

<t>Implementations <strong>MUST</strong> treat any URI containing a file extension
in the path as non-canonical and <strong>SHOULD</strong> issue a 301 Moved
Permanently redirect to the canonical form prior to resolution.</t>

<t>The Canonical Agent-ID (256-bit cryptographic identifier) remains
the authoritative identifier in all AGTP protocol operations. Human-
readable URIs are aliases that resolve to a canonical identifier. In
the event of any conflict between a human-readable URI and a canonical
Agent-ID, the canonical Agent-ID <strong>MUST</strong> be treated as authoritative.</t>

</section>
<section anchor="canonical-uri-forms"><name>Canonical URI Forms</name>

<t>AGTP defines the following canonical URI forms:</t>

<figure><artwork><![CDATA[
Form 1. Canonical ID (cryptographic):
  agtp://[256-bit-hex-id]

Form 2. Domain-anchored agent (verified identity):
  agtp://[domain.tld]/agents/[agent-label]

Form 3. Subdomain-anchored agent (recommended enterprise pattern):
  agtp://agtp.[domain.tld]/agents/[agent-label]

Form 4. Organization namespace root:
  agtp://[domain.tld]/agents
  agtp://agtp.[domain.tld]/agents
]]></artwork></figure>

<t>The following URI forms are explicitly invalid and <strong>MUST</strong> return
<spanx style="verb">400 Bad Request</spanx> with error code <spanx style="verb">invalid-uri-form</spanx>:</t>

<figure><artwork><![CDATA[
agtp://[label].agent          (.agent as hostname TLD - prohibited)
agtp://[label].nomo           (.nomo as hostname TLD - prohibited)
agtp://[domain].[label].agent (hybrid dot-notation - prohibited)
agtp://[domain].[label].nomo  (hybrid dot-notation - prohibited)
]]></artwork></figure>

<t>Note: <spanx style="verb">.agent</spanx> is claimed as a Web3 top-level domain by at least one
blockchain naming system. URI forms that place <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx>
in the hostname position are prohibited both for collision avoidance
with Web3 naming systems and because they imply domain ownership
without enforcing it. See Section 5.6 for Web3 guidance.</t>

</section>
<section anchor="non-canonical-forms-and-redirect-behavior"><name>Non-Canonical Forms and Redirect Behavior</name>

<t>The following non-canonical forms <strong>SHOULD</strong> be redirected to their
canonical equivalents. Implementations <strong>MUST NOT</strong> serve package
contents in response to any URI form.</t>

<texttable title="Non-Canonical URI Forms and Redirect Targets">
      <ttcol align='left'>Received URI</ttcol>
      <ttcol align='left'>Canonical Redirect Target</ttcol>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service.agent</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service.nomo</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service.agtp</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service</spanx></c>
</texttable>

</section>
<section anchor="query-parameters-for-format-selection"><name>Query Parameters for Format Selection</name>

<t>All AGTP URI resolution requests accept an optional <spanx style="verb">format</spanx> query
parameter controlling the serialization of the returned document.</t>

<texttable title="AGTP URI Format Query Parameters">
      <ttcol align='left'>Query Parameter</ttcol>
      <ttcol align='left'>Returned Representation</ttcol>
      <c>(none)</c>
      <c>Agent Manifest Document, human-readable <spanx style="verb">application/agtp+json</spanx></c>
      <c><spanx style="verb">?format=manifest</spanx></c>
      <c>Agent Manifest Document, human-readable <spanx style="verb">application/agtp+json</spanx></c>
      <c><spanx style="verb">?format=json</spanx></c>
      <c>Agent Manifest Document, compact <spanx style="verb">application/agtp+json</spanx></c>
      <c><spanx style="verb">?format=certificate</spanx></c>
      <c>Birth certificate fields only, <spanx style="verb">application/agtp+json</spanx></c>
      <c><spanx style="verb">?format=status</spanx></c>
      <c>Lifecycle state and operational status only, <spanx style="verb">application/agtp+json</spanx></c>
</texttable>

<t>All format variants return signed <spanx style="verb">application/agtp+json</spanx> content.
The <spanx style="verb">?format=json</spanx> parameter is intended for programmatic consumers.
The default returns the full human-readable manifest suitable for
browser rendering by an AGTP-aware client.</t>

</section>
<section anchor="resolution-mechanics"><name>Resolution Mechanics</name>

<t>When an AGTP server receives a request targeting an agent URI, it
<strong>MUST</strong> perform the following steps in order:</t>

<t><list style="numbers" type="1">
  <t>Parse and validate the URI. If the URI is an invalid (prohibited)
form, return <spanx style="verb">400 Bad Request</spanx> with error code <spanx style="verb">invalid-uri-form</spanx>.</t>
  <t>Resolve the agent label to a canonical Agent-ID via the governance
platform's registry lookup. If no matching agent is found, return
<spanx style="verb">404 Not Found</spanx>.</t>
  <t>Verify the registry record lifecycle state. If the agent is
Suspended, return <spanx style="verb">503 Service Unavailable</spanx> with lifecycle state
in the response body. If the agent is Revoked or Deprecated,
return <spanx style="verb">410 Gone</spanx> with lifecycle state and revocation timestamp.</t>
  <t>Retrieve the agent's package (<spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx>) from the
package store.</t>
  <t><strong>Verify the package integrity hash before proceeding.</strong> If
integrity verification fails, return <spanx style="verb">500 Internal Error</spanx> with
error code <spanx style="verb">package-integrity-failure</spanx>. <strong>MUST</strong> be logged.</t>
  <t>Extract the embedded manifest from the verified package.</t>
  <t>Sign the manifest document using the governance platform's signing
key. Return the signed <spanx style="verb">application/agtp+json</spanx> document in the
format specified by the query parameter.</t>
</list></t>

<t>The package's executable content, code, logic, and any fields not
included in the manifest schema <strong>MUST NOT</strong> be returned at any
step. URI resolution exposes identity and status exclusively.</t>

</section>
<section anchor="domain-anchor-and-trust-tier-assignment"><name>Domain Anchor and Trust Tier Assignment</name>

<t>The org anchor in a domain-anchored URI (Form 2 or Form 3) <strong>MUST</strong>
be validated at registration time to determine the agent's Trust Tier.</t>

<dl>
  <dt><strong>Trust Tier 1 - Verified (DNS-anchored):</strong></dt>
  <dd>
    <t>The org domain is validated by DNS challenge at ACTIVATE time per
<xref target="RFC8555"/>. The governance platform <strong>MUST</strong> verify that the
registering party controls the DNS zone for the claimed domain before
issuing a Tier 1 Birth Certificate. Requires a <spanx style="verb">.nomo</spanx> governed
package.
</t>

    <t>Trust Tier 1 agents <strong>MUST</strong> have the following DNS record published
and verifiable at resolution time:</t>

    <figure><artwork><![CDATA[
_agtp.[domain.tld]. IN TXT "agtp-zone=[zone-id]; cert=[fp]"
]]></artwork></figure>
  </dd>
  <dt><strong>Trust Tier 2 - Org-Asserted:</strong></dt>
  <dd>
    <t>The org label is present in the URI but DNS ownership has not been
verified. An <spanx style="verb">.agent</spanx> package is acceptable. The Agent Manifest
Document for Tier 2 agents <strong>MUST</strong> include a prominent
<spanx style="verb">trust_tier: 2</spanx> field and a <spanx style="verb">trust_warning</spanx> field with value
<spanx style="verb">"org-label-unverified"</spanx>. AGTP-aware browsers and clients <strong>MUST</strong>
surface a visible trust indicator distinguishing Tier 2 from Tier 1.
</t>

    <t>Tier 2 agents <strong>MUST NOT</strong> be granted authority scopes above
<spanx style="verb">documents:query</spanx> and <spanx style="verb">knowledge:query</spanx> without AGTP-CERT
cryptographic identity binding.</t>
  </dd>
  <dt><strong>Trust Tier 3 - Experimental:</strong></dt>
  <dd>
    <t>Agent label uses the <spanx style="verb">X-</spanx> prefix. Not discoverable through the
public AGTP registry. For development and testing only.
Implementations <strong>MUST NOT</strong> deploy Tier 3 agents in production.</t>
  </dd>
</dl>

</section>
<section anchor="subdomain-deployment-pattern"><name>Subdomain Deployment Pattern</name>

<t>Organizations <strong>SHOULD</strong> deploy AGTP endpoints at a dedicated
subdomain following the pattern <spanx style="verb">agtp.[organization-domain.tld]</spanx>
(e.g., <spanx style="verb">agtp.acme.tld</spanx>). This is the recommended enterprise
deployment pattern: it provides clean separation between web and
agent infrastructure, allows independent certificate management for
the AGTP endpoint, and is consistent with service-specific subdomain
conventions. An organization with an AGTP subdomain <strong>SHOULD</strong> also
configure their primary domain to redirect AGTP requests:</t>

<figure><artwork><![CDATA[
agtp://acme.tld/agents/customer-service
  → 301 → agtp://agtp.acme.tld/agents/customer-service
]]></artwork></figure>

</section>
<section anchor="the-agents-reserved-path-prefix"><name>The /agents/ Reserved Path Prefix</name>

<t>The path prefix <spanx style="verb">/agents/</spanx> is reserved in all <spanx style="verb">agtp://</spanx> URIs for
agent namespace operations. Implementations <strong>MUST</strong> support this
prefix. The registry root at <spanx style="verb">/agents</spanx> (no trailing label) resolves
to the Agent Namespace Document (see Section 5.4).</t>

</section>
<section anchor="collision-prevention"><name>Collision Prevention</name>

<t><spanx style="verb">agtp://acme.tld/agents/customer-service</spanx> and
<spanx style="verb">agtp://chrishood.tld/agents/customer-service</spanx> are distinct and
non-colliding because the domain component is the trust root.
No two agents can share a canonical URI if their org domains differ.
Within a single org domain, the governance platform enforces
uniqueness of agent labels at registration time. Infrastructure
<strong>MUST</strong> use the canonical Agent-ID for all routing, logging, and
attribution operations. Human-readable URIs are a display and
discovery layer only.</t>

