<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-hood-agtp-agent-cert-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="AGTP-CERT">AGTP Agent Certificate Extension</title>

    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>

    <date year="2026" month="March" day="23"/>

    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword> <keyword>agent identity</keyword> <keyword>agent certificate</keyword> <keyword>transport-layer governance</keyword> <keyword>X.509</keyword>

    <abstract>


<?line 49?>

<t>The Agent Transfer Protocol (AGTP) base specification defines agent
identity headers (Agent-ID, Principal-ID, Authority-Scope) that are
self-asserted: present on every request and mandatory for logging, but
not cryptographically verified at the transport layer. This document
specifies the AGTP Agent Certificate Extension: an optional mechanism
that binds Agent-ID, Principal-ID, and Authority-Scope to an X.509 v3
certificate presented during TLS mutual authentication. The extension
enables infrastructure components including Scope-Enforcement Points
(SEPs), load balancers, and governance gateways to verify agent identity
and enforce authority scope without application-layer access, at O(1)
cost per request header check. The extension also defines session-level
revocation propagation via AGTP NOTIFY broadcast and a Certificate
Transparency Log for tamper-evident governance metadata.</t>

<t>Note: Certain mechanisms described in this document may be subject to
pending patent applications by the author. The licensor is prepared to
grant a royalty-free license to implementers consistent with the IETF's
IPR framework. See the IPR Notice and Section 7.</t>



    </abstract>



  </front>

  <middle>


<?line 70?>

<section anchor="introduction"><name>Introduction</name>

<section anchor="the-identity-gap-in-base-agtp"><name>The Identity Gap in Base AGTP</name>

<t>The AGTP base specification requires every request to carry Agent-ID,
Principal-ID, and Authority-Scope headers. These headers are self-asserted:
an AGTP client declares its identity and scope, and the server logs the
declaration. In the base spec, there is no transport-layer mechanism to
verify that the declared Agent-ID corresponds to a registered agent, that
the Principal-ID is accurate, or that the Authority-Scope does not exceed
what was granted.</t>

<t>This is a deliberate design choice in the core spec: self-asserted
identity with mandatory logging provides a useful baseline and enables
broad adoption. For many deployments, anomaly detection and audit trails
over self-asserted headers are sufficient.</t>

<t>For higher-stakes deployments -- financial transactions, healthcare
operations, legal actions, multi-organization agent federations -- the
self-assertion model is insufficient. Infrastructure needs to verify
agent identity and enforce scope at the transport layer without parsing
application payloads.</t>

</section>
<section anchor="the-agent-certificate-extension"><name>The Agent Certificate Extension</name>

<t>The AGTP Agent Certificate Extension provides cryptographic identity
binding at the transport layer. An AGTP Agent Certificate is an X.509
v3 certificate with agent-governance-specific extensions. It is
presented during TLS mutual authentication, enabling the server and
any AGTP-aware infrastructure component to verify the agent's identity
and authority scope from the certificate alone, without inspecting the
request headers or body.</t>

<t>This document specifies:</t>

<t><list style="symbols">
  <t>The AGTP Agent Certificate schema and X.509 v3 extension fields</t>
  <t>The certificate issuance and renewal protocol</t>
  <t>The authority scope commitment mechanism for O(1) per-request
scope enforcement</t>
  <t>Session-level revocation propagation via AGTP NOTIFY</t>
  <t>The AGTP Certificate Transparency Log (AGTP-CTL)</t>
</list></t>

</section>
<section anchor="scope"><name>Scope</name>

<t>This extension is OPTIONAL. Core AGTP implementations that do not
implement this extension remain fully compliant with <xref target="AGTP"/>. The
extension is required only for Trust Tier 1 agent identity verification
and for SEP-enforced scope constraint without application-layer access.</t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>

