<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-hood-independent-agtp-02" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="AGTP">Agent Transfer Protocol (AGTP)</title>

    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>

    <date year="2026" month="March" day="23"/>

    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword> <keyword>agentic systems</keyword> <keyword>protocol</keyword> <keyword>agent traffic</keyword> <keyword>agent transfer</keyword>

    <abstract>


<?line 104?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as Agent
Group Messaging Protocols (AGMP), including MCP, ACP, A2A, and ANP, are 
messaging-layer constructs that presuppose HTTP as their transport. 
They do not address the underlying transport problem.</t>

<t>This document defines the Agent Transfer Protocol (AGTP): a dedicated
application-layer protocol for AI agent traffic. AGTP provides agent-native
intent methods (QUERY, SUMMARIZE, BOOK, SCHEDULE, LEARN, DELEGATE,
COLLABORATE, CONFIRM, ESCALATE, NOTIFY, DESCRIBE, SUSPEND),
protocol-level agent identity and authority headers, and a status code
vocabulary designed for the conditions AI agent systems encounter. AGTP
SHOULD prefer QUIC for new implementations and MUST support TCP/TLS for
compatibility and fallback. It is designed to be composable with existing
agent frameworks, not to replace them. Version 02 introduces capability
discovery (DESCRIBE), resource budget signaling and enforcement, optional
RATS-aligned execution attestation, observability hooks, network zone
isolation, session suspension as a method, and normative composition
profiles with AGMP (Agent Group Messaging Protocols). Version 02 enables
dynamic capability negotiation and resource-aware governance.</t>



    </abstract>



  </front>

  <middle>


<?line 130?>

<section anchor="introduction"><name>Introduction</name>

<t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that extensions and certain mechanisms referenced in this
document -- including the Agent Certificate extension (Section 7.2),
the ACTIVATE method, the Agent Birth Certificate mechanism
(Section 5.7), and the <spanx style="verb">.agent</spanx> and <spanx style="verb">.nomo</spanx> file format
specifications (Section 2) -- may be subject to pending patent
applications by the author.  The core AGTP specification is intended
for open implementation without royalty obligation.  The licensor is
prepared to grant a royalty-free license to implementers consistent
with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>

<section anchor="background"><name>Background</name>

<t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows, querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals, with minimal or no human supervision per transaction.</t>

<t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>

</section>
<section anchor="limitations-of-http-for-agent-traffic"><name>Limitations of HTTP for Agent Traffic</name>

<t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP being stateless, resource-oriented,
human-initiated request/response, creates specific failures when applied
to agentic systems at scale:</t>

<t><list style="symbols">
  <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
  <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent, summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
  <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
  <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
</list></t>

</section>
<section anchor="why-not-evolve-http"><name>Why Not Evolve HTTP?</name>

<t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>

<t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully, a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>

<t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>

<t>Third, the observability goal making agent traffic distinguishable from
human traffic at the infrastructure layer cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>

<t>AGTP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and AGTP coexist: human traffic continues to flow over
HTTP; agent traffic flows over AGTP. The two protocols serve different
classes of network participant.</t>

<t>Note: The abbreviation AGTP is used in this document to distinguish
the Agent Transfer Protocol from the Authenticated Transfer Protocol
(ATP) working group currently chartered within the IETF. The URI
agtp:// is proposed for IANA registration as a new and distinct scheme.</t>

</section>
<section anchor="motivation-for-a-dedicated-protocol"><name>Motivation for a Dedicated Protocol</name>

<t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>

<t>AGTP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions AI systems encounter.</t>

</section>
<section anchor="scope-and-target-audience"><name>Scope and Target Audience</name>

<t>This document covers AGTP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>

<t>The Agent Certificate extension for cryptographic binding of agent
identity to AGTP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="AGTP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>

<t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>

</section>
<section anchor="agtp-as-the-transport-foundation-for-agent-group-messaging-protocols"><name>AGTP as the Transport Foundation for Agent Group Messaging Protocols</name>

<t>AGTP is the purpose-built transport and governance layer for Agent Group
Messaging Protocols (AGMPs): the category of higher-layer AI agent messaging
standards that includes the Model Context Protocol (MCP) <xref target="MCP"/>, the
Agent-to-Agent Protocol (A2A) <xref target="A2A"/>, the Agent Communication Protocol
(ACP) <xref target="ACP"/>, and emerging others.</t>

<t>AGMPs define what agents say. AGTP defines how those messages move, who
sent them, and under what authority. AGTP provides the narrow-waist
foundation that AGMPs inherit without modification: intent-native methods,
mandatory agent identity and scoping, resource budget enforcement,
observability hooks, and normative composition profiles. A deployment
running any AGMP over AGTP gains transport-level governance without changes
to the messaging layer.</t>

<t>The AGMP category term is introduced in this document to provide a stable
collective reference for the class of protocols that AGTP serves as
substrate. It is not a formal IETF term of art; it is a descriptive
classification. Individual AGMP specifications retain their own names and
development paths. AGTP does not govern, modify, or supersede any AGMP.</t>

<figure title="AGTP as Substrate for AGMPs" anchor="agmp-stack"><artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  AGMP Layer: MCP / A2A / ACP / ANP  [optional]      |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
  </dd>
  <dt>Principal:</dt>
  <dd>
    <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
  </dd>
  <dt>Agent-ID:</dt>
  <dd>
    <t>A unique identifier for a specific agent instance, present in all AGTP
request headers.</t>
  </dd>
  <dt>Principal-ID:</dt>
  <dd>
    <t>The identifier of the principal on whose behalf an agent operates.</t>
  </dd>
  <dt>Authority-Scope:</dt>
  <dd>
    <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format domain:action or domain:*.</t>
  </dd>
  <dt>Intent Method:</dt>
  <dd>
    <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
  </dd>
  <dt>Delegation Chain:</dt>
  <dd>
    <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
  </dd>
  <dt>Escalation:</dt>
  <dd>
    <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
  </dd>
  <dt>Attribution Record:</dt>
  <dd>
    <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
  </dd>
  <dt>Session:</dt>
  <dd>
    <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
  </dd>
  <dt>SEP (Scope-Enforcement Point):</dt>
  <dd>
    <t>An AGTP-aware infrastructure component, load balancer, gateway, and proxy,
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="AGTP-CERT"/>).</t>
  </dd>
  <dt>Agent Package (.agent):</dt>
  <dd>
    <t>A portable, open deployment artifact for an AI agent. An <spanx style="verb">.agent</spanx> file
contains an embedded Agent Manifest, an integrity hash covering all
package contents, and a behavioral trust score computed at packaging
time. The <spanx style="verb">.agent</spanx> format is an open specification. It is analogous to
a container image: a self-describing, portable unit of deployment. The
<spanx style="verb">.agent</spanx> suffix is a file format designator and <strong>MUST NOT</strong> appear as
a hostname component or top-level label in <spanx style="verb">agtp://</spanx> URIs. Note: the
<spanx style="verb">.agent</spanx> file format specification may be subject to pending patent
claims by the author; see Section 7.7.</t>
  </dd>
  <dt>Governed Agent Package (.nomo):</dt>
  <dd>
    <t>A deployment artifact in the <spanx style="verb">.nomo</spanx> format, which extends the <spanx style="verb">.agent</spanx>
format with a CA-signed certificate chain binding the package to a
verified governance zone and issuing principal. The <spanx style="verb">.nomo</spanx> format is
to <spanx style="verb">.agent</spanx> as HTTPS is to HTTP: the same structural foundation with
an added layer of cryptographic trust. A <spanx style="verb">.nomo</spanx> package is required
for agents operating at Trust Tier 1 (see Section 5.2). The <spanx style="verb">.nomo</spanx>
suffix is a file format designator and <strong>MUST NOT</strong> appear as a
hostname component in <spanx style="verb">agtp://</spanx> URIs.
</t>

