<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ni-a2a-ai-agent-security-requirements-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Agent Security Requirements">Security Requirements for AI Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-ni-a2a-ai-agent-security-requirements-01"/>
    <author fullname="Yuan Ni">
      <organization>Huawei</organization>
      <address>
        <email>niyuan1@huawei.com</email>
      </address>
    </author>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <author fullname="Qiangzhou Gao">
      <organization>Huawei</organization>
      <address>
        <email>gaoqiangzhou@huawei.com</email>
      </address>
    </author>
    <author fullname="Zhenbin Li">
      <organization/>
      <address>
        <email>robinli314@163.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="28"/>
    <keyword>AI Agent</keyword>
    <keyword>Provisioning</keyword>
    <keyword>Authentication</keyword>
    <keyword>Authorization</keyword>
    <abstract>
      <?line 60?>

<t>This document discusses security requirements for  AI agents, covering different stages of security interactions. These include provisioning, registration, discovery, cross-domain interconnection, and access control.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://liuchunchi.github.io/draft-ni-a2a-ai-agent-security-requirements/draft-ni-a2a-ai-agent-security-requirements.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ni-a2a-ai-agent-security-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:WG@example.com"/>),
        which is archived at <eref target="https://example.com/WG"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/liuchunchi/draft-ni-a2a-ai-agent-security-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the widespread application of agentic AI technology across various business scenarios, its security issues have become increasingly prominent.</t>
      <t>This document aims to provide an architecture addressing security requirements across different stages of interactions of Agentic AI use cases. These include provisioning, registration, discovery, cross-domain interconnection, and access control. This document establishes a starting point to guide Agentic AI security design, development, and implementation consideration discussions.</t>
      <t>The target audience of this document would be IETF security experts that wish to understand AI Agent's behaviorial patterns, so to evaluate if the proposed security requirements are worthy of further security designs.</t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <artwork><![CDATA[
                 +----------------+                    
                 |  Master Agent  |                    
                 +-^--------------+                    
                 +-+--------------+                    
                 | |  Firewall    |                    
                 +-+--------------+                    
                   |                                   
-------------- (2) | Inter-domain--------------                                
                   |                                   
+------------------+---------------------------------+ 
|                +-+--------------+   Intra-domain   | 
|                | |  Firewall    |                  | 
|                +-+--------------+                  | 
|                +-v--------------+                  | 
|        +-------+  Master Agent  |                  | 
|   (3)  |       +----------------+                  | 
|        |                              (1)          | 
|   +----v-----+    +----------+    +----------+     | 
|   |  Agent   +---->  Agent   +---->  Agent   |     | 
|   +----+-----+    +----------+    +----+-----+     | 
|        |                               |           | 
|     +--v---------+           +---------v---+       | 
|     |    DB      |           |     API     |       | 
|     +------------+           +-------------+       | 
+----------------------------------------------------+ 
]]></artwork>
      <t><em>Figure 1. Architecture of Agent Security Control and Management</em></t>
      <t>The architecture of agent security control and management is illustrated in Figure 1. There are four types of security interactions, in a sequential order:</t>
      <ol spacing="normal" type="1"><li>
          <t>Provisioning, Registration, and Discovery: Creating agent identity, establishing initial trust, provisioning agent secrets and credentials, onboarding agents to enable discovery.</t>
        </li>
        <li>
          <t>Cross-domain Interconnection: Enabling secure, authenticated communication between agents across different trust domains.</t>
        </li>
        <li>
          <t>Access Control: The Master Agent validates both intra-domain and inter-domain access tokens, creates internal workflow and manages different credentials for heterogeneous systems.</t>
        </li>
      </ol>
      <t>Therefore, the architecture includes four components:</t>
      <ol spacing="normal" type="1"><li>
          <t>Firewall:  A network security device designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined security rules.</t>
        </li>
        <li>
          <t>Master Agent: The central orchestrating entity that manages multi-agent operations, including cross-domain communication, workflow coordination, credential management, and security policy management.</t>
        </li>
        <li>
          <t>Agents: Autonomous software entities deployed in various domains to perform specific tasks.</t>
        </li>
        <li>
          <t>Heterogeneous systems:  API endpoints, microservices, tools, and databases.</t>
        </li>
      </ol>