<dl>
  <dt>AGTP Agent Certificate:</dt>
  <dd>
    <t>An X.509 v3 certificate carrying agent-governance-specific extensions,
presented during TLS mutual authentication to establish cryptographic
agent identity and authority scope at the transport layer.</t>
  </dd>
  <dt>Scope-Enforcement Point (SEP):</dt>
  <dd>
    <t>An AGTP-aware infrastructure component that enforces Authority-Scope
constraints on AGTP requests. With the Agent Certificate Extension,
SEPs verify scope from the certificate at O(1) cost per request without
application-layer access.</t>
  </dd>
  <dt>Authority-Scope Commitment:</dt>
  <dd>
    <t>A cryptographic binding of the agent's declared Authority-Scope tokens
to the Agent Certificate, enabling SEPs to verify scope token membership
after a single session-establishment signature verification.</t>
  </dd>
  <dt>AGTP Certificate Transparency Log (AGTP-CTL):</dt>
  <dd>
    <t>A Merkle-tree-based append-only log of issued AGTP Agent Certificates,
providing tamper-evident public accountability for certificate issuance
and revocation.</t>
  </dd>
</dl>

</section>
<section anchor="agtp-agent-certificate-schema"><name>AGTP Agent Certificate Schema</name>

<section anchor="certificate-structure"><name>Certificate Structure</name>

<t>The AGTP Agent Certificate is an X.509 v3 certificate per <xref target="RFC5280"/>
with the following subject fields and extensions:</t>

<section anchor="standard-subject-fields"><name>Standard Subject Fields</name>

<texttable title="AGTP Agent Certificate Subject Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>CN (Common Name)</c>
      <c><strong>MUST</strong></c>
      <c>Human-readable agent label</c>
      <c>O (Organization)</c>
      <c><strong>MUST</strong></c>
      <c>Organization name (maps to <spanx style="verb">principal_org</spanx>)</c>
      <c>OU (Organizational Unit)</c>
      <c><strong>MAY</strong></c>
      <c>Governance zone identifier</c>
      <c>emailAddress</c>
      <c><strong>SHOULD</strong></c>
      <c>Contact email of the responsible principal</c>
</texttable>

</section>
<section anchor="agent-governance-x509-v3-extensions"><name>Agent-Governance X.509 v3 Extensions</name>

<t>The following extensions are defined for AGTP Agent Certificates.
OIDs for these extensions are specified in Section 8 (IANA
Considerations).</t>

<dl>
  <dt><strong>subject-agent-id</strong> (CRITICAL)</dt>
  <dd>
    <t>The canonical AGTP Agent-ID derived from the governance-layer Birth
Certificate's <spanx style="verb">certificate_hash</spanx>. This is the transport-layer
Agent-ID used in the AGTP <spanx style="verb">Agent-ID</spanx> header. Format: hex-encoded
256-bit value.</t>
  </dd>
  <dt><strong>principal-id</strong> (CRITICAL)</dt>
  <dd>
    <t>The identifier of the human principal accountable for this agent's
actions. Maps to the AGTP <spanx style="verb">Principal-ID</spanx> header. Format: UTF-8
string, maximum 256 characters.</t>
  </dd>
  <dt><strong>authority-scope-commitment</strong> (CRITICAL)</dt>
  <dd>
    <t>A cryptographic commitment to the agent's Authority-Scope token set,
enabling SEPs to verify token membership without storing the full
scope list per session. The commitment is computed as an Ed25519
signature over the canonical lexicographically sorted Authority-Scope
token set. SEPs verify token membership by checking the token against
the commitment after session-establishment signature verification.</t>
  </dd>
  <dt><strong>governance-zone</strong> (NON-CRITICAL)</dt>
  <dd>
    <t>The governance zone identifier in which the agent is registered.
Format: UTF-8 string following the <spanx style="verb">zone:</spanx> prefix convention.</t>
  </dd>
  <dt><strong>trust-tier</strong> (NON-CRITICAL)</dt>
  <dd>
    <t>The agent's Trust Tier (1, 2, or 3) as defined in <xref target="AGTP"/> Section 6.2.
Format: INTEGER.</t>
  </dd>
  <dt><strong>archetype</strong> (NON-CRITICAL)</dt>
  <dd>
    <t>The agent's behavioral archetype as defined in <xref target="AGTP"/> Section 6.7.3.
Format: UTF-8 string; one of: assistant, analyst, executor,
orchestrator, monitor.</t>
  </dd>
  <dt><strong>activation-certificate-id</strong> (NON-CRITICAL)</dt>
  <dd>
    <t>Cross-layer reference to the governance-layer Birth Certificate
<spanx style="verb">certificate_hash</spanx>. Enables audit reconstruction without a
cryptographic dependency between the transport certificate and the
governance certificate. Format: hex-encoded 256-bit value.</t>
  </dd>
  <dt><strong>agtp-ctl-sct</strong> (NON-CRITICAL)</dt>
  <dd>
    <t>Signed Certificate Timestamp from the AGTP Certificate Transparency
Log, proving the certificate was submitted to the AGTP-CTL before
delivery. Format: SCT structure per <xref target="RFC6962"/> Section 3.2.</t>
  </dd>
</dl>