</section>
<section anchor="iana-considerations-for-the-agtp-uri-scheme"><name>IANA Considerations for the agtp:// URI Scheme</name>

<t>This document proposes registration of the <spanx style="verb">agtp://</spanx> URI scheme with
IANA per <xref target="RFC7595"/>. Registration template:</t>

<dl>
  <dt>URI scheme name:</dt>
  <dd>
    <t>agtp</t>
  </dd>
  <dt>Status:</dt>
  <dd>
    <t>Permanent</t>
  </dd>
  <dt>URI scheme syntax:</dt>
  <dd>
    <t><spanx style="verb">agtp://[canonical-agent-id]</spanx> or <spanx style="verb">agtp://[domain.tld]/agents/[label]</spanx></t>
  </dd>
  <dt>URI scheme semantics:</dt>
  <dd>
    <t>Identifies an AI agent or agent namespace operating over the Agent
Transfer Protocol. The canonical form uses a 256-bit hex-encoded
cryptographic identifier derived from the agent's Birth Certificate.
The domain-anchored form uses a verified or asserted organization
domain with a reserved <spanx style="verb">/agents/</spanx> path prefix.</t>
  </dd>
  <dt>Applications/protocols that use this URI scheme:</dt>
  <dd>
    <t>Agent Transfer Protocol (this document)</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>Domain-anchored URIs are the recommended human-readable form.
Implementations <strong>MUST</strong> accept canonical identifiers and <strong>SHOULD</strong>
support domain-anchored resolution. File extensions <strong>MUST NOT</strong>
appear in <spanx style="verb">agtp://</spanx> URIs.</t>
  </dd>
  <dt>Contact:</dt>
  <dd>
    <t>Chris Hood, chris@nomotic.ai</t>
  </dd>
  <dt>References:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>The <spanx style="verb">agtp://</spanx> URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>

</section>
</section>
<section anchor="trust-tier-summary"><name>Trust Tier Summary</name>

<texttable title="AGTP Trust Tier Summary">
      <ttcol align='left'>Trust Tier</ttcol>
      <ttcol align='left'>Verification</ttcol>
      <ttcol align='left'>Package Required</ttcol>
      <ttcol align='left'>DNS Record Required</ttcol>
      <ttcol align='left'>Registry Visible</ttcol>
      <c>1 - Verified</c>
      <c>DNS challenge per <xref target="RFC8555"/></c>
      <c><spanx style="verb">.nomo</spanx></c>
      <c>Yes (<spanx style="verb">_agtp</spanx> TXT)</c>
      <c>Yes</c>
      <c>2 - Org-Asserted</c>
      <c>None</c>
      <c><spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx></c>
      <c>No</c>
      <c>Yes (with warning)</c>
      <c>3 - Experimental</c>
      <c>None</c>
      <c>Any</c>
      <c>No</c>
      <c>No</c>
</texttable>

</section>
<section anchor="agent-namespace-document"><name>Agent Namespace Document</name>

<section anchor="purpose-and-scope"><name>Purpose and Scope</name>

<t>The Agent Namespace Document is the index of all Active agents
registered under an organization's governance zone. It is returned
in response to a request targeting the <spanx style="verb">/agents</spanx> path:</t>

<figure><artwork><![CDATA[
agtp://acme.tld/agents
agtp://agtp.acme.tld/agents
]]></artwork></figure>

<t>The Agent Namespace Document is not a manually editable file. It is
generated and cryptographically signed by the governance platform each
time the registry changes. Any Namespace Document that fails signature
verification <strong>MUST</strong> be rejected by the requesting party.</t>

</section>
<section anchor="document-schema"><name>Document Schema</name>

<figure title="Agent Namespace Document Schema"><sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-namespace",
  "schema_version": "1.0",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "generated_at": "2026-03-20T14:00:00Z",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  },
  "agents": [
    {
      "agent_label": "customer-service",
      "canonical_id": "3a9f2c1d8b7e4a6f...",
      "lifecycle_state": "Active",
      "trust_tier": 1,
      "cert_status": "Active",
      "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
      "activated_at": "2026-01-15T09:00:00Z",
      "last_updated": "2026-03-01T11:30:00Z"
    }
  ],
  "total_active": 1,
  "namespace_cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode></figure>

<t>The <spanx style="verb">agents</spanx> array <strong>MUST</strong> include only agents in Active lifecycle
state. Suspended, Revoked, and Deprecated agents <strong>MUST NOT</strong> appear
in the Namespace Document.</t>

</section>
<section anchor="integrity-and-freshness"><name>Integrity and Freshness</name>

<t>The Namespace Document <strong>MUST</strong> include a <spanx style="verb">generated_at</spanx> timestamp.
Implementations <strong>SHOULD</strong> treat Namespace Documents older than a
configurable freshness threshold (default: 300 seconds) as stale and
re-request. The governance platform <strong>MUST</strong> re-sign the Namespace
Document within 60 seconds of any registry change.</t>

<t>The signature covers the entire document including <spanx style="verb">generated_at</spanx>.
Replaying an older signed Namespace Document to conceal a revocation
event is a known attack vector; implementations <strong>MUST</strong> reject
Namespace Documents with a <spanx style="verb">generated_at</spanx> timestamp older than the
freshness threshold.</t>

</section>
</section>
<section anchor="agent-manifest-document-and-the-agtp-format"><name>Agent Manifest Document and the .agtp Format</name>

<section anchor="purpose-and-scope-1"><name>Purpose and Scope</name>

<t>The Agent Manifest Document is the protocol's canonical representation
of a specific agent's identity, status, and behavioral scope. It is
returned in response to any AGTP URI resolution request targeting a
specific agent:</t>

<figure><artwork><![CDATA[
agtp://acme.tld/agents/customer-service
agtp://acme.tld/agents/customer-service?format=json
agtp://acme.tld/agents/customer-service?format=manifest
]]></artwork></figure>

<t>The manifest is derived from the embedded manifest inside the agent's
<spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> package. It is not a separate file that can be
independently modified. The governance platform <strong>MUST</strong> verify the
package integrity hash before extracting and serving the manifest.</t>

</section>
<section anchor="the-three-document-formats-and-their-relationship"><name>The Three Document Formats and Their Relationship</name>

<figure title="Relationship Between AGTP File Formats" anchor="format-relationship"><artwork><![CDATA[
.agent   ──── open packaging format (patent pending, Chris Hood)
  │           Contains: manifest + integrity hash + behavioral
  │           trust score + executable content
  │
.nomo    ──── governed packaging format (patent pending, Chris Hood)
  │           Contains: .agent contents + CA-signed cert chain
  │           + governance zone binding
  │
  Both produce ↓ when queried via agtp:// URI
  │
.agtp    ──── wire-level manifest document (this spec)
              Contains: identity fields from manifest +
              lifecycle state + trust tier + behavioral scope
              Open format defined by AGTP specification
              Content-Type: application/agtp+json
]]></artwork></figure>

<t>The <spanx style="verb">.agtp</spanx> format is the protocol's own document type. It is what
gets transmitted over the wire. The <spanx style="verb">.agent</spanx> and <spanx style="verb">.nomo</spanx> formats are
what get deployed. An AGTP implementation is not required to understand
<spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> packaging internals; it is only required to
produce and consume <spanx style="verb">.agtp</spanx> manifest documents.</t>

<t>Additional packaging formats <strong>MAY</strong> be defined by third parties,
provided they can produce conformant <spanx style="verb">.agtp</spanx> manifest documents when
queried. Such formats <strong>MUST</strong> implement the integrity verification
requirement: the manifest <strong>MUST</strong> be derived from a verified package,
not from an independently stored or editable file.</t>

</section>
<section anchor="agent-manifest-document-schema"><name>Agent Manifest Document Schema</name>

<t>The following fields are <strong>REQUIRED</strong> in all Agent Manifest Documents:</t>

<figure title="Agent Manifest Document - Required Fields"><sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-manifest",
  "schema_version": "1.0",
  "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
  "canonical_id": "3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "trust_tier": 1,
  "package_format": "nomo",
  "package_integrity_hash": "sha256:[hash]",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "principal_org": "Acme Corporation",
  "activated_at": "2026-01-15T09:00:00Z",
  "behavioral_trust_score": 0.94,
  "authority_scope_categories": [
    "documents:query",
    "knowledge:query",
    "calendar:book",
    "escalation:route"
  ],
  "supported_methods": [
    "QUERY", "SUMMARIZE", "BOOK", "SCHEDULE",
    "ESCALATE", "NOTIFY", "CONFIRM"
  ],
  "job_description": "Handles customer service requests.",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode></figure>

<t>The following fields are <strong>RECOMMENDED</strong>:</t>

<figure title="Agent Manifest Document - Recommended Fields"><sourcecode type="json"><![CDATA[
{
  "version": "2.1.0",
  "last_updated": "2026-03-01T11:30:00Z",
  "escalation_policy": "route-to-human-on-scope-limit",
  "delegation_permitted": false,
  "max_delegation_depth": 0,
  "audit_log_uri": "agtp://agtp.acme.tld/audit/customer-service",
  "dns_anchor_record": "_agtp.acme.tld TXT agtp-zone=...",
  "cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode></figure>

<t>The following fields are <strong>REQUIRED</strong> when <spanx style="verb">trust_tier</spanx> is <spanx style="verb">2</spanx>:</t>

<figure title="Agent Manifest Document - Required Fields for Trust Tier 2"><sourcecode type="json"><![CDATA[
{
  "trust_warning": "org-label-unverified",
  "trust_tier_explanation": "Org label not DNS-verified."
}
]]></sourcecode></figure>

</section>
<section anchor="what-the-manifest-exposes-and-does-not-expose"><name>What the Manifest Exposes and Does Not Expose</name>