    <t>The name derives from the Greek <em>nomos</em> (νόμος), meaning law, rule,
or governance, the same root that underlies <em>autonomy</em> (self-law),
<em>nomocracy</em> (rule of law), and <em>onomastics</em>. A <spanx style="verb">.nomo</spanx> package is
literally an agent operating under law: its behavior is bounded by a
cryptographically enforced governance context at the packaging layer.
Note: the <spanx style="verb">.nomo</spanx> file format specification may be subject to pending
patent claims by the author; see Section 7.7.</t>
  </dd>
  <dt>Agent Transfer Document (.agtp):</dt>
  <dd>
    <t>The wire-level manifest document format defined by this specification.
An <spanx style="verb">.agtp</spanx> document is a signed JSON structure containing the fields
defined in Section 5.5 (Agent Manifest Document). It is the output
format returned by all AGTP URI resolution requests. Both <spanx style="verb">.agent</spanx> and
<spanx style="verb">.nomo</spanx> packages produce <spanx style="verb">.agtp</spanx> documents when queried; the <spanx style="verb">.agtp</spanx>
format is the protocol's canonical representation of agent identity
and is independent of the underlying packaging format. The <spanx style="verb">.agtp</spanx>
suffix <strong>MAY</strong> appear in filenames for stored manifest documents but
<strong>MUST NOT</strong> appear in <spanx style="verb">agtp://</spanx> URIs. The Content-Type for <spanx style="verb">.agtp</spanx>
documents is <spanx style="verb">application/agtp+json</spanx>.</t>
  </dd>
  <dt>URI (AGTP):</dt>
  <dd>
    <t>An <spanx style="verb">agtp://</spanx> scheme URI that identifies an agent or agent namespace.
AGTP URIs are addresses, not filenames. File extensions (<spanx style="verb">.agent</spanx>,
<spanx style="verb">.nomo</spanx>, <spanx style="verb">.agtp</spanx>) <strong>MUST NOT</strong> appear in canonical AGTP URIs. See
Section 5.1 for the canonical URI forms and resolution semantics.</t>
  </dd>
  <dt>Agent Namespace Document:</dt>
  <dd>
    <t>A cryptographically signed <spanx style="verb">application/agtp+json</spanx> document returned
in response to a request targeting an organization's agent registry
root (e.g., <spanx style="verb">agtp://acme.tld/agents</spanx>). Lists all Active agents
registered under the organization's governance zone. The document is
generated and re-signed by the governance platform on any registry
change. It is not a manually editable file. See Section 5.4.</t>
  </dd>
  <dt>Agent Manifest Document:</dt>
  <dd>
    <t>A cryptographically signed <spanx style="verb">application/agtp+json</spanx> document returned
in response to a request targeting a specific agent
(e.g., <spanx style="verb">agtp://acme.tld/agents/customer-service</spanx>). Contains the
agent's birth certificate fields, lifecycle state, behavioral trust
score, authority scope categories, supported methods, and governance
zone. Derived directly from the agent's <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> package;
the package integrity hash is verified before the manifest is served.
See Section 5.5.</t>
  </dd>
  <dt>Agent Birth Certificate:</dt>
  <dd>
    <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The Birth Certificate is
the genesis record of an agent's existence: it establishes the agent's
identity, ownership, authorized scope, behavioral archetype, and
governance zone before the agent takes any action. Authority is issued
through the Birth Certificate; it is never self-assumed.
</t>

    <t>The Birth Certificate is the source document from which the Agent
Manifest Document (Section 5.5) is derived when an AGTP URI is
resolved. The <spanx style="verb">certificate_hash</spanx> field of the Birth Certificate is
the basis for the agent's canonical Agent-ID. In this sense the Birth
Certificate functions as the agent's social security number: issued
once at creation, permanently bound to the individual, and the
authoritative identity record from which all other identity
representations derive.</t>

    <t>Birth Certificate fields map directly to AGTP protocol headers:
<spanx style="verb">agent_id</spanx> maps to the <spanx style="verb">Agent-ID</spanx> header; <spanx style="verb">owner</spanx> maps to the
<spanx style="verb">Principal-ID</spanx> header; <spanx style="verb">scope</spanx> maps to the <spanx style="verb">Authority-Scope</spanx> header.
See Section 5.7.</t>

    <t>Anonymous agents are ungovernable. Without a Birth Certificate, there
is no mechanism to trace decisions to a responsible principal, enforce
scope boundaries, or maintain a meaningful audit trail. Note: the
Agent Birth Certificate mechanism may be subject to pending patent
claims by the author; see Section 7.7.</t>
  </dd>
  <dt>Governance Token:</dt>
  <dd>
    <t>A signed, time-limited JWT artifact issued by a governance runtime
that encodes a specific governance decision for a specific action.
Governance tokens are the runtime companion to the static Birth
Certificate: where the Birth Certificate establishes persistent
identity, the Governance Token carries a bounded authorization for a
single action or session. Tokens carry the governance verdict
(ALLOW, DENY), the agent ID, action details, trust score dimensions,
issuer identity, and expiry. Default TTL: 30 seconds. Tokens
<strong>MUST NOT</strong> be reused across actions; each action requires a fresh
evaluation and a fresh token.</t>
  </dd>
  <dt>Trust Tier:</dt>
  <dd>
    <t>A classification assigned to an agent based on the strength of
identity verification backing its registration. Tier 1 (Verified):
org anchor is a real DNS domain with confirmed ownership and a <spanx style="verb">.nomo</spanx>
governed package. Tier 2 (Org-Asserted): org label is present but
DNS ownership is unverified; <spanx style="verb">.agent</spanx> package acceptable. Tier 3
(Experimental): X- prefix required; not discoverable through the
public AGTP registry. See Section 5.2.</t>
  </dd>
  <dt>AGMP (Agent Group Messaging Protocol):</dt>
  <dd>
    <t>The collective term for higher-layer AI agent messaging standards
that operate over AGTP as their transport substrate, including
MCP <xref target="MCP"/>, A2A <xref target="A2A"/>, ACP <xref target="ACP"/>, and ANP <xref target="ANP"/>. AGMPs
define what agents say to each other. AGTP defines how those
messages move. The term is introduced in this document as a
descriptive classification; it is not a formal IETF term of art.</t>
  </dd>
  <dt>DESCRIBE:</dt>
  <dd>
    <t>An AGTP Tier 1 core method that returns the declared capabilities,
supported modalities, method vocabulary, and versioned feature set
of a specific agent endpoint. Distinguished from URI resolution
(which returns identity) by returning operational capability
metadata suitable for pre-task negotiation. If the
<spanx style="verb">capability_domains</spanx> parameter is omitted, the server <strong>SHOULD</strong>
return all supported domains. Category: ACQUIRE.</t>
  </dd>
  <dt>SUSPEND (method):</dt>
  <dd>
    <t>An AGTP Tier 1 core method that places a specific active session
workflow into a recoverable paused state, issuing a resumption
nonce for re-entry. Distinguished from the lifecycle SUSPEND event
(Section 6.7.6): method-level SUSPEND is session-scoped and does
not affect the agent's registry lifecycle state or Birth Certificate
validity. Category: ORCHESTRATE.</t>
  </dd>
  <dt>Budget-Limit:</dt>
  <dd>
    <t>A request header declaring the maximum resource consumption the
principal authorizes for a method invocation, expressed as
space-separated unit:value tokens drawn from the IANA AGTP Budget
Unit Registry. Example: <spanx style="verb">Budget-Limit: tokens=5000
compute-seconds=120 financial=10.00USD ttl=3600</spanx>. Exceeding the
declared limit <strong>MUST</strong> cause the server to return 452 Budget
Exceeded rather than continue execution. Note: ttl= is RECOMMENDED 
to bound budget lifetime.</t>
  </dd>
  <dt>AGTP-Zone-ID:</dt>
  <dd>
    <t>A request header declaring the network zone or organizational
boundary within which a request must be processed. Scope-Enforcement
Points (SEPs) <strong>MUST</strong> enforce zone boundaries and <strong>MUST</strong> return
453 Zone Violation if a DELEGATE or COLLABORATE request would route
outside the declared zone.</t>
  </dd>
</dl>

</section>
<section anchor="problem-statement"><name>Problem Statement</name>

<t>AGTP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>

<section anchor="problem-1-undifferentiated-agent-traffic-on-http"><name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>

<t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result,
operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>

<t>AGTP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>

</section>
<section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods"><name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>

<t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, BOOK a resource, and SCHEDULE a sequence,
all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>