</section>
</section>
</section>
<section anchor="certificate-issuance-protocol"><name>Certificate Issuance Protocol</name>

<section anchor="eligibility"><name>Eligibility</name>

<t>Certificate Signing Requests (CSRs) for AGTP Agent Certificates
<strong>MUST</strong> only be accepted for agents in Active lifecycle state in
the AGTP registry. A governance platform <strong>MUST</strong> verify the agent's
lifecycle state at CSR submission time and <strong>MUST</strong> reject CSRs for
agents in Suspended, Revoked, or Deprecated state.</t>

</section>
<section anchor="issuance-steps"><name>Issuance Steps</name>

<t><list style="numbers" type="1">
  <t>The governance platform generates a key pair for the agent (or
accepts a CSR with an agent-generated key pair).</t>
  <t>The governance platform populates the certificate subject fields
and all AGTP-specific extensions from the agent's Birth Certificate
and registry record.</t>
  <t>The governance platform verifies that the proposed <spanx style="verb">authority-scope-
commitment</spanx> does not exceed the scope granted in the agent's Birth
Certificate. If it does, the CSR <strong>MUST</strong> be rejected.</t>
  <t>The governance platform signs the certificate using its issuing CA
key per <xref target="RFC5280"/>.</t>
  <t>The governance platform submits the certificate to the AGTP-CTL and
obtains a Signed Certificate Timestamp (SCT).</t>
  <t>The SCT is embedded in the <spanx style="verb">agtp-ctl-sct</spanx> extension and the
certificate is delivered to the agent.</t>
  <t>The governance platform publishes the new certificate to the
agent's registry record, triggering a registry state update.</t>
</list></t>

</section>
<section anchor="certificate-validity"><name>Certificate Validity</name>

<t>AGTP Agent Certificates <strong>SHOULD</strong> have a validity period of no more
than 90 days. Short validity periods limit the exposure window of a
compromised certificate and reduce reliance on revocation mechanisms.
Renewal <strong>SHOULD</strong> begin at 80% of the validity period.</t>

<t>Certificate renewal carries forward the predecessor's <spanx style="verb">subject-agent-id</spanx>
and <spanx style="verb">activation-certificate-id</spanx> unchanged. The renewed certificate
receives a new serial number, new validity period, and a new SCT.</t>

</section>
</section>
<section anchor="tls-integration"><name>TLS Integration</name>

<section anchor="mutual-authentication"><name>Mutual Authentication</name>

<t>AGTP connections using the Agent Certificate Extension <strong>MUST</strong> use
TLS 1.3 mutual authentication. The agent presents its AGTP Agent
Certificate as the client certificate during the TLS handshake.</t>

<t>The server verifies the client certificate chain against the issuing
CA trust anchors. Following successful handshake:</t>