      <t>The above architecture is from the perspective of a service flow. From the identity management perspective, we recommend reusing IETF works like WIMSE. This draft <xref target="I-D.draft-ni-wimse-ai-agent-identity-01"/> discusses WIMSE applicability to Agentic AI.</t>
    </section>
    <section anchor="provisioning-registration-and-discovery">
      <name>Provisioning, Registration, and Discovery</name>
      <t>Figure 2 shows the diagram of provisioning and registration, which includes Agent Certificate Authority (ACA) and Agent Registry Service (ARS):</t>
      <ol spacing="normal" type="1"><li>
          <t>ACA (Agent Credential Authority): A trusted third party that issues and manages credentials for agents. Credential formats include but not limited to: X.509 certificates, identity tokens, etc.</t>
        </li>
        <li>
          <t>ARS (Agent Registry Service): A system responsible for agent identity registration and discovery-matching.</t>
        </li>
      </ol>
      <artwork><![CDATA[
+-------------------------------------------+
|                                           |
| +-----------------+  +------------------+ |
| |Agent Credential |  |  Agent Registry  | |
| |Authority (ACA)  |  |  Service(ARS)    | |
| +--------^--------+  +---------^--------+ |
|          |                     |          |
|         ++---------------------++         |
|         ||     +----------+    ||         |
|         |+----->   Agent  +----+|         |
|         |      +----------+     |         |
|         |                       |         |
|         |   device/container    |         |
|         +-----------------------+         |
|                                           |
+-------------------------------------------+
]]></artwork>
      <t><em>Figure 2. Diagram for Provisioning and Registration</em></t>
      <section anchor="identity-provisioning-and-management">
        <name>Identity Provisioning and Management</name>
        <t>Identity provisioning and management are the process of creating and assigning a verifiable digital identity to an agent.</t>
        <ul spacing="normal">
          <li>
            <t>Initial Trust Establishment: Initial trust can be established through one or more of the following trust anchors, including, but not limited to: a manufacturer-embedded immutable credential like an IDevID certificate; a hardware root of trust like a Trusted Platform Module (TPM) or Hardware Security Module (HSM); identity documents like an AWS Instance Identity Document or an Azure Managed Service Identity token. This step verifies the agent's execution environment (device, container, etc.) as trustworthy, allows the device or container to join the network, thereby enabling secure operations for all subsequent steps.</t>
          </li>
          <li>
            <t>Credential Request: During a credential request, the agent must provide multiple proofs of its legitimacy, could include, for example, but not limited to:
            </t>
            <ul spacing="normal">
              <li>
                <t>Proof of Possession (PoP): A Certificate Signing Request (CSR) or other PoP forms signed with the agent's private key, demonstrating that the agent holds the private key corresponding to the requested identity.</t>
              </li>
              <li>
                <t>Remote Attestation Evidence or Result: A set of security-relevant claims about the Target Environment submitted to a RATS Verifier (could be the ACA), which reveals operational status, health, configuration, or construction.</t>
              </li>
              <li>
                <t>AI Bill of Materials (AIBOM):  A comprehensive inventory that details the agent's supply chain, including models, datasets, configurations, dependencies, and related infrastructure. This prevents the use of vulnerable AI components.</t>
              </li>
              <li>
                <t>Provider Endorsement: A digital signature or credential from the Agent Provider, ensuring the agent originated from a trusted source.</t>
              </li>
              <li>
                <t>Identity Binding: A cryptographic binding to a specific human user or an organizational role to specify on whose behalf the agent operates and its authorized scope.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Credential Issuance: The ACA validates proofs and requests from the above two steps, if passed, it issues an agent-specific credential that may include its owner or requester identity, capabilities, locator, acceptable validation methods for the ARS.</t>
          </li>
          <li>
            <t>Credential Lifecycle Management: The ACA not only issues credentials but also defines and enforces revocation policies. These policies are triggered by specific events, such as a detected security compromise, the agent's scheduled decommissioning, or a key rotation.</t>
          </li>
        </ul>
      </section>
      <section anchor="secret-management">
        <name>Secret Management</name>
        <t>AI Agents SHOULD NOT have direct access to secrets due to new threats like Prompt Injection. AI Agents SHOULD reuse secret management modules on the platform it operates on, for example, cloud secret managers or TEE/keystore/keychains on smart devices. Best practices like secret/credential generation, rotation and revocation apply. Agents SHOULD only obtain temporary access tokens or signed messages via a secure API or other kind of trusted intermediary. Guardrails also apply for general secret information exfiltration prevention.</t>
      </section>
      <section anchor="agent-registration">
        <name>Agent Registration</name>