<t>AGTP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>

</section>
<section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents"><name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>

<t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>

<t>AGTP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>

</section>
<section anchor="problem-summary"><name>Problem Summary</name>

<texttable title="Summary of Problems Addressed by AGTP">
      <ttcol align='left'>#</ttcol>
      <ttcol align='left'>Problem</ttcol>
      <ttcol align='left'>Current Failure</ttcol>
      <ttcol align='left'>AGTP Response</ttcol>
      <c>1</c>
      <c>Undifferentiated traffic</c>
      <c>HTTP cannot separate agent traffic</c>
      <c>Dedicated protocol environment</c>
      <c>2</c>
      <c>Semantic mismatch</c>
      <c>HTTP verbs obscure agent intent</c>
      <c>Native intent-based method vocabulary</c>
      <c>3</c>
      <c>No protocol-level identity</c>
      <c>Attribution is untraceable</c>
      <c>Agent identity and scope in headers</c>
</texttable>

</section>
</section>
<section anchor="related-work-and-existing-approaches"><name>Related Work and Existing Approaches</name>

<section anchor="httprest-as-the-de-facto-standard"><name>HTTP/REST as the De Facto Standard</name>

<t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>

</section>
<section anchor="existing-agent-group-messaging-protocols"><name>Existing Agent Group Messaging Protocols</name>

<dl>
  <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
  <dd>
    <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
  </dd>
  <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
  <dd>
    <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
  </dd>
  <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
  <dd>
    <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
  </dd>
  <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
  <dd>
    <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
  </dd>
</dl>

<t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>

</section>
<section anchor="transport-layer-alternatives"><name>Transport-Layer Alternatives</name>

<dl>
  <dt>gRPC:</dt>
  <dd>
    <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
  </dd>
  <dt>WebSockets:</dt>
  <dd>
    <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
  </dd>
  <dt>QUIC <xref target="RFC9000"/>:</dt>
  <dd>
    <t>Modern multiplexed transport with reduced connection overhead. AGTP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; AGTP is the application-layer protocol above it.</t>
  </dd>
</dl>

</section>
<section anchor="the-critical-distinction-messaging-vs-transport"><name>The Critical Distinction: Messaging vs. Transport</name>

<t>The most important positioning principle for AGTP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols, they define what agents say. AGTP defines how agent
traffic moves.</t>

<t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. AGTP defines the transport environment those messages move through.</t>

</section>
<section anchor="agtp-positioning-the-proposed-stack"><name>AGTP Positioning: The Proposed Stack</name>

<figure title="AGTP in the Protocol Stack" anchor="protocol-stack"><artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol     [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork></figure>

<t>AGTP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over AGTP and gain transport-level observability and
identity without modifying the messaging layer. AGTP-native agents that do
not use a separate messaging protocol interact with AGTP methods directly.</t>

</section>
</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<section anchor="stack-position"><name>Stack Position</name>

<t>AGTP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>

<t><list style="symbols">
  <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
  <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
  <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
</list></t>

<t>Suggested port assignment (subject to IANA assignment. See Section 8):</t>

<t><list style="symbols">
  <t>AGTP/QUIC: port 8443 (proposed)</t>
  <t>AGTP/TCP+TLS: port 8080 (proposed)</t>
</list></t>

</section>
<section anchor="design-principles"><name>Design Principles</name>

<dl>
  <dt>Minimalist core:</dt>
  <dd>
    <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
  </dd>
  <dt>Extensible by design:</dt>
  <dd>
    <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
  </dd>
  <dt>Agent-native:</dt>
  <dd>
    <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
  </dd>
  <dt>Secure by default:</dt>
  <dd>
    <t>TLS 1.3 or higher is mandatory. Unencrypted AGTP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
  </dd>
  <dt>Observable by design:</dt>
  <dd>
    <t>Native metadata in every AGTP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
  </dd>
  <dt>Composable:</dt>
  <dd>
    <t>AGTP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
  </dd>
</dl>

</section>
<section anchor="connection-model"><name>Connection Model</name>

<t>AGTP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An AGTP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>

<t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>

</section>
<section anchor="header-format"><name>Header Format</name>

<section anchor="request-headers"><name>Request Headers</name>

<texttable title="AGTP Request Header Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>AGTP-Version</c>
      <c><strong>MUST</strong></c>
      <c>Protocol version. Current: AGTP/1.0</c>
      <c>AGTP-Method</c>
      <c><strong>MUST</strong></c>
      <c>The agent intent method (see Section 6)</c>
      <c>Agent-ID</c>
      <c><strong>MUST</strong></c>
      <c>Opaque identifier for the requesting agent instance</c>
      <c>Principal-ID</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the human or system that authorized this agent</c>
      <c>Authority-Scope</c>
      <c><strong>MUST</strong></c>
      <c>Declared scope of actions this agent is authorized to take</c>
      <c>Session-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Identifies the current task/workflow context</c>
      <c>Task-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Unique identifier for this specific method invocation</c>
      <c>Delegation-Chain</c>
      <c><strong>MAY</strong></c>
      <c>Ordered list of Agent-IDs if this request was delegated</c>
      <c>Priority</c>
      <c><strong>MAY</strong></c>
      <c>Request priority hint: critical, normal, background</c>
      <c>TTL</c>
      <c><strong>MAY</strong></c>
      <c>Maximum acceptable response latency in milliseconds</c>
      <c>Budget-Limit</c>
      <c><strong>MAY</strong></c>
      <c>Max resource budget per invocation. Format: space-separated <spanx style="verb">unit=value</spanx> tokens. Units from IANA AGTP Budget Unit Registry.</c>
      <c>AGTP-Zone-ID</c>
      <c><strong>MAY</strong></c>
      <c>Network zone boundary constraint. SEPs <strong>MUST</strong> enforce; return 453 if DELEGATE or COLLABORATE would exit declared zone.</c>
      <c>Content-Schema</c>
      <c><strong>MAY</strong></c>
      <c>URI reference to JSON Schema describing the request body structure. Enables receivers to validate payload without LLM inference.</c>
      <c>Telemetry-Export</c>
      <c><strong>MAY</strong></c>
      <c>OTLP endpoint URI for metric export, or <spanx style="verb">inline</spanx> to receive metrics embedded in the response Attribution-Record.</c>
</texttable>

</section>
<section anchor="response-headers"><name>Response Headers</name>

<texttable title="AGTP Response Header Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>AGTP-Version</c>
      <c><strong>MUST</strong></c>
      <c>Protocol version</c>
      <c>AGTP-Status</c>
      <c><strong>MUST</strong></c>
      <c>Numeric status code (see Section 5.5)</c>
      <c>Task-ID</c>
      <c><strong>MUST</strong></c>
      <c>Echo of request Task-ID for correlation</c>
      <c>Server-Agent-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Identity of the responding server or agent</c>
      <c>Attribution-Record</c>
      <c><strong>SHOULD</strong></c>
      <c>Signed record of the action taken, for audit. <strong>MAY</strong> include RATS attestation evidence and inline telemetry when Telemetry-Export is set to <spanx style="verb">inline</spanx>.</c>
      <c>Continuation-Token</c>
      <c><strong>MAY</strong></c>
      <c>Token for retrieving additional results in streaming contexts</c>
      <c>Supported-Methods</c>
      <c><strong>SHOULD</strong> (on session open)</c>
      <c>List of AGTP methods supported by this server</c>
      <c>Cost-Estimate</c>
      <c><strong>MAY</strong></c>
      <c>Estimated resource consumption in Budget-Limit unit format. Returned by QUOTE; <strong>MAY</strong> appear on any response as an informational signal.</c>
      <c>Attestation-Evidence</c>
      <c><strong>MAY</strong></c>
      <c>RATS attestation evidence token or reference URI per <xref target="RFC9334"/>. Format indicated by <spanx style="verb">attestation_type</spanx> in response body: <spanx style="verb">rats-eat</spanx>, <spanx style="verb">rats-corim</spanx>, or <spanx style="verb">rats-uri</spanx>.</c>
</texttable>