<t><list style="numbers" type="1">
  <t>The server extracts the <spanx style="verb">subject-agent-id</spanx> extension value and
verifies it matches the <spanx style="verb">Agent-ID</spanx> header on the first request.</t>
  <t>The server extracts the <spanx style="verb">principal-id</spanx> extension value and verifies
it matches the <spanx style="verb">Principal-ID</spanx> header on the first request.</t>
  <t>The server extracts the <spanx style="verb">authority-scope-commitment</spanx> extension value
and uses it to verify Authority-Scope header tokens on each request.</t>
</list></t>

<t>Any mismatch between certificate extension values and AGTP header
values <strong>MUST</strong> cause the server to return 401 Unauthorized and
<strong>MUST</strong> be logged.</t>

</section>
<section anchor="scope-enforcement-at-seps"><name>Scope Enforcement at SEPs</name>

<t>A SEP operating with the Agent Certificate Extension verifies Authority-
Scope at O(1) cost per request:</t>

<t><list style="numbers" type="1">
  <t>At session establishment, the SEP extracts the <spanx style="verb">authority-scope-
commitment</spanx> from the client certificate. (One-time per session.)</t>
  <t>On each request, the SEP checks whether the <spanx style="verb">Authority-Scope</spanx>
header tokens are covered by the commitment. (O(1) per request
after session setup.)</t>
  <t>If any header token is not covered by the commitment, the SEP
returns 451 Scope Violation without forwarding the request to the
application layer.</t>
</list></t>

<t>This enables governance enforcement at line rate without application-
layer parsing.</t>

</section>
</section>
<section anchor="revocation-and-session-propagation"><name>Revocation and Session Propagation</name>

<section anchor="revocation-events"><name>Revocation Events</name>

<t>An AGTP Agent Certificate <strong>MUST</strong> be revoked when any of the following
occur:</t>

<t><list style="symbols">
  <t>The agent's lifecycle state transitions to Revoked or Deprecated</t>
  <t>The Birth Certificate's <spanx style="verb">certificate_hash</spanx> is invalidated</t>
  <t>The agent's <spanx style="verb">authority-scope-commitment</spanx> requires modification</t>
  <t>The principal requests revocation</t>
  <t>A trust violation is detected</t>
</list></t>

</section>
<section anchor="session-level-revocation-propagation"><name>Session-Level Revocation Propagation</name>

<t>Standard certificate revocation (CRL, OCSP) operates on polling cycles,
leaving a window during which revoked certificates may still be used.
For agent systems, this window is unacceptable for high-stakes operations.</t>

<t>AGTP Agent Certificate revocation <strong>MUST</strong> be propagated to active
sessions via AGTP NOTIFY broadcast:</t>

<t><list style="numbers" type="1">
  <t>The governance platform issues a revocation event to the AGTP-CTL.</t>
  <t>The governance platform broadcasts an AGTP NOTIFY to all
infrastructure components holding active sessions for the revoked
certificate's <spanx style="verb">subject-agent-id</spanx>:</t>
</list></t>

<figure><sourcecode type="json"><![CDATA[
{
  "method": "NOTIFY",
  "parameters": {
    "recipient": "infrastructure:broadcast",
    "content": {
      "event_type": "certificate_revoked",
      "subject_agent_id": "[agent-id]",
      "certificate_serial": "[serial]",
      "revocation_reason": "[reason]",
      "effective_at": "2026-04-01T00:00:00Z"
    },
    "urgency": "critical"
  }
}
]]></sourcecode></figure>

<t><list style="numbers" type="1">
  <t>Infrastructure components receiving this NOTIFY <strong>MUST</strong> immediately
terminate all active sessions for the identified <spanx style="verb">subject-agent-id</spanx>.
Session termination <strong>MUST</strong> occur before the next request is
processed on the affected session.</t>
  <t>The target revocation-to-termination latency is 30 seconds. This is
materially shorter than standard CRL or OCSP cache-based models.</t>
</list></t>

</section>
<section anchor="session-manager-responsibilities"><name>Session Manager Responsibilities</name>

<t>AGTP Session Managers in deployments using the Agent Certificate
Extension <strong>MUST</strong> maintain a per-certificate-serial active session
registry. On receiving a revocation NOTIFY, the Session Manager
<strong>MUST</strong> terminate all sessions associated with the revoked serial
before processing the next request on any affected session.</t>