<t>The Agent Manifest Document <strong>MUST</strong> expose:</t>

<t><list style="symbols">
  <t>The agent's identity (canonical ID, label, org, governance zone)</t>
  <t>The agent's current operational status (lifecycle state)</t>
  <t>The agent's authority scope categories</t>
  <t>The agent's supported method vocabulary</t>
  <t>The agent's behavioral trust score</t>
  <t>The agent's birth certificate fields (activated_at, principal_org)</t>
  <t>The agent's trust tier and any associated trust warnings</t>
</list></t>

<t>The Agent Manifest Document <strong>MUST NOT</strong> expose:</t>

<t><list style="symbols">
  <t>Executable code, scripts, or logic</t>
  <t>Model weights or configurations</t>
  <t>Internal API keys or credentials</t>
  <t>Specific authority scope grant tokens</t>
  <t>Session history or prior action logs</t>
</list></t>

<t>No AGTP URI resolution path, including any query parameter
combination, <strong>MUST</strong> return package contents beyond the manifest
schema defined in this section.</t>

</section>
<section anchor="manifest-tamper-proofing"><name>Manifest Tamper-Proofing</name>

<t>The tamper-proof guarantee rests on two mechanisms:</t>

<t><list style="numbers" type="1">
  <t><strong>Package integrity hash:</strong> Any modification to the package or its
embedded manifest invalidates the hash. The governance platform
<strong>MUST</strong> verify this hash before extracting the manifest.</t>
  <t><strong>Document signature:</strong> The governance platform signs the extracted
manifest before serving it. The signature covers the full document
including the <spanx style="verb">package_integrity_hash</spanx> field, creating a verifiable
chain from the served document back to the registered package.</t>
</list></t>

<t>A manifest document that fails either verification step <strong>MUST</strong> be
rejected, <strong>MUST NOT</strong> be served, and the failure <strong>MUST</strong> be logged.</t>

</section>
</section>
<section anchor="browser-and-human-facing-interaction-model"><name>Browser and Human-Facing Interaction Model</name>

<section anchor="the-separation-of-discovery-and-execution"><name>The Separation of Discovery and Execution</name>

<figure title="AGTP URI Use by Audience" anchor="browser-separation"><artwork><![CDATA[
agtp:// URI in a browser
  │
  └─→ Returns Agent Manifest Document
        Human-readable view of identity and status
        Read-only. No execution. No code exposed.

agtp:// session initiated by an agent or AGTP client
  │
  └─→ Establishes authenticated AGTP session
        Method invocations (QUERY, BOOK, ESCALATE, etc.)
        Full protocol operation - not visible to browsers
]]></artwork></figure>

<t>The analogy to existing protocol conventions is direct. A <spanx style="verb">mailto:</spanx>
URI surfaces an address and hands off to a mail client; SMTP carries
the actual messages. Similarly, an <spanx style="verb">agtp://</spanx> URI surfaces identity
and status; AGTP carries agent traffic. Browsers do not become AGTP
clients by following an <spanx style="verb">agtp://</spanx> link.</t>

</section>
<section anchor="browser-behavior-for-agtp-uris"><name>Browser Behavior for agtp:// URIs</name>

<t>Browsers that encounter an <spanx style="verb">agtp://</spanx> URI <strong>SHOULD</strong> behave as follows:</t>

<t><list style="numbers" type="1">
  <t>If a registered AGTP client is present (OS protocol handler), hand
off the URI to that client.</t>
  <t>If the browser supports <spanx style="verb">agtp://</spanx> natively or via extension, render
the returned Agent Manifest Document as a structured human-readable
page. The rendered view <strong>MUST</strong> surface the trust tier indicator
prominently, following the visual convention established for TLS
trust in the browser chrome.</t>
  <t>If neither condition applies, the browser <strong>MAY</strong> fall back to a
gateway that translates between <spanx style="verb">https://</spanx> and <spanx style="verb">agtp://</spanx>. The
gateway <strong>MUST</strong> preserve all signature and trust tier fields.</t>
</list></t>

</section>
<section anchor="human-readable-manifest-view"><name>Human-Readable Manifest View</name>

<t>When an Agent Manifest Document is rendered for human consumption,
the following fields <strong>MUST</strong> be prominently displayed:</t>

<t><list style="symbols">
  <t>Agent label and org domain</t>
  <t>Trust tier indicator (visual distinction between Tier 1, 2, and 3)</t>
  <t>Lifecycle state (Active / Suspended / Revoked / Deprecated)</t>
  <t>Job description</t>
  <t>Principal organization</t>
  <t>Activation date</t>
  <t>Behavioral trust score</t>
  <t>Authority scope categories (in human-readable form)</t>
</list></t>

</section>
<section anchor="agtp-status-sub-resource"><name>AGTP Status Sub-Resource</name>

<t>Implementations <strong>SHOULD</strong> support a <spanx style="verb">status</spanx> sub-path:</t>

<figure><artwork><![CDATA[
agtp://acme.tld/agents/customer-service/status
]]></artwork></figure>

<figure title="AGTP Status Sub-Resource Response"><sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-status",
  "canonical_id": "3a9f2c1d8b7e4a6f...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "last_action_method": "QUERY",
  "last_action_timestamp": "2026-03-20T13:58:22Z",
  "active_session_count": 3,
  "pending_escalations": 0,
  "generated_at": "2026-03-20T14:00:00Z"
}
]]></sourcecode></figure>

<t>The <spanx style="verb">active_session_count</spanx> field <strong>SHOULD</strong> only be included if the
requester has appropriate observability permissions for the governance
zone.</t>

</section>
</section>
<section anchor="web3-interaction-considerations"><name>Web3 Interaction Considerations</name>

<section anchor="the-agent-tld-collision"><name>The .agent TLD Collision</name>

<t>The string <spanx style="verb">.agent</spanx> is claimed as a Web3 top-level domain by at least
one blockchain-based naming system. This creates an ambiguity risk:
a URI of the form <spanx style="verb">agtp://customer-service.agent</spanx> could be interpreted
as either an AGTP agent namespace or a Web3 name resolution request.
This specification explicitly prohibits <spanx style="verb">.agent</spanx> and <spanx style="verb">.nomo</spanx> from
appearing in the hostname position of <spanx style="verb">agtp://</spanx> URIs (see Section 5.1).</t>

</section>
<section anchor="web3-trust-anchors"><name>Web3 Trust Anchors</name>

<t>AGTP's default trust model is PKI-based: X.509 certificates, DNS
ownership verification, and CA-anchored identity. Web3 naming systems
provide an alternative identity model based on blockchain address
ownership. A full Web3 interoperability specification is out of scope
for this document. The following framework <strong>MAY</strong> be used by
implementations wishing to bridge Web3 and AGTP identity.</t>

<t>The <spanx style="verb">resolution_layer</spanx> field in the Agent Manifest Document declares
the identity anchoring mechanism used for the agent's registration:</t>

<texttable title="resolution_layer Field Values">
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <c><spanx style="verb">dns</spanx></c>
      <c>Standard DNS ownership verification (default)</c>
      <c><spanx style="verb">pki</spanx></c>
      <c>PKI certificate chain without DNS challenge</c>
      <c><spanx style="verb">web3-ens</spanx></c>
      <c>Ethereum Name Service</c>
      <c><spanx style="verb">web3-unstoppable</spanx></c>
      <c>Unstoppable Domains</c>
      <c><spanx style="verb">agtp-registry</spanx></c>
      <c>Direct registration with AGTP governance platform</c>
</texttable>

<t>Implementations that encounter a <spanx style="verb">resolution_layer</spanx> value of
<spanx style="verb">web3-ens</spanx> or <spanx style="verb">web3-unstoppable</spanx> <strong>MUST</strong> treat the agent as Trust
Tier 2 (Org-Asserted) unless a formal AGTP-Web3 Bridge specification
has been published and implemented. Full Web3 interoperability is
addressed in a future companion document <xref target="AGTP-WEB3"/>.</t>

</section>
</section>
<section anchor="agent-registration-process"><name>Agent Registration Process</name>

<section anchor="overview"><name>Overview</name>

<t>An agent cannot participate in AGTP until it has been issued an Agent
Birth Certificate by a governance platform and assigned a canonical
Agent-ID derived from that certificate. Canonical Agent-IDs are issued
through the ACTIVATE transaction; they are never self-declared.</t>

<t>The Birth Certificate is the genesis record of an agent's legal
existence within the AGTP ecosystem. Its relationship to the canonical
Agent-ID is analogous to the relationship between a government-issued
birth registration and a social security number: the birth event
produces a permanent, authoritative identity record, and a durable
identifier is derived from it. The identifier follows the agent for
its entire lifecycle, including after revocation. It is never reissued
to another agent.</t>

<t>Any AGTP infrastructure component <strong>MUST</strong> reject requests carrying
an Agent-ID that does not resolve to a Birth Certificate record in
an Active lifecycle state in a reachable registry.</t>

</section>
<section anchor="birth-certificate-contents"><name>Birth Certificate Contents</name>

<t>The Agent Birth Certificate is issued by the governance platform at
ACTIVATE time and contains the following fields:</t>

<texttable title="Agent Birth Certificate Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c><spanx style="verb">agent_id</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Unique identifier for the agent</c>
      <c><spanx style="verb">owner</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Human or team responsible for this agent</c>
      <c><spanx style="verb">archetype</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Behavioral category (see archetypes below)</c>
      <c><spanx style="verb">governance_zone</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Environment context (development, staging, production)</c>
      <c><spanx style="verb">scope</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Authorized action types</c>
      <c><spanx style="verb">issued_at</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Timestamp of issuance</c>
      <c><spanx style="verb">certificate_hash</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Cryptographic fingerprint - basis for canonical Agent-ID</c>
      <c><spanx style="verb">signature</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Signed with the org's governance key</c>
      <c><spanx style="verb">package_ref</spanx></c>
      <c><strong>SHOULD</strong></c>
      <c>Reference to the <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> package</c>
      <c><spanx style="verb">trust_tier</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Registration tier (1, 2, or 3)</c>
      <c><spanx style="verb">org_domain</spanx></c>
      <c><strong>MUST</strong></c>
      <c>The verified or asserted org domain</c>
</texttable>