</section>
</section>
<section anchor="status-codes"><name>Status Codes</name>

<t>AGTP defines its own status code space. Codes 451, 452, 453, 550, and 551
are AGTP-specific with no HTTP equivalent and are registered in the IANA
AGTP Status Code Registry (see Section 9.3).</t>

<texttable title="AGTP Status Codes">
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <c>200</c>
      <c>OK</c>
      <c>Method executed successfully</c>
      <c>202</c>
      <c>Accepted</c>
      <c>Method accepted; execution is asynchronous</c>
      <c>204</c>
      <c>No Content</c>
      <c>Method executed; no response body</c>
      <c>400</c>
      <c>Bad Request</c>
      <c>Malformed AGTP request</c>
      <c>401</c>
      <c>Unauthorized</c>
      <c>Agent-ID not recognized or not authenticated</c>
      <c>403</c>
      <c>Forbidden</c>
      <c>Agent lacks authority for requested action per Authority-Scope</c>
      <c>404</c>
      <c>Not Found</c>
      <c>Target resource or agent not found</c>
      <c>408</c>
      <c>Timeout</c>
      <c>TTL exceeded before method could execute</c>
      <c>409</c>
      <c>Conflict</c>
      <c>Method conflicts with current state (e.g., BOOK on unavailable resource)</c>
      <c>410</c>
      <c>Gone</c>
      <c>Agent has been Revoked or Deprecated; canonical ID is permanently retired</c>
      <c>422</c>
      <c>Unprocessable</c>
      <c>Request well-formed but semantically invalid</c>
      <c>429</c>
      <c>Rate Limited</c>
      <c>Agent is exceeding permitted request frequency</c>
      <c>451</c>
      <c>Scope Violation</c>
      <c>Requested action is outside declared Authority-Scope. AGTP-specific</c>
      <c>452</c>
      <c>Budget Exceeded</c>
      <c>Method execution would exceed the Budget-Limit declared in the request. AGTP-specific</c>
      <c>453</c>
      <c>Zone Violation</c>
      <c>Request would route outside the AGTP-Zone-ID boundary. SEP-enforced. AGTP-specific</c>
      <c>500</c>
      <c>Server Error</c>
      <c>Internal failure in the responding system</c>
      <c>503</c>
      <c>Unavailable</c>
      <c>Responding agent or system temporarily unavailable or Suspended</c>
      <c>550</c>
      <c>Delegation Failure</c>
      <c>A delegated sub-agent failed to complete the requested action. AGTP-specific</c>
      <c>551</c>
      <c>Authority Chain Broken</c>
      <c>Delegation chain contains an unverifiable or broken identity link. AGTP-specific</c>
</texttable>

<t>Status code 451 (Scope Violation) is a governance signal: the agent
attempted an action outside its declared Authority-Scope, caught at the
protocol level. Status code 452 (Budget Exceeded) is a governance signal
analogous to 451: the agent's requested action is within its Authority-Scope
but would consume resources beyond what the principal authorized for this
invocation. Status code 453 (Zone Violation) is returned by SEPs when a
DELEGATE or COLLABORATE request would route to an agent outside the declared
AGTP-Zone-ID boundary. Status code 551 (Authority Chain Broken) indicates
that one or more Agent-ID entries in the Delegation-Chain header cannot be
verified as part of a valid delegation sequence. Status code 410 (Gone)
is returned when an agent's Birth Certificate has been revoked or the agent
deprecated; the canonical Agent-ID is permanently retired and <strong>MUST NOT</strong>
be retried. All AGTP-specific status codes are operational signals, not
protocol errors, and <strong>MUST</strong> be logged for audit purposes.</t>

</section>
<section anchor="wire-format-and-content-type"><name>Wire Format and Content-Type</name>

<t>AGTP request and response bodies are encoded as JSON. The registered
Content-Type for AGTP message bodies is:</t>

<figure><artwork><![CDATA[
Content-Type: application/agtp+json
]]></artwork></figure>

<t>Implementations <strong>MUST</strong> include this Content-Type on all AGTP requests and
responses that carry a message body. Responses with no body (e.g., 204 No
Content) <strong>MUST NOT</strong> include a Content-Type header. Binary or streaming
extensions <strong>MAY</strong> define additional Content-Type values as part of their
companion specifications.</t>

<t>The common structure for all AGTP request bodies:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode></figure>

<t>And for all AGTP response bodies:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode></figure>

</section>
<section anchor="early-implementations"><name>Early Implementations</name>

<t>AGTP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>

<ul empty="true"><li>
  <t>If you are building an AGTP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
</li></ul>

<t>Implementers wishing to experiment before the formal IANA port assignment
may use port 8443 (AGTP/QUIC) and port 8080 (AGTP/TCP+TLS) as working
values. These values are subject to change upon final IANA assignment.</t>

<t>The ACTIVATE method extension, which binds <spanx style="verb">.nomo</spanx> governed agent packages
to AGTP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core AGTP
implementations need not support ACTIVATE to be compliant with this
specification.</t>

</section>
</section>
<section anchor="agent-identity-uri-structure-and-registration"><name>Agent Identity, URI Structure, and Registration</name>

<section anchor="uri-structure-and-resolution-mechanics"><name>URI Structure and Resolution Mechanics</name>

<section anchor="foundational-principle"><name>Foundational Principle</name>

<t>AGTP URIs are addresses, not filenames. File format suffixes
(<spanx style="verb">.agent</spanx>, <spanx style="verb">.nomo</spanx>, <spanx style="verb">.agtp</spanx>) <strong>MUST NOT</strong> appear in canonical
<spanx style="verb">agtp://</spanx> URIs. A URI resolves to an Agent Manifest Document or
Agent Namespace Document derived from the underlying package; it
does not expose or serve the package itself.</t>

<t>Implementations <strong>MUST</strong> treat any URI containing a file extension
in the path as non-canonical and <strong>SHOULD</strong> issue a 301 Moved
Permanently redirect to the canonical form prior to resolution.</t>

<t>The Canonical Agent-ID (256-bit cryptographic identifier) remains
the authoritative identifier in all AGTP protocol operations. Human-
readable URIs are aliases that resolve to a canonical identifier. In
the event of any conflict between a human-readable URI and a canonical
Agent-ID, the canonical Agent-ID <strong>MUST</strong> be treated as authoritative.</t>

</section>
<section anchor="canonical-uri-forms"><name>Canonical URI Forms</name>

<t>AGTP defines the following canonical URI forms:</t>

<figure><artwork><![CDATA[
Form 1. Canonical ID (cryptographic):
  agtp://[256-bit-hex-id]

Form 2. Domain-anchored agent (verified identity):
  agtp://[domain.tld]/agents/[agent-label]

Form 3. Subdomain-anchored agent (recommended enterprise pattern):
  agtp://agtp.[domain.tld]/agents/[agent-label]

Form 4. Organization namespace root:
  agtp://[domain.tld]/agents
  agtp://agtp.[domain.tld]/agents
]]></artwork></figure>

<t>The following URI forms are explicitly invalid and <strong>MUST</strong> return
<spanx style="verb">400 Bad Request</spanx> with error code <spanx style="verb">invalid-uri-form</spanx>:</t>

<figure><artwork><![CDATA[
agtp://[label].agent          (.agent as hostname TLD - prohibited)
agtp://[label].nomo           (.nomo as hostname TLD - prohibited)
agtp://[domain].[label].agent (hybrid dot-notation - prohibited)
agtp://[domain].[label].nomo  (hybrid dot-notation - prohibited)
]]></artwork></figure>

<t>Note: <spanx style="verb">.agent</spanx> is claimed as a Web3 top-level domain by at least one
blockchain naming system. URI forms that place <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx>
in the hostname position are prohibited both for collision avoidance
with Web3 naming systems and because they imply domain ownership
without enforcing it. See Section 5.6 for Web3 guidance.</t>

</section>
<section anchor="non-canonical-forms-and-redirect-behavior"><name>Non-Canonical Forms and Redirect Behavior</name>

<t>The following non-canonical forms <strong>SHOULD</strong> be redirected to their
canonical equivalents. Implementations <strong>MUST NOT</strong> serve package
contents in response to any URI form.</t>