</section>
</section>
<section anchor="agtp-certificate-transparency-log"><name>AGTP Certificate Transparency Log</name>

<section anchor="purpose"><name>Purpose</name>

<t>The AGTP Certificate Transparency Log (AGTP-CTL) is an append-only,
Merkle-tree-based log of all issued AGTP Agent Certificates. It
provides tamper-evident public accountability for certificate issuance
and revocation, enabling:</t>

<t><list style="symbols">
  <t>Fleet-level analytics: population-wide trust score distributions,
archetype frequencies, governance zone composition</t>
  <t>Anomaly detection: detection of certificates issued outside normal
governance flows</t>
  <t>Audit reconstruction: verifiable history of certificate issuance
and revocation for compliance</t>
</list></t>

</section>
<section anchor="log-structure"><name>Log Structure</name>

<t>The AGTP-CTL follows the Certificate Transparency log structure defined
in <xref target="RFC6962"/>, adapted for agent governance metadata. Each leaf entry
contains:</t>

<t><list style="symbols">
  <t>Certificate serial number</t>
  <t><spanx style="verb">subject-agent-id</spanx></t>
  <t><spanx style="verb">principal-id</spanx></t>
  <t><spanx style="verb">governance-zone</spanx></t>
  <t><spanx style="verb">trust-tier</spanx></t>
  <t><spanx style="verb">archetype</spanx></t>
  <t><spanx style="verb">activation-certificate-id</spanx></t>
  <t>Issuance timestamp</t>
  <t>Revocation status (updated on revocation)</t>
  <t>Merkle leaf hash</t>
</list></t>

<t>The leaf hash covers all governance metadata fields. Any modification
to a log entry is detectable by any party with access to the log.</t>

</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>The <spanx style="verb">principal-id</spanx> field in the AGTP-CTL leaf entries <strong>MAY</strong> be
pseudonymized to protect individual principal identity while
maintaining audit integrity. Pseudonymous principal IDs <strong>MUST</strong> be
resolvable by authorized parties (regulators, compliance auditors)
via a trusted resolution service. The pseudonymization mapping
<strong>MUST</strong> be maintained separately from the <em>*RECOMMENDED</em> public log.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="certificate-pinning"><name>Certificate Pinning</name>

<t>Deployments with strict security requirements <strong>MAY</strong> implement
certificate pinning for known agents, rejecting connections from agents
whose certificate serial or key does not match a pre-registered value.
Certificate pinning interacts with renewal; pinned agents <strong>MUST</strong>
update pins on each certificate renewal before the old certificate
expires.</t>

</section>
<section anchor="scope-commitment-forgery"><name>Scope Commitment Forgery</name>

<t>The <spanx style="verb">authority-scope-commitment</spanx> is an Ed25519 signature over the
canonical scope token set, signed by the governance platform's issuing
key. An attacker who compromises the issuing key can forge scope
commitments. Issuing key compromise <strong>MUST</strong> trigger immediate
revocation of all certificates issued by that key and issuance of
replacement certificates from a new key pair. Issuing keys <strong>SHOULD</strong>
be stored in hardware security modules.</t>

</section>
<section anchor="cross-certificate-confusion"><name>Cross-Certificate Confusion</name>

<t>An agent MAY hold multiple certificates (e.g., during renewal overlap).
Infrastructure <strong>MUST</strong> use the <spanx style="verb">subject-agent-id</spanx> extension value as
the authoritative agent identifier, not the certificate subject CN,
to prevent cross-certificate identity confusion during renewal windows.</t>

</section>
<section anchor="ipr-notice"><name>IPR Notice</name>

<t>Certain mechanisms described in this document may be subject to
pending patent applications by the author, specifically: the
authority-scope-commitment mechanism and the session-level revocation
propagation architecture. The licensor (Chris Hood / Nomotic, Inc.)
is prepared to grant a royalty-free license to implementers for any
patent claims covering these mechanisms, consistent with the IETF's
IPR framework under the normative reference in <xref target="AGTP"/> Section 8.7.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="x509-extension-oid-registrations"><name>X.509 Extension OID Registrations</name>