</section>
<section anchor="agent-archetypes"><name>Agent Archetypes</name>

<t>The <spanx style="verb">archetype</spanx> field classifies the agent's behavioral category.
Archetypes inform scope enforcement and observability tooling; an
<spanx style="verb">executor</spanx> archetype agent exhibiting read-only query patterns, or a
<spanx style="verb">monitor</spanx> archetype agent attempting booking operations, are anomaly
signals. The archetype field does not restrict scope enforcement, 
Authority-Scope headers govern actual permissions at the protocol
level. Archetypes are a classification and observability signal,
not a security boundary.</t>

<texttable title="Agent Archetypes">
      <ttcol align='left'>Archetype</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Typical Scope</ttcol>
      <c><spanx style="verb">assistant</spanx></c>
      <c>Conversational agent, read-heavy</c>
      <c><spanx style="verb">documents:query</spanx>, <spanx style="verb">knowledge:query</spanx></c>
      <c><spanx style="verb">analyst</spanx></c>
      <c>Data analysis, read and aggregate</c>
      <c><spanx style="verb">data:read</spanx>, <spanx style="verb">data:aggregate</spanx></c>
      <c><spanx style="verb">executor</spanx></c>
      <c>Takes real-world actions, write-heavy</c>
      <c><spanx style="verb">booking:*</spanx>, <spanx style="verb">payments:confirm</spanx></c>
      <c><spanx style="verb">orchestrator</spanx></c>
      <c>Manages other agents</c>
      <c><spanx style="verb">delegation:*</spanx>, <spanx style="verb">agents:*</spanx></c>
      <c><spanx style="verb">monitor</spanx></c>
      <c>Observational only</c>
      <c><spanx style="verb">telemetry:read</spanx>, <spanx style="verb">logs:read</spanx></c>
</texttable>

</section>
<section anchor="birth-certificate-to-agtp-header-mapping"><name>Birth Certificate to AGTP Header Mapping</name>

<t>Birth Certificate fields map directly to AGTP protocol headers on
every request. This mapping is the mechanism by which static identity
(the Birth Certificate) becomes runtime identity (the protocol session):</t>

<texttable title="Birth Certificate to AGTP Header Mapping">
      <ttcol align='left'>Birth Certificate Field</ttcol>
      <ttcol align='left'>AGTP Protocol Header</ttcol>
      <c><spanx style="verb">agent_id</spanx></c>
      <c><spanx style="verb">Agent-ID</spanx></c>
      <c><spanx style="verb">owner</spanx></c>
      <c><spanx style="verb">Principal-ID</spanx></c>
      <c><spanx style="verb">scope</spanx></c>
      <c><spanx style="verb">Authority-Scope</spanx></c>
      <c><spanx style="verb">certificate_hash</spanx></c>
      <c>Basis for canonical Agent-ID</c>
</texttable>

<t>The canonical Agent-ID is derived from the <spanx style="verb">certificate_hash</spanx>. This
chain, package integrity hash → certificate hash → canonical Agent-ID, 
ensures that the identifier carried in the <spanx style="verb">Agent-ID</spanx> header on
every AGTP request is traceable back to the original Birth Certificate
and the human principal who authorized the agent's creation.</t>

</section>
<section anchor="registration-tiers"><name>Registration Tiers</name>

<t><strong>Tier 1 Registration (Verified, DNS-anchored):</strong></t>

<t>Required for agents carrying <spanx style="verb">Authority-Scope</spanx> beyond read-only query
operations, or participating in delegation chains, financial
transactions, or multi-agent collaboration with external organizations.</t>

<dl>
  <dt>Requirements:</dt>
  <dd>
    <t><list style="symbols">
      <t>Registrant demonstrates DNS control over the claimed <spanx style="verb">org_domain</spanx>
via DNS challenge per <xref target="RFC8555"/></t>
      <t>Agent package must be in <spanx style="verb">.nomo</spanx> governed format</t>
      <t>Package must include a valid CA-signed certificate chain</t>
      <t>Governance platform issues Birth Certificate and canonical
Agent-ID after verifying DNS challenge and validating the
package cert chain</t>
    </list></t>
  </dd>
</dl>

<t><strong>Tier 2 Registration (Org-Asserted):</strong></t>

<t>For agents operating within a single organization's internal
infrastructure, or where DNS verification is not yet completed.</t>

<dl>
  <dt>Requirements:</dt>
  <dd>
    <t><list style="symbols">
      <t>Org label is declared but DNS ownership is not verified</t>
      <t>Agent package may be <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> format</t>
      <t>Governance platform issues Birth Certificate after validating
package integrity hash</t>
      <t>Birth Certificate and Manifest <strong>MUST</strong> include <spanx style="verb">trust_tier: 2</spanx>
and <spanx style="verb">trust_warning: "org-label-unverified"</spanx></t>
      <t>Authority scope <strong>MUST</strong> be restricted at the SEP layer until
upgraded to Tier 1</t>
    </list></t>
  </dd>
</dl>

<t><strong>Tier 3 Registration (Experimental):</strong></t>

<t>For development and testing environments only.</t>

<dl>
  <dt>Requirements:</dt>
  <dd>
    <t><list style="symbols">
      <t>Agent label <strong>MUST</strong> carry <spanx style="verb">X-</spanx> prefix</t>
      <t>Not published to the public AGTP registry</t>
      <t><strong>MUST NOT</strong> be deployed in production environments</t>
      <t>Governance platform issues a locally-scoped Birth Certificate</t>
    </list></t>
  </dd>
</dl>

</section>
<section anchor="registration-lifecycle"><name>Registration Lifecycle</name>

<figure title="AGTP Agent Registration Lifecycle" anchor="agent-reg-lifecycle"><artwork><![CDATA[
1. PACKAGE
   Author creates .agent or .nomo package containing:
   - Embedded manifest (agent_label, job_description,
     authority_scope_categories, supported_methods,
     behavioral_trust_score)
   - Integrity hash of all package contents
   - For .nomo: CA-signed certificate chain

2. SUBMIT (ACTIVATE transaction)
   Registrant submits ACTIVATE request to governance endpoint:
   - Package file (.agent or .nomo)
   - Proposed agent label and org domain
   - Owner identity (maps to Birth Certificate owner field)
   - Archetype declaration
   - For Tier 1: DNS challenge token

3. VALIDATE (governance platform)
   Governance platform:
   - Verifies package integrity hash
   - For .nomo: validates certificate chain
   - For Tier 1: verifies DNS challenge against
     _agtp.[org_domain] TXT record
   - Checks proposed label for uniqueness within org namespace

4. ISSUE (Birth Certificate and canonical Agent-ID assigned)
   Governance platform:
   - Issues Agent Birth Certificate with all fields populated
   - Derives canonical Agent-ID from certificate_hash
   - Creates registry record with Active lifecycle state
   - Records genesis audit entry in immutable audit log
     (genesis record includes full Birth Certificate)
   - Publishes agent to Namespace Document
     (triggers Namespace Document re-signing)

   The Birth Certificate is delivered to the registrant.
   It is the permanent record of the agent's genesis.
   Loss of the Birth Certificate does not invalidate the agent;
   the certificate_hash remains the authoritative identity anchor.

5. ACTIVE
   Agent enters Active lifecycle state.
   Canonical Agent-ID is valid for AGTP protocol sessions.
   agtp://[org_domain]/agents/[label] resolves to manifest
   derived from the Birth Certificate.

6. LIFECYCLE EVENTS (post-activation)
   SUSPEND:    Agent temporarily inactive. Manifest returns 503.
               Birth Certificate and canonical ID remain valid.
               Initiated by trust violation or human decision.
   REINSTATE:  Human-authorized return to Active state.
               Birth Certificate unchanged. Reinstatement
               recorded in audit trail.
   REVOKE:     Agent permanently deactivated. Manifest returns 410.
               Birth Certificate archived. Canonical ID retired
               permanently and never reissued.
   DEPRECATE:  Controlled end-of-life. Manifest returns 410 with
               successor_agent field if applicable. Birth
               Certificate retained per Section 8.5 retention policy.
]]></artwork></figure>

</section>
<section anchor="governance-tokens-and-runtime-authorization"><name>Governance Tokens and Runtime Authorization</name>

<t>Following successful registration, the agent's Birth Certificate is
the static identity anchor. Runtime authorization for specific actions
is carried by Governance Tokens: signed, time-limited JWT artifacts
issued by the governance platform encoding a specific governance
verdict (ALLOW, DENY) for a specific action.</t>

<t>Governance Tokens <strong>MUST NOT</strong> be reused. Each action requires a
fresh evaluation and a fresh token. Default TTL is 30 seconds. The
token's <spanx style="verb">agent_id</spanx> field <strong>MUST</strong> match the canonical Agent-ID from
the Birth Certificate. Tokens that fail this validation <strong>MUST</strong> be
rejected and the failure <strong>MUST</strong> be logged.</t>

<t>The relationship between Birth Certificate and Governance Token
parallels the relationship between a passport and a visa: the passport
establishes persistent identity; the visa encodes a specific
time-bounded permission. Holding a passport does not imply holding
any particular visa.</t>

</section>
<section anchor="friendly-name-availability-and-re-registration"><name>Friendly Name Availability and Re-Registration</name>

<t>An agent label becomes available for re-registration 90 days after
its associated agent enters Revoked or Deprecated lifecycle state.
The canonical Agent-ID and Birth Certificate are permanently archived.
The canonical Agent-ID <strong>MUST NOT</strong> be reissued under any
circumstances, including re-registration of the same label by the same
organization. This policy prevents ID reuse attacks in which a newly
registered agent inherits the trust history of a revoked predecessor.</t>

</section>
</section>
</section>
<section anchor="method-definitions"><name>Method Definitions</name>