<texttable title="Non-Canonical URI Forms and Redirect Targets">
      <ttcol align='left'>Received URI</ttcol>
      <ttcol align='left'>Canonical Redirect Target</ttcol>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service.agent</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service.nomo</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service.agtp</spanx></c>
      <c><spanx style="verb">agtp://acme.tld/agents/customer-service</spanx></c>
</texttable>

</section>
<section anchor="query-parameters-for-format-selection"><name>Query Parameters for Format Selection</name>

<t>All AGTP URI resolution requests accept an optional <spanx style="verb">format</spanx> query
parameter controlling the serialization of the returned document.</t>

<texttable title="AGTP URI Format Query Parameters">
      <ttcol align='left'>Query Parameter</ttcol>
      <ttcol align='left'>Returned Representation</ttcol>
      <c>(none)</c>
      <c>Agent Manifest Document, human-readable <spanx style="verb">application/agtp+json</spanx></c>
      <c><spanx style="verb">?format=manifest</spanx></c>
      <c>Agent Manifest Document, human-readable <spanx style="verb">application/agtp+json</spanx></c>
      <c><spanx style="verb">?format=json</spanx></c>
      <c>Agent Manifest Document, compact <spanx style="verb">application/agtp+json</spanx></c>
      <c><spanx style="verb">?format=certificate</spanx></c>
      <c>Birth certificate fields only, <spanx style="verb">application/agtp+json</spanx></c>
      <c><spanx style="verb">?format=status</spanx></c>
      <c>Lifecycle state and operational status only, <spanx style="verb">application/agtp+json</spanx></c>
</texttable>

<t>All format variants return signed <spanx style="verb">application/agtp+json</spanx> content.
The <spanx style="verb">?format=json</spanx> parameter is intended for programmatic consumers.
The default returns the full human-readable manifest suitable for
browser rendering by an AGTP-aware client.</t>

</section>
<section anchor="resolution-mechanics"><name>Resolution Mechanics</name>

<t>When an AGTP server receives a request targeting an agent URI, it
<strong>MUST</strong> perform the following steps in order:</t>

<t><list style="numbers" type="1">
  <t>Parse and validate the URI. If the URI is an invalid (prohibited)
form, return <spanx style="verb">400 Bad Request</spanx> with error code <spanx style="verb">invalid-uri-form</spanx>.</t>
  <t>Resolve the agent label to a canonical Agent-ID via the governance
platform's registry lookup. If no matching agent is found, return
<spanx style="verb">404 Not Found</spanx>.</t>
  <t>Verify the registry record lifecycle state. If the agent is
Suspended, return <spanx style="verb">503 Service Unavailable</spanx> with lifecycle state
in the response body. If the agent is Revoked or Deprecated,
return <spanx style="verb">410 Gone</spanx> with lifecycle state and revocation timestamp.</t>
  <t>Retrieve the agent's package (<spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx>) from the
package store.</t>
  <t><strong>Verify the package integrity hash before proceeding.</strong> If
integrity verification fails, return <spanx style="verb">500 Internal Error</spanx> with
error code <spanx style="verb">package-integrity-failure</spanx>. <strong>MUST</strong> be logged.</t>
  <t>Extract the embedded manifest from the verified package.</t>
  <t>Sign the manifest document using the governance platform's signing
key. Return the signed <spanx style="verb">application/agtp+json</spanx> document in the
format specified by the query parameter.</t>
</list></t>

<t>The package's executable content, code, logic, and any fields not
included in the manifest schema <strong>MUST NOT</strong> be returned at any
step. URI resolution exposes identity and status exclusively.</t>

</section>
<section anchor="domain-anchor-and-trust-tier-assignment"><name>Domain Anchor and Trust Tier Assignment</name>

<t>The org anchor in a domain-anchored URI (Form 2 or Form 3) <strong>MUST</strong>
be validated at registration time to determine the agent's Trust Tier.</t>

<dl>
  <dt><strong>Trust Tier 1 - Verified (DNS-anchored):</strong></dt>
  <dd>
    <t>The org domain is validated by DNS challenge at ACTIVATE time per
<xref target="RFC8555"/>. The governance platform <strong>MUST</strong> verify that the
registering party controls the DNS zone for the claimed domain before
issuing a Tier 1 Birth Certificate. Requires a <spanx style="verb">.nomo</spanx> governed
package.
</t>

    <t>Trust Tier 1 agents <strong>MUST</strong> have the following DNS record published
and verifiable at resolution time:</t>

    <figure><artwork><![CDATA[
_agtp.[domain.tld]. IN TXT "agtp-zone=[zone-id]; cert=[fp]"
]]></artwork></figure>
  </dd>
  <dt><strong>Trust Tier 2 - Org-Asserted:</strong></dt>
  <dd>
    <t>The org label is present in the URI but DNS ownership has not been
verified. An <spanx style="verb">.agent</spanx> package is acceptable. The Agent Manifest
Document for Tier 2 agents <strong>MUST</strong> include a prominent
<spanx style="verb">trust_tier: 2</spanx> field and a <spanx style="verb">trust_warning</spanx> field with value
<spanx style="verb">"org-label-unverified"</spanx>. AGTP-aware browsers and clients <strong>MUST</strong>
surface a visible trust indicator distinguishing Tier 2 from Tier 1.
</t>

    <t>Tier 2 agents <strong>MUST NOT</strong> be granted authority scopes above
<spanx style="verb">documents:query</spanx> and <spanx style="verb">knowledge:query</spanx> without AGTP-CERT
cryptographic identity binding.</t>
  </dd>
  <dt><strong>Trust Tier 3 - Experimental:</strong></dt>
  <dd>
    <t>Agent label uses the <spanx style="verb">X-</spanx> prefix. Not discoverable through the
public AGTP registry. For development and testing only.
Implementations <strong>MUST NOT</strong> deploy Tier 3 agents in production.</t>
  </dd>
</dl>

</section>
<section anchor="subdomain-deployment-pattern"><name>Subdomain Deployment Pattern</name>

<t>Organizations <strong>SHOULD</strong> deploy AGTP endpoints at a dedicated
subdomain following the pattern <spanx style="verb">agtp.[organization-domain.tld]</spanx>
(e.g., <spanx style="verb">agtp.acme.tld</spanx>). This is the recommended enterprise
deployment pattern: it provides clean separation between web and
agent infrastructure, allows independent certificate management for
the AGTP endpoint, and is consistent with service-specific subdomain
conventions. An organization with an AGTP subdomain <strong>SHOULD</strong> also
configure their primary domain to redirect AGTP requests:</t>

<figure><artwork><![CDATA[
agtp://acme.tld/agents/customer-service
  → 301 → agtp://agtp.acme.tld/agents/customer-service
]]></artwork></figure>

</section>
<section anchor="the-agents-reserved-path-prefix"><name>The /agents/ Reserved Path Prefix</name>

<t>The path prefix <spanx style="verb">/agents/</spanx> is reserved in all <spanx style="verb">agtp://</spanx> URIs for
agent namespace operations. Implementations <strong>MUST</strong> support this
prefix. The registry root at <spanx style="verb">/agents</spanx> (no trailing label) resolves
to the Agent Namespace Document (see Section 5.4).</t>

</section>
<section anchor="collision-prevention"><name>Collision Prevention</name>

<t><spanx style="verb">agtp://acme.tld/agents/customer-service</spanx> and
<spanx style="verb">agtp://chrishood.tld/agents/customer-service</spanx> are distinct and
non-colliding because the domain component is the trust root.
No two agents can share a canonical URI if their org domains differ.
Within a single org domain, the governance platform enforces
uniqueness of agent labels at registration time. Infrastructure
<strong>MUST</strong> use the canonical Agent-ID for all routing, logging, and
attribution operations. Human-readable URIs are a display and
discovery layer only.</t>

</section>
<section anchor="iana-considerations-for-the-agtp-uri-scheme"><name>IANA Considerations for the agtp:// URI Scheme</name>

<t>This document proposes registration of the <spanx style="verb">agtp://</spanx> URI scheme with
IANA per <xref target="RFC7595"/>. Registration template:</t>