<t>This document requests registration of the following Object Identifiers
in the IANA Private Enterprise Numbers registry or an appropriate
OID arc for IETF use. Specific OID assignments are subject to IANA
allocation:</t>

<texttable title="AGTP Agent Certificate X.509 Extension OIDs">
      <ttcol align='left'>Extension</ttcol>
      <ttcol align='left'>OID (TBD)</ttcol>
      <ttcol align='left'>Critical</ttcol>
      <c>subject-agent-id</c>
      <c>TBD</c>
      <c>Yes</c>
      <c>principal-id</c>
      <c>TBD</c>
      <c>Yes</c>
      <c>authority-scope-commitment</c>
      <c>TBD</c>
      <c>Yes</c>
      <c>governance-zone</c>
      <c>TBD</c>
      <c>No</c>
      <c>trust-tier</c>
      <c>TBD</c>
      <c>No</c>
      <c>archetype</c>
      <c>TBD</c>
      <c>No</c>
      <c>activation-certificate-id</c>
      <c>TBD</c>
      <c>No</c>
      <c>agtp-ctl-sct</c>
      <c>TBD</c>
      <c>No</c>
</texttable>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC8555">
  <front>
    <title>Automatic Certificate Management Environment (ACME)</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
    <author fullname="D. McCarney" initials="D." surname="McCarney"/>
    <author fullname="J. Kasten" initials="J." surname="Kasten"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8555"/>
  <seriesInfo name="DOI" value="10.17487/RFC8555"/>
</reference>

<reference anchor="AGTP" >
  <front>
    <title>Agent Transfer Protocol (AGTP)</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-02"/>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC6962">
  <front>
    <title>Certificate Transparency</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="A. Langley" initials="A." surname="Langley"/>
    <author fullname="E. Kasper" initials="E." surname="Kasper"/>
    <date month="June" year="2013"/>
    <abstract>
      <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
      <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6962"/>
  <seriesInfo name="DOI" value="10.17487/RFC6962"/>
</reference>
<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>
<reference anchor="RFC6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>



    </references>

</references>


<?line 470?>

<section anchor="relationship-to-birth-certificate"><name>Relationship to Birth Certificate</name>

<t>The AGTP Agent Certificate and the Agent Birth Certificate (defined in
<xref target="AGTP"/> Section 6.7) are complementary but distinct:</t>

<texttable>
      <ttcol align='left'>Property</ttcol>
      <ttcol align='left'>Birth Certificate</ttcol>
      <ttcol align='left'>Agent Certificate</ttcol>
      <c>Layer</c>
      <c>Governance / registry</c>
      <c>Transport / TLS</c>
      <c>Format</c>
      <c>JSON document</c>
      <c>X.509 v3</c>
      <c>Issued by</c>
      <c>Governance platform</c>
      <c>Governance platform CA</c>
      <c>Lifetime</c>
      <c>Permanent (archived on revoke)</c>
      <c>90 days (renewable)</c>
      <c>Carries</c>
      <c>Full identity + archetype + scope</c>
      <c>Transport identity + scope commitment</c>
      <c>Purpose</c>
      <c>Genesis record, registry anchor</c>
      <c>TLS mutual auth, SEP enforcement</c>
      <c>Cross-reference</c>
      <c><spanx style="verb">certificate_hash</spanx></c>
      <c><spanx style="verb">activation-certificate-id</spanx></c>
</texttable>

<t>The <spanx style="verb">activation-certificate-id</spanx> field in the Agent Certificate contains
the Birth Certificate's <spanx style="verb">certificate_hash</spanx>, creating a verifiable
cross-layer link between the transport certificate and the governance
record without introducing a cryptographic dependency that would require
re-issuance of the Agent Certificate whenever the governance record is
updated.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