        <t>After receiving a credential from the ACA, the agent then sends it to the ARS to authenticate itself and start the registration process.</t>
        <ul spacing="normal">
          <li>
            <t>Authentication: The ARS must verify the legitimacy of the credential submitted by the agent. It must be signed or otherwise endorsed by the ACA.</t>
          </li>
          <li>
            <t>Registration: The ARS then checks if the information signed by the ACA, such as the agent's capabilities, exactly matches the registration request sent by the agent. Upon successful validation, the ARS assigns the agent a unique identifier and establishes an agent record that links the identifier to its attributes.</t>
          </li>
          <li>
            <t>Record Management: This step automatically removes expired credentials and synchronizes with the ACA to ensure timely revocation of credentials, preventing the use of invalid or compromised credentials.</t>
          </li>
        </ul>
      </section>
      <section anchor="agent-onboarding">
        <name>Agent Onboarding</name>
        <t>Agent onboarding differs between campus and cloud environments. On campus, agents use protocols like EAP-TLS for network access. In the cloud, the process involves injected sidecars, which register agents to the central service mesh registry automatically to enable communication and management.</t>
      </section>
      <section anchor="agent-discovery">
        <name>Agent Discovery</name>
        <t>After agent onboarding, the discovery process enables entities (e.g., a human user, an agent, etc.) to find and connect with registered agents.</t>
        <ul spacing="normal">
          <li>
            <t>Authentication: The ARS must authenticate the entity initiating the discovery request. The requester is required to present a valid identity credential.</t>
          </li>
          <li>
            <t>Capability Filtering and Matching: The ARS performs dynamic filtering based on the requester's identity and query and returns only agent records relevant to the query, enforcing the principle of least privilege at the discovery layer.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="cross-domain-interconnection">
      <name>Cross-Domain Interconnection</name>
      <section anchor="cross-domain-identifier-interoperability">
        <name>Cross-Domain Identifier Interoperability</name>
        <t>Different domains may use distinct identifier schemas. Possible methods include:</t>
        <ul spacing="normal">
          <li>
            <t>pre-configured schema translation</t>
          </li>
          <li>
            <t>cross-domain identifier synchronization</t>
          </li>
          <li>
            <t>a universal parsing framework or system</t>
          </li>
        </ul>
      </section>
      <section anchor="secure-cross-domain-transmission">
        <name>Secure Cross-Domain Transmission</name>
        <t>Mutual TLS (mTLS) connection starts from the external requesting agent to the master agent. The master agent terminates the mTLS connection and parses the application layer requests. In this case, the master agent functions as an OAuth resource server, and manages internal task orchestration.</t>
      </section>
      <section anchor="authenticating-external-calls">
        <name>Authenticating External Calls</name>
        <t>The master agent then verifies the identity of the requesting agent, and whether or not it has permission to the requested service or agent. Different authentication methods might be possible:</t>
        <ul spacing="normal">
          <li>
            <t>API keys</t>
          </li>
          <li>
            <t>Username-password</t>
          </li>
          <li>
            <t>Pre-shared secrets</t>
          </li>
          <li>
            <t>Assertions (for example, JWT Authorization Grant<xref target="I-D.draft-ietf-oauth-identity-chaining-06"/>)</t>
          </li>
        </ul>
        <t>which can even be combined with AND/OR logic. During this process, the master agent might be able to identify the caller endpoint type:</t>
        <ul spacing="normal">
          <li>
            <t>human user via browser or app</t>
          </li>
          <li>
            <t>human user via API</t>
          </li>
          <li>
            <t>AI agents</t>
          </li>
          <li>
            <t>Hardware or equipment via an IoT API</t>
          </li>
        </ul>
      </section>
      <section anchor="iam-integration">
        <name>IAM Integration</name>
        <t>Since the agent may inherit its access rights from its owner or user, when authenticating requests, the validation might require integration of IAM systems for redirected verification.</t>
      </section>
    </section>
    <section anchor="access-control">
      <name>Access Control</name>
      <section anchor="authorization-handling">
        <name>Authorization Handling</name>
        <t>The master agent acts as the OAuth 2.1 resource server and a Policy Enforcement Point (PEP). Its responsibilities are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Token Validation: The master agent must validate access tokens as described in OAuth 2.1 Section 5.2. If validation fails, it must respond according to OAuth 2.1 Section 5.3 error handling requirements.</t>
          </li>
          <li>
            <t>Fine-Grained Policy Enforcement: The master agent serves as a PEP that queries a PDP (Policy Decision Point), such as Open Policy Agent (OPA), to evaluate the requester's access request. The PDP functions by taking the master agent's query, pre-configured policies (supporting RBAC, ABAC, ReBAC models, etc.), and data as inputs to decide whether the requester is authorized for its intended action. The PDP then returns the final decision to the master agent for enforcement.</t>