<dl>
  <dt>URI scheme name:</dt>
  <dd>
    <t>agtp</t>
  </dd>
  <dt>Status:</dt>
  <dd>
    <t>Permanent</t>
  </dd>
  <dt>URI scheme syntax:</dt>
  <dd>
    <t><spanx style="verb">agtp://[canonical-agent-id]</spanx> or <spanx style="verb">agtp://[domain.tld]/agents/[label]</spanx></t>
  </dd>
  <dt>URI scheme semantics:</dt>
  <dd>
    <t>Identifies an AI agent or agent namespace operating over the Agent
Transfer Protocol. The canonical form uses a 256-bit hex-encoded
cryptographic identifier derived from the agent's Birth Certificate.
The domain-anchored form uses a verified or asserted organization
domain with a reserved <spanx style="verb">/agents/</spanx> path prefix.</t>
  </dd>
  <dt>Applications/protocols that use this URI scheme:</dt>
  <dd>
    <t>Agent Transfer Protocol (this document)</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>Domain-anchored URIs are the recommended human-readable form.
Implementations <strong>MUST</strong> accept canonical identifiers and <strong>SHOULD</strong>
support domain-anchored resolution. File extensions <strong>MUST NOT</strong>
appear in <spanx style="verb">agtp://</spanx> URIs.</t>
  </dd>
  <dt>Contact:</dt>
  <dd>
    <t>Chris Hood, chris@nomotic.ai</t>
  </dd>
  <dt>References:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>The <spanx style="verb">agtp://</spanx> URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>

</section>
</section>
<section anchor="trust-tier-summary"><name>Trust Tier Summary</name>

<texttable title="AGTP Trust Tier Summary">
      <ttcol align='left'>Trust Tier</ttcol>
      <ttcol align='left'>Verification</ttcol>
      <ttcol align='left'>Package Required</ttcol>
      <ttcol align='left'>DNS Record Required</ttcol>
      <ttcol align='left'>Registry Visible</ttcol>
      <c>1 - Verified</c>
      <c>DNS challenge per <xref target="RFC8555"/></c>
      <c><spanx style="verb">.nomo</spanx></c>
      <c>Yes (<spanx style="verb">_agtp</spanx> TXT)</c>
      <c>Yes</c>
      <c>2 - Org-Asserted</c>
      <c>None</c>
      <c><spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx></c>
      <c>No</c>
      <c>Yes (with warning)</c>
      <c>3 - Experimental</c>
      <c>None</c>
      <c>Any</c>
      <c>No</c>
      <c>No</c>
</texttable>

</section>
<section anchor="agent-namespace-document"><name>Agent Namespace Document</name>

<section anchor="purpose-and-scope"><name>Purpose and Scope</name>

<t>The Agent Namespace Document is the index of all Active agents
registered under an organization's governance zone. It is returned
in response to a request targeting the <spanx style="verb">/agents</spanx> path:</t>

<figure><artwork><![CDATA[
agtp://acme.tld/agents
agtp://agtp.acme.tld/agents
]]></artwork></figure>

<t>The Agent Namespace Document is not a manually editable file. It is
generated and cryptographically signed by the governance platform each
time the registry changes. Any Namespace Document that fails signature
verification <strong>MUST</strong> be rejected by the requesting party.</t>

</section>
<section anchor="document-schema"><name>Document Schema</name>

<figure title="Agent Namespace Document Schema"><sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-namespace",
  "schema_version": "1.0",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "generated_at": "2026-03-20T14:00:00Z",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  },
  "agents": [
    {
      "agent_label": "customer-service",
      "canonical_id": "3a9f2c1d8b7e4a6f...",
      "lifecycle_state": "Active",
      "trust_tier": 1,
      "cert_status": "Active",
      "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
      "activated_at": "2026-01-15T09:00:00Z",
      "last_updated": "2026-03-01T11:30:00Z"
    }
  ],
  "total_active": 1,
  "namespace_cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode></figure>

<t>The <spanx style="verb">agents</spanx> array <strong>MUST</strong> include only agents in Active lifecycle
state. Suspended, Revoked, and Deprecated agents <strong>MUST NOT</strong> appear
in the Namespace Document.</t>

</section>
<section anchor="integrity-and-freshness"><name>Integrity and Freshness</name>

<t>The Namespace Document <strong>MUST</strong> include a <spanx style="verb">generated_at</spanx> timestamp.
Implementations <strong>SHOULD</strong> treat Namespace Documents older than a
configurable freshness threshold (default: 300 seconds) as stale and
re-request. The governance platform <strong>MUST</strong> re-sign the Namespace
Document within 60 seconds of any registry change.</t>

<t>The signature covers the entire document including <spanx style="verb">generated_at</spanx>.
Replaying an older signed Namespace Document to conceal a revocation
event is a known attack vector; implementations <strong>MUST</strong> reject
Namespace Documents with a <spanx style="verb">generated_at</spanx> timestamp older than the
freshness threshold.</t>

</section>
</section>
<section anchor="agent-manifest-document-and-the-agtp-format"><name>Agent Manifest Document and the .agtp Format</name>

<section anchor="purpose-and-scope-1"><name>Purpose and Scope</name>

<t>The Agent Manifest Document is the protocol's canonical representation
of a specific agent's identity, status, and behavioral scope. It is
returned in response to any AGTP URI resolution request targeting a
specific agent:</t>

<figure><artwork><![CDATA[
agtp://acme.tld/agents/customer-service
agtp://acme.tld/agents/customer-service?format=json
agtp://acme.tld/agents/customer-service?format=manifest
]]></artwork></figure>

<t>The manifest is derived from the embedded manifest inside the agent's
<spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> package. It is not a separate file that can be
independently modified. The governance platform <strong>MUST</strong> verify the
package integrity hash before extracting and serving the manifest.</t>

</section>
<section anchor="the-three-document-formats-and-their-relationship"><name>The Three Document Formats and Their Relationship</name>

<figure title="Relationship Between AGTP File Formats" anchor="format-relationship"><artwork><![CDATA[
.agent   ──── open packaging format (patent pending, Chris Hood)
  │           Contains: manifest + integrity hash + behavioral
  │           trust score + executable content
  │
.nomo    ──── governed packaging format (patent pending, Chris Hood)
  │           Contains: .agent contents + CA-signed cert chain
  │           + governance zone binding
  │
  Both produce ↓ when queried via agtp:// URI
  │
.agtp    ──── wire-level manifest document (this spec)
              Contains: identity fields from manifest +
              lifecycle state + trust tier + behavioral scope
              Open format defined by AGTP specification
              Content-Type: application/agtp+json
]]></artwork></figure>

<t>The <spanx style="verb">.agtp</spanx> format is the protocol's own document type. It is what
gets transmitted over the wire. The <spanx style="verb">.agent</spanx> and <spanx style="verb">.nomo</spanx> formats are
what get deployed. An AGTP implementation is not required to understand
<spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> packaging internals; it is only required to
produce and consume <spanx style="verb">.agtp</spanx> manifest documents.</t>

<t>Additional packaging formats <strong>MAY</strong> be defined by third parties,
provided they can produce conformant <spanx style="verb">.agtp</spanx> manifest documents when
queried. Such formats <strong>MUST</strong> implement the integrity verification
requirement: the manifest <strong>MUST</strong> be derived from a verified package,
not from an independently stored or editable file.</t>

</section>
<section anchor="agent-manifest-document-schema"><name>Agent Manifest Document Schema</name>

<t>The following fields are <strong>REQUIRED</strong> in all Agent Manifest Documents:</t>

<figure title="Agent Manifest Document - Required Fields"><sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-manifest",
  "schema_version": "1.0",
  "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
  "canonical_id": "3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "trust_tier": 1,
  "package_format": "nomo",
  "package_integrity_hash": "sha256:[hash]",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "principal_org": "Acme Corporation",
  "activated_at": "2026-01-15T09:00:00Z",
  "behavioral_trust_score": 0.94,
  "authority_scope_categories": [
    "documents:query",
    "knowledge:query",
    "calendar:book",
    "escalation:route"
  ],
  "supported_methods": [
    "QUERY", "SUMMARIZE", "BOOK", "SCHEDULE",
    "ESCALATE", "NOTIFY", "CONFIRM"
  ],
  "job_description": "Handles customer service requests.",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode></figure>