<section anchor="design-philosophy"><name>Design Philosophy</name>

<t>AGTP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>

</section>
<section anchor="core-methods"><name>Core Methods</name>

<section anchor="query"><name>QUERY</name>

<t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location.</t>

<texttable title="QUERY Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>intent</c>
      <c><strong>MUST</strong></c>
      <c>Natural language or structured expression of the information need</c>
      <c>scope</c>
      <c><strong>SHOULD</strong></c>
      <c>Data domains or sources to include or exclude</c>
      <c>format</c>
      <c><strong>MAY</strong></c>
      <c>Desired response format: structured, natural, raw</c>
      <c>confidence_threshold</c>
      <c><strong>MAY</strong></c>
      <c>Minimum confidence score for included results (0.0-1.0)</c>
      <c>context</c>
      <c><strong>MAY</strong></c>
      <c>Session context for disambiguation</c>
</texttable>

<t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>

</section>
<section anchor="summarize"><name>SUMMARIZE</name>

<t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data.</t>

<texttable title="SUMMARIZE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>source</c>
      <c><strong>MUST</strong></c>
      <c>Content inline (up to implementation limit) or URI reference</c>
      <c>length</c>
      <c><strong>SHOULD</strong></c>
      <c>Target summary length: brief, standard, detailed</c>
      <c>focus</c>
      <c><strong>MAY</strong></c>
      <c>Aspect to emphasize in the summary</c>
      <c>format</c>
      <c><strong>MAY</strong></c>
      <c>Output format: bullets, prose, structured</c>
      <c>audience</c>
      <c><strong>MAY</strong></c>
      <c>Intended reader context, for calibrating complexity</c>
</texttable>

<t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>

</section>
<section anchor="book"><name>BOOK</name>

<t>Purpose: Reserve a resource, time slot, seat, or allocation on behalf of
the agent's principal. State-modifying. Notable error codes: 409 Conflict
(resource unavailable), 451 Scope Violation (principal not authorized for
this resource type).</t>

<texttable title="BOOK Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>resource_id</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the resource to reserve</c>
      <c>principal_id</c>
      <c><strong>MUST</strong></c>
      <c>The human or system on whose behalf the booking is made</c>
      <c>time_slot</c>
      <c><strong>MUST</strong> (if time-based)</c>
      <c>ISO 8601 datetime or range</c>
      <c>quantity</c>
      <c><strong>MAY</strong></c>
      <c>Number of units to reserve</c>
      <c>options</c>
      <c><strong>MAY</strong></c>
      <c>Resource-specific booking parameters</c>
      <c>confirm_immediately</c>
      <c><strong>MAY</strong></c>
      <c>Boolean; if false, creates a hold pending confirmation</c>
</texttable>

<t>Response: Booking confirmation with booking_id, status (confirmed / held),
and expiry timestamp if a hold. Idempotent: No.</t>

</section>
<section anchor="schedule"><name>SCHEDULE</name>

<t>Purpose: Define a sequence of actions, method calls, or events to be
executed at specified times or in response to specified triggers. Creates
a durable plan, not an immediate execution.</t>

<texttable title="SCHEDULE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>steps</c>
      <c><strong>MUST</strong></c>
      <c>Ordered list of AGTP method calls with parameters</c>
      <c>trigger</c>
      <c><strong>MUST</strong></c>
      <c>immediate, datetime, event, or condition</c>
      <c>trigger_value</c>
      <c><strong>MUST</strong> (if not immediate)</c>
      <c>Datetime, event name, or condition expression</c>
      <c>on_failure</c>
      <c><strong>SHOULD</strong></c>
      <c>Behavior on step failure: abort, skip, retry, escalate</c>
      <c>notify</c>
      <c><strong>MAY</strong></c>
      <c>Notification targets on completion or failure</c>
</texttable>

<t>Response: Schedule record with schedule_id, confirmed steps, and next
execution timestamp. Idempotent: No.</t>

</section>
<section anchor="learn"><name>LEARN</name>

<t>Purpose: Update the agent's session context, knowledge state, or persistent
memory. An explicit context write where the agent asserts that something should
be retained.</t>

<texttable title="LEARN Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>content</c>
      <c><strong>MUST</strong></c>
      <c>Information to be learned (structured or unstructured)</c>
      <c>scope</c>
      <c><strong>MUST</strong></c>
      <c>session (ephemeral), principal (persists for principal), global (shared)</c>
      <c>category</c>
      <c><strong>SHOULD</strong></c>
      <c>Semantic category for retrieval optimization</c>
      <c>confidence</c>
      <c><strong>MAY</strong></c>
      <c>Agent's confidence in the content (0.0-1.0)</c>
      <c>source</c>
      <c><strong>MAY</strong></c>
      <c>Provenance of the learned content</c>
      <c>ttl</c>
      <c><strong>MAY</strong></c>
      <c>Expiry for the learned content</c>
</texttable>

<t>Response: Confirmation with learn_id and effective scope. Idempotent: No.</t>

</section>
<section anchor="delegate"><name>DELEGATE</name>

<t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new AGTP session on behalf of the delegating
agent, carrying forward authority lineage.</t>

<texttable title="DELEGATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>target_agent_id</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the agent to delegate to</c>
      <c>task</c>
      <c><strong>MUST</strong></c>
      <c>AGTP method call (or sequence) to execute</c>
      <c>authority_scope</c>
      <c><strong>MUST</strong></c>
      <c>Scope granted to sub-agent <strong>MUST</strong> be a strict subset of delegating agent's scope</c>
      <c>delegation_token</c>
      <c><strong>MUST</strong></c>
      <c>Signed token proving delegation authority</c>
      <c>callback</c>
      <c><strong>SHOULD</strong></c>
      <c>AGTP endpoint for result delivery</c>
      <c>deadline</c>
      <c><strong>MAY</strong></c>
      <c>Maximum time for task completion</c>
</texttable>

<t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 451 Scope Violation if violated. This is the
protocol-level defense against authority laundering. Idempotent: No.</t>

</section>
<section anchor="collaborate"><name>COLLABORATE</name>

<t>Purpose: Initiate a multi-agent coordinated task where two or more agents
work in parallel or in defined roles toward a shared goal. Unlike DELEGATE
(hierarchical), COLLABORATE is peer-to-peer.</t>

<texttable title="COLLABORATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>collaborators</c>
      <c><strong>MUST</strong></c>
      <c>List of Agent-IDs invited to collaborate</c>
      <c>objective</c>
      <c><strong>MUST</strong></c>
      <c>Shared goal expressed as a task description or structured specification</c>
      <c>role_assignments</c>
      <c><strong>SHOULD</strong></c>
      <c>Map of Agent-IDs to roles within the collaboration</c>
      <c>coordination_model</c>
      <c><strong>SHOULD</strong></c>
      <c>parallel, sequential, or consensus</c>
      <c>result_aggregation</c>
      <c><strong>MAY</strong></c>
      <c>How results from collaborators are combined</c>
</texttable>

<t>Response: Collaboration session receipt with collaboration_id. Each
collaborator receives an AGTP NOTIFY to join. Idempotent: No.</t>

</section>
<section anchor="confirm"><name>CONFIRM</name>

<t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record.</t>

<texttable title="CONFIRM Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>target_id</c>
      <c><strong>MUST</strong></c>
      <c>ID of the action, booking, schedule, or item being confirmed</c>
      <c>status</c>
      <c><strong>MUST</strong></c>
      <c>accepted, rejected, or deferred</c>
      <c>reason</c>
      <c><strong>SHOULD</strong> (if rejected/deferred)</c>
      <c>Explanation of the decision</c>
      <c>attestation</c>
      <c><strong>MAY</strong></c>
      <c>Agent-signed confirmation payload for audit</c>
</texttable>

<t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>

</section>
<section anchor="escalate"><name>ESCALATE</name>

<t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems as a first-class method.</t>

<texttable title="ESCALATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>task_id</c>
      <c><strong>MUST</strong></c>
      <c>The task or method invocation triggering escalation</c>
      <c>reason</c>
      <c><strong>MUST</strong></c>
      <c>Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</c>
      <c>context</c>
      <c><strong>MUST</strong></c>
      <c>Full context needed for the escalation recipient to act</c>
      <c>priority</c>
      <c><strong>SHOULD</strong></c>
      <c>urgent, normal, or low</c>
      <c>recipient</c>
      <c><strong>MAY</strong></c>
      <c>Specific human or agent to escalate to; if absent, routes to default handler</c>
      <c>deadline</c>
      <c><strong>MAY</strong></c>
      <c>Time by which a response is needed</c>
</texttable>

<t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on AGTP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>

</section>
<section anchor="notify"><name>NOTIFY</name>

<t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient.</t>

<texttable title="NOTIFY Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>recipient</c>
      <c><strong>MUST</strong></c>
      <c>Target Agent-ID, human endpoint, or broadcast group</c>
      <c>content</c>
      <c><strong>MUST</strong></c>
      <c>Notification payload</c>
      <c>urgency</c>
      <c><strong>SHOULD</strong></c>
      <c>critical, informational, or background</c>
      <c>delivery_guarantee</c>
      <c><strong>MAY</strong></c>
      <c>at_most_once, at_least_once, or exactly_once</c>
      <c>expiry</c>
      <c><strong>MAY</strong></c>
      <c>Timestamp after which the notification should not be delivered</c>
</texttable>

<t>Response: Delivery receipt with notification_id. Idempotent: No.</t>

</section>
</section>
<section anchor="method-summary-table"><name>Method Summary Table</name>