          </li>
        </ul>
      </section>
      <section anchor="authorization-models">
        <name>Authorization Models</name>
        <t>In enterprise situation, Role-based Access Control (RBAC) Attribute-based Access Control (ABAC) or Adaptive Access Control (AdBAC) are different access control models used in practice. Regarding access control models, there are 2 ways forward:</t>
        <ol spacing="normal" type="1"><li>
            <t>whatever the authorization model used in the enterprise itself applies to AI Agents. This leaves 2 cases possible:
            </t>
            <ol spacing="normal" type="1"><li>
                <t>The agent carry the identity and inherit access rights from its owner (a human or a department). Carring such human identity will help security control points make decisions with sufficient context, and to the discretion of its internal security policy plus access control model.</t>
              </li>
              <li>
                <t>The agent does not carry the identity from its owner. It carries independent security contexts rich enough for access control.</t>
              </li>
            </ol>
          </li>
          <li>
            <t>AI Agents require a new authorization model completely.</t>
          </li>
        </ol>
        <t>This section would require more discussion for best current practices.</t>
      </section>
      <section anchor="authorization-chaining-across-domains">
        <name>Authorization Chaining Across Domains</name>
        <t>In an agentic AI use case, a request may traverse multiple master agents in multiple trust domains before completing. It is common that the requesting agent from domain A needs to access the master agent of domain B. During this process, the following information should be preserved:</t>
        <ul spacing="normal">
          <li>
            <t>Original requesting agent identity</t>
          </li>
          <li>
            <t>Authorization context
            </t>
            <ul spacing="normal">
              <li>
                <t>Scope</t>
              </li>
              <li>
                <t>Resource</t>
              </li>
              <li>
                <t>Audience</t>
              </li>
              <li>
                <t>Grant type</t>
              </li>
              <li>
                <t>Assertion</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Agent-to-Agent Context</t>
          </li>
        </ul>
        <t>The current best practice is <xref target="I-D.draft-ietf-oauth-identity-chaining-06"/>, which can preserve the above information during a cross-domain token exchange process. This ensures that internal resource servers perform independent secondary authorization instead of blindly trusting the master agent's upstream validation, preventing the privilege abuse of the master agent and unauthorized lateral movement.</t>
      </section>
      <section anchor="converting-to-internal-workflow">
        <name>Converting to Internal Workflow</name>
        <ul spacing="normal">
          <li>
            <t>Workflow Generation: Complex tasks often require multi-agent collaboration. The master agent receives, parses, and extracts the original job request from the external requesting agent, then creates sequential workflows or parallel calls. This requires the master agent to have information of all callable internal API assets, agent capabilities, etc.</t>
          </li>
          <li>
            <t>Downscoping: If the master agent intends to use a workflow, it extracts the original caller's identity and authorization context, and initiates a new internal workflow. It should follow the current least privilege best practice of downscoping-Transaction Tokens as specified in <xref target="I-D.draft-tulshibagwale-oauth-transaction-tokens-05"/>. The access rights to each downstream workload decrease.</t>
          </li>
          <li>
            <t>Agent-to-Agent Context: the Agent-to-Agent context and intent of the original requester must be preserved and propagated throughout the workflow to avoid authorization drift and context poisoning as specified in <xref target="I-D.draft-liu-oauth-a2a-profile-00"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="interoperability-for-heterogeneous-systems">
        <name>Interoperability for Heterogeneous Systems</name>
        <t>Within a domain, there might exist different types of heterogeneous systems or legacy systems that require different authentication methods. They could be API endpoints, microservices, tools or databases. The exact authentication methods are determined by the service itself, for example,</t>
        <ul spacing="normal">
          <li>
            <t>identity tokens</t>
          </li>
          <li>
            <t>API keys</t>
          </li>
          <li>
            <t>pre-shared secrets</t>
          </li>
          <li>
            <t>username-passwords</t>
          </li>
          <li>
            <t>X.509 certificates, etc.</t>
          </li>
        </ul>
        <t>As a result, the master agent also works as an intermediary credential manager that converts the formats, scopes, identity of the credential, bridging the gap between heterogeneous systems and platforms.</t>
        <t>Examples include:</t>
        <ul spacing="normal">
          <li>
            <t>Static secrets (API keys) to be exchanged to short-lived, on demand credentials (identity tokens)</t>
          </li>
        </ul>
      </section>
      <section anchor="zero-trust-analysis">
        <name>Zero Trust Analysis</name>