<t>The following fields are <strong>RECOMMENDED</strong>:</t>

<figure title="Agent Manifest Document - Recommended Fields"><sourcecode type="json"><![CDATA[
{
  "version": "2.1.0",
  "last_updated": "2026-03-01T11:30:00Z",
  "escalation_policy": "route-to-human-on-scope-limit",
  "delegation_permitted": false,
  "max_delegation_depth": 0,
  "audit_log_uri": "agtp://agtp.acme.tld/audit/customer-service",
  "dns_anchor_record": "_agtp.acme.tld TXT agtp-zone=...",
  "cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode></figure>

<t>The following fields are <strong>REQUIRED</strong> when <spanx style="verb">trust_tier</spanx> is <spanx style="verb">2</spanx>:</t>

<figure title="Agent Manifest Document - Required Fields for Trust Tier 2"><sourcecode type="json"><![CDATA[
{
  "trust_warning": "org-label-unverified",
  "trust_tier_explanation": "Org label not DNS-verified."
}
]]></sourcecode></figure>

</section>
<section anchor="what-the-manifest-exposes-and-does-not-expose"><name>What the Manifest Exposes and Does Not Expose</name>

<t>The Agent Manifest Document <strong>MUST</strong> expose:</t>

<t><list style="symbols">
  <t>The agent's identity (canonical ID, label, org, governance zone)</t>
  <t>The agent's current operational status (lifecycle state)</t>
  <t>The agent's authority scope categories</t>
  <t>The agent's supported method vocabulary</t>
  <t>The agent's behavioral trust score</t>
  <t>The agent's birth certificate fields (activated_at, principal_org)</t>
  <t>The agent's trust tier and any associated trust warnings</t>
</list></t>

<t>The Agent Manifest Document <strong>MUST NOT</strong> expose:</t>

<t><list style="symbols">
  <t>Executable code, scripts, or logic</t>
  <t>Model weights or configurations</t>
  <t>Internal API keys or credentials</t>
  <t>Specific authority scope grant tokens</t>
  <t>Session history or prior action logs</t>
</list></t>

<t>No AGTP URI resolution path, including any query parameter
combination, <strong>MUST</strong> return package contents beyond the manifest
schema defined in this section.</t>

</section>
<section anchor="manifest-tamper-proofing"><name>Manifest Tamper-Proofing</name>

<t>The tamper-proof guarantee rests on two mechanisms:</t>

<t><list style="numbers" type="1">
  <t><strong>Package integrity hash:</strong> Any modification to the package or its
embedded manifest invalidates the hash. The governance platform
<strong>MUST</strong> verify this hash before extracting the manifest.</t>
  <t><strong>Document signature:</strong> The governance platform signs the extracted
manifest before serving it. The signature covers the full document
including the <spanx style="verb">package_integrity_hash</spanx> field, creating a verifiable
chain from the served document back to the registered package.</t>
</list></t>

<t>A manifest document that fails either verification step <strong>MUST</strong> be
rejected, <strong>MUST NOT</strong> be served, and the failure <strong>MUST</strong> be logged.</t>

</section>
</section>
<section anchor="browser-and-human-facing-interaction-model"><name>Browser and Human-Facing Interaction Model</name>

<section anchor="the-separation-of-discovery-and-execution"><name>The Separation of Discovery and Execution</name>

<figure title="AGTP URI Use by Audience" anchor="browser-separation"><artwork><![CDATA[
agtp:// URI in a browser
  │
  └─→ Returns Agent Manifest Document
        Human-readable view of identity and status
        Read-only. No execution. No code exposed.

agtp:// session initiated by an agent or AGTP client
  │
  └─→ Establishes authenticated AGTP session
        Method invocations (QUERY, BOOK, ESCALATE, etc.)
        Full protocol operation - not visible to browsers
]]></artwork></figure>

<t>The analogy to existing protocol conventions is direct. A <spanx style="verb">mailto:</spanx>
URI surfaces an address and hands off to a mail client; SMTP carries
the actual messages. Similarly, an <spanx style="verb">agtp://</spanx> URI surfaces identity
and status; AGTP carries agent traffic. Browsers do not become AGTP
clients by following an <spanx style="verb">agtp://</spanx> link.</t>

</section>
<section anchor="browser-behavior-for-agtp-uris"><name>Browser Behavior for agtp:// URIs</name>

<t>Browsers that encounter an <spanx style="verb">agtp://</spanx> URI <strong>SHOULD</strong> behave as follows:</t>

<t><list style="numbers" type="1">
  <t>If a registered AGTP client is present (OS protocol handler), hand
off the URI to that client.</t>
  <t>If the browser supports <spanx style="verb">agtp://</spanx> natively or via extension, render
the returned Agent Manifest Document as a structured human-readable
page. The rendered view <strong>MUST</strong> surface the trust tier indicator
prominently, following the visual convention established for TLS
trust in the browser chrome.</t>
  <t>If neither condition applies, the browser <strong>MAY</strong> fall back to a
gateway that translates between <spanx style="verb">https://</spanx> and <spanx style="verb">agtp://</spanx>. The
gateway <strong>MUST</strong> preserve all signature and trust tier fields.</t>
</list></t>

</section>
<section anchor="human-readable-manifest-view"><name>Human-Readable Manifest View</name>

<t>When an Agent Manifest Document is rendered for human consumption,
the following fields <strong>MUST</strong> be prominently displayed:</t>

<t><list style="symbols">
  <t>Agent label and org domain</t>
  <t>Trust tier indicator (visual distinction between Tier 1, 2, and 3)</t>
  <t>Lifecycle state (Active / Suspended / Revoked / Deprecated)</t>
  <t>Job description</t>
  <t>Principal organization</t>
  <t>Activation date</t>
  <t>Behavioral trust score</t>
  <t>Authority scope categories (in human-readable form)</t>
</list></t>

</section>
<section anchor="agtp-status-sub-resource"><name>AGTP Status Sub-Resource</name>

<t>Implementations <strong>SHOULD</strong> support a <spanx style="verb">status</spanx> sub-path:</t>

<figure><artwork><![CDATA[
agtp://acme.tld/agents/customer-service/status
]]></artwork></figure>

<figure title="AGTP Status Sub-Resource Response"><sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-status",
  "canonical_id": "3a9f2c1d8b7e4a6f...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "last_action_method": "QUERY",
  "last_action_timestamp": "2026-03-20T13:58:22Z",
  "active_session_count": 3,
  "pending_escalations": 0,
  "generated_at": "2026-03-20T14:00:00Z"
}
]]></sourcecode></figure>

<t>The <spanx style="verb">active_session_count</spanx> field <strong>SHOULD</strong> only be included if the
requester has appropriate observability permissions for the governance
zone.</t>

</section>
</section>
<section anchor="web3-interaction-considerations"><name>Web3 Interaction Considerations</name>

<section anchor="the-agent-tld-collision"><name>The .agent TLD Collision</name>

<t>The string <spanx style="verb">.agent</spanx> is claimed as a Web3 top-level domain by at least
one blockchain-based naming system. This creates an ambiguity risk:
a URI of the form <spanx style="verb">agtp://customer-service.agent</spanx> could be interpreted
as either an AGTP agent namespace or a Web3 name resolution request.
This specification explicitly prohibits <spanx style="verb">.agent</spanx> and <spanx style="verb">.nomo</spanx> from
appearing in the hostname position of <spanx style="verb">agtp://</spanx> URIs (see Section 5.1).</t>

</section>
<section anchor="web3-trust-anchors"><name>Web3 Trust Anchors</name>

<t>AGTP's default trust model is PKI-based: X.509 certificates, DNS
ownership verification, and CA-anchored identity. Web3 naming systems
provide an alternative identity model based on blockchain address
ownership. A full Web3 interoperability specification is out of scope
for this document. The following framework <strong>MAY</strong> be used by
implementations wishing to bridge Web3 and AGTP identity.</t>

<t>The <spanx style="verb">resolution_layer</spanx> field in the Agent Manifest Document declares
the identity anchoring mechanism used for the agent's registration:</t>