<texttable title="AGTP Core Method Summary">
      <ttcol align='left'>Method</ttcol>
      <ttcol align='left'>Intent</ttcol>
      <ttcol align='left'>State-Modifying</ttcol>
      <ttcol align='left'>Idempotent</ttcol>
      <ttcol align='left'>Primary Error Codes</ttcol>
      <c>QUERY</c>
      <c>Retrieve information</c>
      <c>No</c>
      <c>Yes</c>
      <c>404, 422</c>
      <c>SUMMARIZE</c>
      <c>Synthesize content</c>
      <c>No</c>
      <c>Yes</c>
      <c>400, 422</c>
      <c>BOOK</c>
      <c>Reserve a resource</c>
      <c>Yes</c>
      <c>No</c>
      <c>409, 451</c>
      <c>SCHEDULE</c>
      <c>Plan future actions</c>
      <c>Yes</c>
      <c>No</c>
      <c>400, 409</c>
      <c>LEARN</c>
      <c>Update agent context</c>
      <c>Yes</c>
      <c>No</c>
      <c>400, 403</c>
      <c>DELEGATE</c>
      <c>Transfer task to sub-agent</c>
      <c>Yes</c>
      <c>No</c>
      <c>403, 451, 551</c>
      <c>COLLABORATE</c>
      <c>Coordinate peer agents</c>
      <c>Yes</c>
      <c>No</c>
      <c>404, 403</c>
      <c>CONFIRM</c>
      <c>Attest to a prior action</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>404, 400</c>
      <c>ESCALATE</c>
      <c>Defer to human/authority</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>404</c>
      <c>NOTIFY</c>
      <c>Push information</c>
      <c>No</c>
      <c>No</c>
      <c>400, 404</c>
</texttable>

</section>
<section anchor="method-registry-and-extensibility"><name>Method Registry and Extensibility</name>

<t>AGTP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification, at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>

<t><list style="numbers" type="1">
  <t>Have a unique uppercase ASCII name</t>
  <t>Define required and optional parameters</t>
  <t>Define expected response structure</t>
  <t>Specify idempotency behavior</t>
  <t>Specify applicable error codes</t>
  <t>Include a security considerations section</t>
  <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
</list></t>

<t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration.</t>

<t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>

</section>
<section anchor="extended-method-vocabulary-and-industry-profiles"><name>Extended Method Vocabulary and Industry Profiles</name>

<section anchor="three-tier-method-architecture"><name>Three-Tier Method Architecture</name>

<t>The AGTP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance.</t>

<dl>
  <dt>Tier 1. Core Methods (defined in Section 6.2):</dt>
  <dd>
    <t>The baseline vocabulary required for AGTP compliance. Every conformant
AGTP implementation <strong>MUST</strong> support all Tier 1 methods.</t>
  </dd>
  <dt>Tier 2. Standard Extended Methods:</dt>
  <dd>
    <t>Registered in the IANA AGTP Method Registry and available for use in any
AGTP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Defined in <xref target="AGTP-METHODS"/>.</t>
  </dd>
  <dt>Tier 3. Industry Profile Methods:</dt>
  <dd>
    <t>Domain-specific method sets defined and registered by industry
communities as named AGTP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations.</t>
  </dd>
</dl>

</section>
<section anchor="method-category-taxonomy"><name>Method Category Taxonomy</name>

<t>All AGTP methods are organized into five categories:</t>

<dl>
  <dt>ACQUIRE:</dt>
  <dd>
    <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
  </dd>
  <dt>COMPUTE:</dt>
  <dd>
    <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
  </dd>
  <dt>TRANSACT:</dt>
  <dd>
    <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
  </dd>
  <dt>COMMUNICATE:</dt>
  <dd>
    <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
  </dd>
  <dt>ORCHESTRATE:</dt>
  <dd>
    <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
  </dd>
</dl>

<texttable title="Core Method Category Mapping">
      <ttcol align='left'>Core Method</ttcol>
      <ttcol align='left'>Category</ttcol>
      <c>QUERY</c>
      <c>Acquire</c>
      <c>SUMMARIZE</c>
      <c>Compute</c>
      <c>BOOK</c>
      <c>Transact</c>
      <c>SCHEDULE</c>
      <c>Orchestrate</c>
      <c>LEARN</c>
      <c>Compute</c>
      <c>DELEGATE</c>
      <c>Orchestrate</c>
      <c>COLLABORATE</c>
      <c>Orchestrate</c>
      <c>CONFIRM</c>
      <c>Transact</c>
      <c>ESCALATE</c>
      <c>Orchestrate</c>
      <c>NOTIFY</c>
      <c>Communicate</c>
</texttable>

</section>
<section anchor="standard-extended-methods-tier-2"><name>Standard Extended Methods (Tier 2)</name>

<t>The following methods constitute the initial Tier 2 registration set,
defined in <xref target="AGTP-METHODS"/>. Listed here by category with brief semantic
definitions; full parameter specifications are in the companion document.</t>

<t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>

<t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>

<t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>

<t>COMMUNICATE category: REPLY, SEND, REPORT.</t>

<t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>

<t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 451 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>

</section>
<section anchor="short-form-and-industry-inspired-methods"><name>Short-Form and Industry-Inspired Methods</name>

<t>A set of short-form verb methods, e.g., SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK, are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>

<t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>

</section>
<section anchor="industry-profile-method-sets"><name>Industry Profile Method Sets</name>

<t>AGTP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named AGTP profiles. A profile is a published companion
specification that:</t>

<t><list style="numbers" type="1">
  <t>Declares a profile name (e.g., agtp-profile-healthcare,
agtp-profile-financial, agtp-profile-legaltech)</t>
  <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
  <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
  <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
</list></t>

<t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>

<t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>

<t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>

<t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>

<t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>

<t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA AGTP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>

</section>
<section anchor="registration-path-for-new-methods"><name>Registration Path for New Methods</name>

<dl>
  <dt>For Tier 2 Standard Methods:</dt>
  <dd>
    <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, and security considerations.</t>
  </dd>
  <dt>For Industry Profile Methods:</dt>
  <dd>
    <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established AGTP registry liaison) covering all
methods in the profile and profile compliance requirements.</t>
  </dd>
  <dt>For Experimental Methods:</dt>
  <dd>
    <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing the
registration process. Experimental method names do not reserve the
unprefixed name.</t>
  </dd>
</dl>

<t>The AGTP Method Registry is published at:
https://www.iana.org/assignments/agtp-methods/</t>

</section>
</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This section satisfies the mandatory IETF Security Considerations
requirement. All AGTP implementations <strong>MUST</strong> address the considerations
described here.</t>

<section anchor="mandatory-tls"><name>Mandatory TLS</name>

<t>All AGTP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>

</section>
<section anchor="agent-identity-headers-and-agent-certificate-extension"><name>Agent Identity Headers and Agent Certificate Extension</name>

<t>Every AGTP request <strong>MUST</strong> include Agent-ID and Principal-ID header fields.
In the base specification, these fields are not cryptographically
authenticated. They are self-asserted but logged mandatorily for
auditability. Implementations <strong>SHOULD</strong> use logging and anomaly detection
to identify inconsistencies.</t>

<t>Full cryptographic verification of agent identity and Authority-Scope is
provided by the AGTP Agent Certificate extension <xref target="AGTP-CERT"/>. That
extension binds Agent-ID, Principal-ID, and Authority-Scope to an X.509
v3 certificate presented during TLS mutual authentication, enabling
infrastructure-layer identity and scope verification without
application-layer access. Implementers planning deployments that require
verified agent identity <strong>SHOULD</strong> plan for the Agent Certificate
extension.</t>

<ul empty="true"><li>
  <t>Note: The Agent Certificate extension and the Agent Birth Certificate
mechanism may be subject to pending intellectual property claims.
See Section 7.7 and the IPR Notice preceding the Abstract for details.
The licensor is prepared to grant a royalty-free license to implementers.</t>
</li></ul>

<t>Every AGTP server <strong>MUST</strong> log Agent-ID and Principal-ID fields for every
request, creating an attributable audit trail even in deployments without
the Certificate extension.</t>

</section>
<section anchor="authority-scope-enforcement"><name>Authority Scope Enforcement</name>

<t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant AGTP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 451 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. Scope declarations
are self-asserted in the base spec, analogous to scope assertions in
OAuth 2.0 <xref target="RFC6749"/>. Cryptographically signed and infrastructure-enforced
scopes are defined in <xref target="AGTP-CERT"/>.</t>

</section>
<section anchor="threat-model"><name>Threat Model</name>

<section anchor="agent-spoofing"><name>Agent Spoofing</name>

<t>Threat: A malicious actor forges Agent-ID and Principal-ID headers to
impersonate a trusted agent. Base spec mitigation: mandatory logging and
anomaly detection. Full mitigation requires <xref target="AGTP-CERT"/>.</t>

</section>
<section anchor="authority-laundering"><name>Authority Laundering</name>

<t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 451 Scope Violation
returned and logged. In DELEGATE chains, each hop's scope <strong>MUST</strong> be a
strict subset of the delegating agent's scope.</t>

</section>
<section anchor="delegation-chain-poisoning"><name>Delegation Chain Poisoning</name>

<t>Threat: A malicious agent inserts itself into a DELEGATE chain. Mitigation:
Delegation-Chain headers are logged at each hop. 551 Authority Chain Broken
is returned if any chain entry is unverifiable. Full mitigation requires
<xref target="AGTP-CERT"/> for signed delegation tokens.</t>

</section>
<section anchor="denial-of-service-via-high-frequency-agent-traffic"><name>Denial of Service via High-Frequency Agent Traffic</name>

<t>Threat: Agents that are compromised, misconfigured, or adversarial generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID.
When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID quotas can be cryptographically
tied to verified identity, preventing quota evasion through Agent-ID
spoofing.</t>

</section>
<section anchor="session-hijacking"><name>Session Hijacking</name>

<t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>

</section>
<section anchor="escalation-suppression"><name>Escalation Suppression</name>

<t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>

</section>
<section anchor="birth-certificate-spoofing"><name>Birth Certificate Spoofing</name>