        <t>The above information can be used as rich context that allows zero trust access control. There are three additional aspects can be implemented to enhance the zero trust framework:</t>
        <ul spacing="normal">
          <li>
            <t>Remote Attestation Results:  For the PEP at the master agent or the internal resource server, Remote attestation results could also be part of the inputs, which could include the following information:
            </t>
            <ul spacing="normal">
              <li>
                <t>RoT and trust anchors</t>
              </li>
              <li>
                <t>Identifiers</t>
              </li>
              <li>
                <t>Affiliations</t>
              </li>
              <li>
                <t>Posture assessment results</t>
              </li>
              <li>
                <t>Capabilities</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Continuous Observability: The system should utilize OpenTelemetry (OTel) to track each call across agents, sending OTel's telemetry, which records call frequency, error rates, and behavioral anomalies, etc. to the PDP for real-time assessment.</t>
          </li>
          <li>
            <t>Microsegmentation: Based on the telemetry data, PDP can issue software-defined security policies to PEP at the perimeter of each segment to enforce microsegmentation, in order to prevent lateral movement of security risks. Possible granularity of microsegmentation includes:
            </t>
            <ul spacing="normal">
              <li>
                <t>per IP segment/subnet</t>
              </li>
              <li>
                <t>per each workload</t>
              </li>
              <li>
                <t>per tags and attributes (of workload), etc.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-oauth-identity-chaining-06">
          <front>
            <title>OAuth Identity and Authorization Chaining Across Domains</title>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>SPIRL</organization>
            </author>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>SPIRL</organization>
            </author>
            <author fullname="Kelley Burgin" initials="K." surname="Burgin">
              <organization>MITRE</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>NSA-CCSS</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="12" month="September" year="2025"/>
            <abstract>
              <t>   This specification defines a mechanism to preserve identity and
   authorization information across trust domains that use the OAuth 2.0
   Framework.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Web Authorization
   Protocol Working Group mailing list (oauth@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/oauth/.

   Source for this draft and an issue tracker can be found at
   https://github.com/oauth-wg/oauth-identity-chaining.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-identity-chaining-06"/>
        </reference>
        <reference anchor="I-D.draft-tulshibagwale-oauth-transaction-tokens-05">
          <front>
            <title>Transaction Tokens</title>
            <author fullname="Atul Tulshibagwale" initials="A." surname="Tulshibagwale">
              <organization>SGNL</organization>
            </author>
            <author fullname="George Fletcher" initials="G." surname="Fletcher">
              <organization>Capital One</organization>
            </author>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>Microsoft</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   Transaction Tokens (Txn-Tokens) enable workloads in a trusted domain
   to ensure that user identity and authorization context of an external
   programmatic request, such as an API invocation, are preserved and
   available to all workloads that are invoked as part of processing
   such a request.  Txn-Tokens also enable workloads within the trusted
   domain to optionally immutably assert to downstream workloads that
   they were invoked in the call chain of the request.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tulshibagwale-oauth-transaction-tokens-05"/>
        </reference>
        <reference anchor="I-D.draft-liu-oauth-a2a-profile-00">
          <front>
            <title>Agent-to-Agent (A2A) Profile for OAuth Transaction Tokens</title>
            <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Ni Yuan" initials="N." surname="Yuan">
              <organization>Huawei</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document defines a profile for using OAuth Transaction Tokens in
   Agent-to-Agent (A2A) communication scenarios.  The profile specifies
   how A2A call chain context can be embedded within Transaction Tokens
   to maintain agent identity, authorization context, and execution flow
   across distributed agent workloads within trusted domains.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-liu-oauth-a2a-profile-00"/>
        </reference>
        <reference anchor="I-D.draft-ni-wimse-ai-agent-identity-01">
          <front>
            <title>WIMSE Applicability for AI Agents</title>
            <author fullname="Ni Yuan" initials="N." surname="Yuan">
              <organization>Huawei</organization>
            </author>
            <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
              <organization>Huawei</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document discusses WIMSE applicability to Agentic AI, so as to
   establish independent identities and credential management mechanisms
   for AI agents.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ni-wimse-ai-agent-identity-01"/>
        </reference>
      </references>
    </references>
    <?line 309?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