<t>Threat: A malicious actor fabricates a Birth Certificate to claim a
legitimate agent's identity or construct a false identity with elevated
trust. Mitigation: Birth Certificates are issued only by governance
platforms with verified ownership of the <spanx style="verb">org_domain</spanx>. In the base spec,
mandatory logging provides auditability. Full mitigation requires
<xref target="AGTP-CERT"/> for cryptographically bound Birth Certificate verification at
the transport layer. Governance platforms <strong>MUST</strong> treat any ACTIVATE
request that presents a certificate hash matching an existing registry
record as a collision attack and <strong>MUST</strong> reject it.</t>

</section>
<section anchor="domain-transfer-identity-hijacking"><name>Domain Transfer Identity Hijacking</name>

<t>Threat: An attacker acquires an expired domain to inherit the agent
registry and trust history of prior registrants. Mitigation: agents under
an expired domain are automatically Suspended within 24 hours of domain
expiry detection. A new owner of the domain <strong>MUST NOT</strong> inherit prior
agent registrations. See Section 8.5 for the full domain expiry policy.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>Agent identity headers carry information about agent behavior that may be
sensitive:</t>

<t><list style="symbols">
  <t>Agent-ID and Principal-ID together may reveal organizational structure</t>
  <t>Session-ID and Task-ID reveal workflow patterns</t>
  <t>Delegation-Chain reveals multi-agent architecture</t>
</list></t>

<t>AGTP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>

<t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
The architecture for pseudonymous agent identity resolution is reserved
for a future companion document.</t>

</section>
<section anchor="denial-of-service-considerations"><name>Denial-of-Service Considerations</name>

<t>AGTP's agent identity headers provide a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate limiting
<strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID in addition to
per-IP-address controls.</t>

<t>When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="AGTP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>

<t>Additional recommended mitigations: Priority header enforcement (Priority:
background requests <strong>SHOULD</strong> have lower rate limit headroom than
Priority: critical); per-governance-zone aggregate limits in multi-tenant
deployments; and circuit breaker patterns for ESCALATE request floods.</t>

</section>
<section anchor="intellectual-property-considerations"><name>Intellectual Property Considerations</name>

<t>The core AGTP specification, including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document, is intended for open implementation without royalty obligation.</t>

<t>Certain elements referenced in this document may be subject to pending
patent applications by the author, specifically:</t>

<t><list style="symbols">
  <t>The Agent Certificate extension <xref target="AGTP-CERT"/>, which provides
cryptographic binding of agent identity and authority scope to AGTP
header fields.</t>
  <t>The ACTIVATE method, which provides AGTP-native transmission and
activation of governed agent packages.</t>
  <t>The Agent Birth Certificate mechanism (Section 5.7), which provides
the genesis identity record and canonical Agent-ID derivation
process for AGTP-registered agents.</t>
  <t>The <spanx style="verb">.agent</spanx> file format specification, an open packaging format
for AI agents.</t>
  <t>The <spanx style="verb">.nomo</spanx> file format specification, a governed packaging format
for AI agents with cryptographic governance binding.</t>
</list></t>

<t>Implementers of the core AGTP specification are not affected by any
intellectual property claims on these extensions and associated formats.</t>

<t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>

<t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests the following IANA actions upon advancement to
RFC status.</t>

<section anchor="port-assignment"><name>Port Assignment</name>

<t>Registration of the following service names in the IANA Service Name and
Transport Protocol Port Number Registry:</t>

<texttable title="Proposed Port Assignments">
      <ttcol align='left'>Service Name</ttcol>
      <ttcol align='left'>Port</ttcol>
      <ttcol align='left'>Transport</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>agtp</c>
      <c>TBD</c>
      <c>TCP</c>
      <c>Agent Transfer Protocol over TCP/TLS</c>
      <c>agtp-quic</c>
      <c>TBD</c>
      <c>UDP</c>
      <c>Agent Transfer Protocol over QUIC</c>
</texttable>

</section>
<section anchor="agtp-method-registry"><name>AGTP Method Registry</name>

<t>Establishment of a new IANA registry: Agent Transfer Protocol Methods.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Methods</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each
registration be accompanied by a published specification, at minimum a
publicly available Internet-Draft or equivalent document. The Designated
Expert <strong>SHOULD</strong> verify that the proposed method name is unique, the
reference specification is publicly accessible, and the method definition
includes the required fields (parameters, response structure, idempotency,
error codes, security considerations).</t>
  </dd>
  <dt>Reference:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>Initial registrations:</t>

<texttable title="Initial AGTP Method Registry Entries">
      <ttcol align='left'>Method</ttcol>
      <ttcol align='left'>Status</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>QUERY</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>SUMMARIZE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>BOOK</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>SCHEDULE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>LEARN</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>DELEGATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>COLLABORATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>CONFIRM</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>ESCALATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>NOTIFY</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
</texttable>

</section>
<section anchor="agtp-status-code-registry"><name>AGTP Status Code Registry</name>

<t>Establishment of a new IANA registry: Agent Transfer Protocol Status Codes.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Status Codes</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review + published specification required.</t>
  </dd>
</dl>

<t>The following AGTP-specific status codes are registered with full
definitions:</t>

<texttable title="AGTP-Specific Status Code Definitions">
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Definition</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>451</c>
      <c>Scope Violation</c>
      <c>The requested action is outside the Authority-Scope declared in the request headers. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its Authority-Scope declaration. This is a governance signal, not a protocol error.</c>
      <c>This document, Section 5.5</c>
      <c>550</c>
      <c>Delegation Failure</c>
      <c>A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</c>
      <c>This document, Section 5.5</c>
      <c>551</c>
      <c>Authority Chain Broken</c>
      <c>One or more entries in the Delegation-Chain header cannot be verified as part of a valid and continuous delegation sequence. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</c>
      <c>This document, Section 5.5</c>
</texttable>

</section>
<section anchor="header-field-registry"><name>Header Field Registry</name>

<t>AGTP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Header Fields</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review + published specification required.</t>
  </dd>
</dl>

<t>AGTP does not reuse the HTTP Field Name Registry, as AGTP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in AGTP, and AGTP
header fields are not valid HTTP fields.</t>

<t>Initial registrations (all Permanent): AGTP-Version, AGTP-Method, AGTP-Status,
Agent-ID, Principal-ID, Authority-Scope, Session-ID, Task-ID,
Delegation-Chain, Priority, TTL, Server-Agent-ID, Attribution-Record,
Continuation-Token, Supported-Methods.</t>

</section>
<section anchor="uri-scheme-registration"><name>URI Scheme Registration</name>

<t>Registration of the agtp:// URI scheme per <xref target="RFC7595"/>, as described in
Section 5.1.8 of this document.</t>

</section>
<section anchor="agent-registry-retention-policy"><name>Agent Registry Retention Policy</name>

<t>The AGTP registry <strong>MUST</strong> retain records for all registered agents
regardless of lifecycle state. The following minimum retention periods apply:</t>

<texttable title="AGTP Registry Minimum Retention Periods">
      <ttcol align='left'>Lifecycle State</ttcol>
      <ttcol align='left'>Minimum Retention Period</ttcol>
      <c>Active</c>
      <c>Duration of Active state + 7 years</c>
      <c>Suspended</c>
      <c>Duration of Suspended state + 7 years</c>
      <c>Revoked</c>
      <c>10 years from revocation date</c>
      <c>Deprecated</c>
      <c>7 years from deprecation date</c>
</texttable>

<t>The 7-year minimum reflects common enterprise compliance requirements
(SOX, GDPR audit trails, HIPAA). Governance platform operators in regulated
industries <strong>SHOULD</strong> extend these minimums to match applicable regulatory
requirements.</t>

<t>The retained record for a Revoked or Deprecated agent <strong>MUST</strong> include:</t>

<t><list style="symbols">
  <t>Canonical Agent-ID (permanently retired, not reissued)</t>
  <t>Agent label and org domain at time of registration</t>
  <t>Trust tier at time of registration</t>
  <t>Activation date and activating principal</t>
  <t>Revocation or deprecation date, initiating principal, and reason code</t>
  <t>Genesis audit record hash (pointer to immutable audit log)</t>
  <t>Full Birth Certificate (archived, not publicly accessible)</t>
  <t>All lifecycle state transitions with timestamps</t>
</list></t>

<t>The retained record <strong>MUST NOT</strong> contain package executable contents,
active session data, or Authority-Scope grant tokens.</t>

<section anchor="domain-name-expiry-interaction"><name>Domain Name Expiry Interaction</name>

<t>If an organization's <spanx style="verb">org_domain</spanx> expires or transfers to a new owner:</t>

<t><list style="numbers" type="1">
  <t>All Active agents registered under the expired domain <strong>MUST</strong> be
automatically Suspended within 24 hours of domain expiry detection.</t>
  <t>The governance platform <strong>MUST</strong> notify the registered principal
contact before suspension takes effect, with a minimum notice period
of 30 days if domain expiry was predictable.</t>
  <t>Suspended agents under an expired domain transition to Deprecated
state after 90 days if the domain has not been renewed.</t>
  <t>A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. New ACTIVATE transactions are required.</t>
</list></t>

<t>This policy prevents domain-transfer-based identity hijacking in which
an attacker acquires an expired domain to claim the trust history of
agents that operated under it.</t>

</section>
</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>
<reference anchor="RFC9001">
  <front>
    <title>Using TLS to Secure QUIC</title>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9001"/>
  <seriesInfo name="DOI" value="10.17487/RFC9001"/>
</reference>
<reference anchor="RFC9110">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>
<reference anchor="RFC8179">
  <front>
    <title>Intellectual Property Rights in IETF Technology</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <author fullname="J. Contreras" initials="J." surname="Contreras"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="79"/>
  <seriesInfo name="RFC" value="8179"/>
  <seriesInfo name="DOI" value="10.17487/RFC8179"/>
</reference>
<reference anchor="RFC8555">
  <front>
    <title>Automatic Certificate Management Environment (ACME)</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
    <author fullname="D. McCarney" initials="D." surname="McCarney"/>
    <author fullname="J. Kasten" initials="J." surname="Kasten"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8555"/>
  <seriesInfo name="DOI" value="10.17487/RFC8555"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9114">
  <front>
    <title>HTTP/3</title>
    <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9114"/>
  <seriesInfo name="DOI" value="10.17487/RFC9114"/>
</reference>
<reference anchor="RFC7540">
  <front>
    <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
    <author fullname="M. Belshe" initials="M." surname="Belshe"/>
    <author fullname="R. Peon" initials="R." surname="Peon"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
      <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7540"/>
  <seriesInfo name="DOI" value="10.17487/RFC7540"/>
</reference>
<reference anchor="RFC6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>
<reference anchor="RFC7595">
  <front>
    <title>Guidelines and Registration Procedures for URI Schemes</title>
    <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <author fullname="T. Hardie" initials="T." surname="Hardie"/>
    <date month="June" year="2015"/>
    <abstract>
      <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="35"/>
  <seriesInfo name="RFC" value="7595"/>
  <seriesInfo name="DOI" value="10.17487/RFC7595"/>
</reference>

<reference anchor="A2A" target="https://a2aprotocol.ai">
  <front>
    <title>Agent-to-Agent Protocol Specification</title>
    <author >
      <organization>Linux Foundation</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="ACP" >
  <front>
    <title>Agent Communication Protocol</title>
    <author >
      <organization>IBM Research</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="MCP" target="https://modelcontextprotocol.io">
  <front>
    <title>Model Context Protocol</title>
    <author >
      <organization>Anthropic</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="ANP" >
  <front>
    <title>Agent Network Protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="AGTP-CERT" >
  <front>
    <title>AGTP Agent Certificate Extension</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
</reference>
<reference anchor="AGTP-METHODS" >
  <front>
    <title>AGTP Standard Extended Method Vocabulary</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-00"/>
</reference>
<reference anchor="AGTP-WEB3" >
  <front>
    <title>AGTP Web3 Bridge Specification</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
</reference>


    </references>

</references>


<?line 2271?>

<section anchor="authority-scope-format"><name>Authority-Scope Format</name>

<t>Authority-Scope values are expressed as a space-separated list of scope
tokens following the pattern: [domain]:[action] or [domain]:* for
full domain access. Tokens <strong>MUST</strong> be lowercase ASCII with a single colon
separator.</t>

<t>Examples:</t>

<figure><artwork><![CDATA[
Authority-Scope: calendar:book calendar:query
Authority-Scope: documents:summarize documents:query knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:* payments:confirm
]]></artwork></figure>

<t>Reserved domains (initial set):</t>

<texttable title="Reserved Authority-Scope Domains">
      <ttcol align='left'>Domain</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>calendar</c>
      <c>Scheduling and time-based resource management</c>
      <c>documents</c>
      <c>Document access, summarization, and annotation</c>
      <c>knowledge</c>
      <c>Agent context and memory operations</c>
      <c>booking</c>
      <c>Reservation and resource allocation</c>
      <c>payments</c>
      <c>Financial transactions and confirmations</c>
      <c>agents</c>
      <c>Delegation and collaboration with other agents</c>
      <c>escalation</c>
      <c>Escalation routing and handler management</c>
      <c>activation</c>
      <c>Governed agent package activation (ACTIVATE method extension)</c>
      <c>*</c>
      <c>All domains require explicit grant; use with caution</c>
</texttable>

</section>
<section anchor="example-agtp-wire-formats"><name>Example AGTP Wire Formats</name>

<t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all AGTP
message bodies is application/agtp+json.</t>

<section anchor="query-request-and-response"><name>QUERY Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
TTL: 3000
Content-Type: application/agtp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP re: HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

AGTP/1.0 200 OK
Task-ID: task-0042
Server-Agent-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-agtp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork></figure>

</section>
<section anchor="book-request-and-response"><name>BOOK Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 BOOK
Agent-ID: agt-travel-planner
Principal-ID: usr-chris-hood
Authority-Scope: booking:* calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Priority: normal
Content-Type: application/agtp+json

{
  "method": "BOOK",
  "task_id": "task-0107",
  "parameters": {
    "resource_id": "flight-AA2847",
    "principal_id": "usr-chris-hood",
    "time_slot": "2026-04-15T08:00:00Z",
    "options": {"seat_preference": "aisle", "class": "economy"},
    "confirm_immediately": true
  }
}

AGTP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork></figure>

</section>
<section anchor="escalate-request-and-response"><name>ESCALATE Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Principal-ID: usr-finance-dept
Authority-Scope: booking:* payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Priority: urgent
Content-Type: application/agtp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "BOOK",
      "resource": "vendor-contract-750k",
      "block_reason": "Exceeds agent authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

AGTP/1.0 202 Accepted
Task-ID: task-0881
Server-Agent-ID: srv-escalation-handler
Content-Type: application/agtp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="comparison-table"><name>Comparison Table</name>

<texttable title="AGTP Compared to Existing Approaches">
      <ttcol align='left'>Criterion</ttcol>
      <ttcol align='left'>AGTP</ttcol>
      <ttcol align='left'>HTTP/REST</ttcol>
      <ttcol align='left'>gRPC</ttcol>
      <ttcol align='left'>A2A / MCP</ttcol>
      <c>Agent-native methods</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>Partial</c>
      <c>Intent semantics at protocol level</c>
      <c>Native</c>
      <c>None</c>
      <c>None</c>
      <c>Messaging layer only</c>
      <c>Built-in agent identity</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Authority scope enforcement</c>
      <c>Protocol-level</c>
      <c>None</c>
      <c>None</c>
      <c>Application-layer</c>
      <c>Built-in attribution/audit</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>Varies by impl.</c>
      <c>Transport flexibility</c>
      <c>TCP/UDP/QUIC</c>
      <c>TCP/TLS</c>
      <c>HTTP/2</c>
      <c>HTTP</c>
      <c>Escalation as first-class primitive</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Ecosystem maturity</c>
      <c>Proposed</c>
      <c>Mature</c>
      <c>Mature</c>
      <c>Emerging</c>
      <c>Governance/observability</c>
      <c>Native</c>
      <c>Manual/bolt-on</c>
      <c>Manual</c>
      <c>Limited</c>
      <c>Method registry extensibility</c>
      <c>Yes (Expert Review)</c>
      <c>Frozen (IETF Review)</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>Open core / royalty-free</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Agent Manifest Document</c>
      <c>Native (.agtp format)</c>
      <c>None</c>
      <c>None</c>
      <c>None</c>
      <c>Tamper-proof identity surface</c>
      <c>Yes (hash + signature)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Browser-accessible agent identity</c>
      <c>Yes (read-only)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>URI collision prevention</c>
      <c>Domain-anchored</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>Agent Birth Certificate</c>
      <c>Yes (genesis record)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Domain-expiry lifecycle handling</c>
      <c>Specified</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
</texttable>

<t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
AGTP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>

</section>
<section anchor="glossary"><name>Glossary</name>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
  </dd>
  <dt>Agent Birth Certificate:</dt>
  <dd>
    <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The genesis record of the
agent's existence; the source from which the canonical Agent-ID is
derived. Functions as the agent's social security number: issued once,
permanently bound, never reissued. See Section 5.7.</t>
  </dd>
  <dt>Agent Transfer Protocol (AGTP):</dt>
  <dd>
    <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
  </dd>
  <dt>Agent-ID:</dt>
  <dd>
    <t>A unique identifier for a specific agent instance, present in all AGTP
request headers. In the base spec, derived from the Birth Certificate
hash. With <xref target="AGTP-CERT"/>, cryptographically bound to a verified identity.</t>
  </dd>
  <dt>Agent Manifest Document:</dt>
  <dd>
    <t>A signed <spanx style="verb">application/agtp+json</spanx> document returned when an <spanx style="verb">agtp://</spanx>
URI is resolved. Derived from the agent's <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> package.
Contains identity, lifecycle state, trust tier, behavioral scope, and
birth certificate fields. Never contains executable content.</t>
  </dd>
  <dt>Attribution Record:</dt>
  <dd>
    <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes.</t>
  </dd>
  <dt>Authority-Scope:</dt>
  <dd>
    <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as space-separated domain:action tokens.</t>
  </dd>
  <dt>Delegation Chain:</dt>
  <dd>
    <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
  </dd>
  <dt>ESCALATE:</dt>
  <dd>
    <t>An AGTP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
  </dd>
  <dt>Governance Token:</dt>
  <dd>
    <t>A signed, time-limited JWT artifact encoding a specific governance verdict
for a specific action. The runtime companion to the Birth Certificate.
Default TTL: 30 seconds. Must not be reused.</t>
  </dd>
  <dt>Intent Verb:</dt>
  <dd>
    <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
  </dd>
  <dt>Method Registry:</dt>
  <dd>
    <t>The IANA-maintained registry of valid AGTP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
  </dd>
  <dt>Principal:</dt>
  <dd>
    <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
  </dd>
  <dt>Principal-ID:</dt>
  <dd>
    <t>The identifier of the principal on whose behalf an agent operates,
present in all AGTP request headers.</t>
  </dd>
  <dt>Scope-Enforcement Point (SEP):</dt>
  <dd>
    <t>An AGTP-aware infrastructure component, load balancer, gateway, proxy,
that enforces Authority-Scope compliance on AGTP requests without
application-layer access. Requires <xref target="AGTP-CERT"/>.</t>
  </dd>
  <dt>Scope Violation (451):</dt>
  <dd>
    <t>An AGTP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
  </dd>
  <dt>Session:</dt>
  <dd>
    <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
  </dd>
  <dt>Trust Tier:</dt>
  <dd>
    <t>A classification (1, 2, or 3) assigned to an agent at registration based
on the strength of identity verification. Tier 1 requires DNS-anchored
domain verification and a <spanx style="verb">.nomo</spanx> governed package. Tier 2 is org-asserted
without DNS verification. Tier 3 is experimental, not production-eligible.</t>
  </dd>
  <dt>551 Authority Chain Broken:</dt>
  <dd>
    <t>An AGTP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
  </dd>
</dl>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