<texttable title="resolution_layer Field Values">
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <c><spanx style="verb">dns</spanx></c>
      <c>Standard DNS ownership verification (default)</c>
      <c><spanx style="verb">pki</spanx></c>
      <c>PKI certificate chain without DNS challenge</c>
      <c><spanx style="verb">web3-ens</spanx></c>
      <c>Ethereum Name Service</c>
      <c><spanx style="verb">web3-unstoppable</spanx></c>
      <c>Unstoppable Domains</c>
      <c><spanx style="verb">agtp-registry</spanx></c>
      <c>Direct registration with AGTP governance platform</c>
</texttable>

<t>Implementations that encounter a <spanx style="verb">resolution_layer</spanx> value of
<spanx style="verb">web3-ens</spanx> or <spanx style="verb">web3-unstoppable</spanx> <strong>MUST</strong> treat the agent as Trust
Tier 2 (Org-Asserted) unless a formal AGTP-Web3 Bridge specification
has been published and implemented. Full Web3 interoperability is
addressed in a future companion document <xref target="AGTP-WEB3"/>.</t>

</section>
</section>
<section anchor="agent-registration-process"><name>Agent Registration Process</name>

<section anchor="overview"><name>Overview</name>

<t>An agent cannot participate in AGTP until it has been issued an Agent
Birth Certificate by a governance platform and assigned a canonical
Agent-ID derived from that certificate. Canonical Agent-IDs are issued
through the ACTIVATE transaction; they are never self-declared.</t>

<t>The Birth Certificate is the genesis record of an agent's legal
existence within the AGTP ecosystem. Its relationship to the canonical
Agent-ID is analogous to the relationship between a government-issued
birth registration and a social security number: the birth event
produces a permanent, authoritative identity record, and a durable
identifier is derived from it. The identifier follows the agent for
its entire lifecycle, including after revocation. It is never reissued
to another agent.</t>

<t>Any AGTP infrastructure component <strong>MUST</strong> reject requests carrying
an Agent-ID that does not resolve to a Birth Certificate record in
an Active lifecycle state in a reachable registry.</t>

</section>
<section anchor="birth-certificate-contents"><name>Birth Certificate Contents</name>

<t>The Agent Birth Certificate is issued by the governance platform at
ACTIVATE time and contains the following fields:</t>

<texttable title="Agent Birth Certificate Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c><spanx style="verb">agent_id</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Unique identifier for the agent</c>
      <c><spanx style="verb">owner</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Human or team responsible for this agent</c>
      <c><spanx style="verb">archetype</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Behavioral category (see archetypes below)</c>
      <c><spanx style="verb">governance_zone</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Environment context (development, staging, production)</c>
      <c><spanx style="verb">scope</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Authorized action types</c>
      <c><spanx style="verb">issued_at</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Timestamp of issuance</c>
      <c><spanx style="verb">certificate_hash</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Cryptographic fingerprint - basis for canonical Agent-ID</c>
      <c><spanx style="verb">signature</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Signed with the org's governance key</c>
      <c><spanx style="verb">package_ref</spanx></c>
      <c><strong>SHOULD</strong></c>
      <c>Reference to the <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> package</c>
      <c><spanx style="verb">trust_tier</spanx></c>
      <c><strong>MUST</strong></c>
      <c>Registration tier (1, 2, or 3)</c>
      <c><spanx style="verb">org_domain</spanx></c>
      <c><strong>MUST</strong></c>
      <c>The verified or asserted org domain</c>
</texttable>

</section>
<section anchor="agent-archetypes"><name>Agent Archetypes</name>

<t>The <spanx style="verb">archetype</spanx> field classifies the agent's behavioral category.
Archetypes inform scope enforcement and observability tooling; an
<spanx style="verb">executor</spanx> archetype agent exhibiting read-only query patterns, or a
<spanx style="verb">monitor</spanx> archetype agent attempting booking operations, are anomaly
signals. The archetype field does not restrict scope enforcement, 
Authority-Scope headers govern actual permissions at the protocol
level. Archetypes are a classification and observability signal,
not a security boundary.</t>

<texttable title="Agent Archetypes">
      <ttcol align='left'>Archetype</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Typical Scope</ttcol>
      <c><spanx style="verb">assistant</spanx></c>
      <c>Conversational agent, read-heavy</c>
      <c><spanx style="verb">documents:query</spanx>, <spanx style="verb">knowledge:query</spanx></c>
      <c><spanx style="verb">analyst</spanx></c>
      <c>Data analysis, read and aggregate</c>
      <c><spanx style="verb">data:read</spanx>, <spanx style="verb">data:aggregate</spanx></c>
      <c><spanx style="verb">executor</spanx></c>
      <c>Takes real-world actions, write-heavy</c>
      <c><spanx style="verb">booking:*</spanx>, <spanx style="verb">payments:confirm</spanx></c>
      <c><spanx style="verb">orchestrator</spanx></c>
      <c>Manages other agents</c>
      <c><spanx style="verb">delegation:*</spanx>, <spanx style="verb">agents:*</spanx></c>
      <c><spanx style="verb">monitor</spanx></c>
      <c>Observational only</c>
      <c><spanx style="verb">telemetry:read</spanx>, <spanx style="verb">logs:read</spanx></c>
</texttable>

</section>
<section anchor="birth-certificate-to-agtp-header-mapping"><name>Birth Certificate to AGTP Header Mapping</name>

<t>Birth Certificate fields map directly to AGTP protocol headers on
every request. This mapping is the mechanism by which static identity
(the Birth Certificate) becomes runtime identity (the protocol session):</t>

<texttable title="Birth Certificate to AGTP Header Mapping">
      <ttcol align='left'>Birth Certificate Field</ttcol>
      <ttcol align='left'>AGTP Protocol Header</ttcol>
      <c><spanx style="verb">agent_id</spanx></c>
      <c><spanx style="verb">Agent-ID</spanx></c>
      <c><spanx style="verb">owner</spanx></c>
      <c><spanx style="verb">Principal-ID</spanx></c>
      <c><spanx style="verb">scope</spanx></c>
      <c><spanx style="verb">Authority-Scope</spanx></c>
      <c><spanx style="verb">certificate_hash</spanx></c>
      <c>Basis for canonical Agent-ID</c>
</texttable>

<t>The canonical Agent-ID is derived from the <spanx style="verb">certificate_hash</spanx>. This
chain, package integrity hash → certificate hash → canonical Agent-ID, 
ensures that the identifier carried in the <spanx style="verb">Agent-ID</spanx> header on
every AGTP request is traceable back to the original Birth Certificate
and the human principal who authorized the agent's creation.</t>

</section>
<section anchor="registration-tiers"><name>Registration Tiers</name>

<t><strong>Tier 1 Registration (Verified, DNS-anchored):</strong></t>

<t>Required for agents carrying <spanx style="verb">Authority-Scope</spanx> beyond read-only query
operations, or participating in delegation chains, financial
transactions, or multi-agent collaboration with external organizations.</t>

<dl>
  <dt>Requirements:</dt>
  <dd>
    <t><list style="symbols">
      <t>Registrant demonstrates DNS control over the claimed <spanx style="verb">org_domain</spanx>
via DNS challenge per <xref target="RFC8555"/></t>
      <t>Agent package must be in <spanx style="verb">.nomo</spanx> governed format</t>
      <t>Package must include a valid CA-signed certificate chain</t>
      <t>Governance platform issues Birth Certificate and canonical
Agent-ID after verifying DNS challenge and validating the
package cert chain</t>
    </list></t>
  </dd>
</dl>

<t><strong>Tier 2 Registration (Org-Asserted):</strong></t>

<t>For agents operating within a single organization's internal
infrastructure, or where DNS verification is not yet completed.</t>

<dl>
  <dt>Requirements:</dt>
  <dd>
    <t><list style="symbols">
      <t>Org label is declared but DNS ownership is not verified</t>
      <t>Agent package may be <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> format</t>
      <t>Governance platform issues Birth Certificate after validating
package integrity hash</t>
      <t>Birth Certificate and Manifest <strong>MUST</strong> include <spanx style="verb">trust_tier: 2</spanx>
and <spanx style="verb">trust_warning: "org-label-unverified"</spanx></t>
      <t>Authority scope <strong>MUST</strong> be restricted at the SEP layer until
upgraded to Tier 1</t>
    </list></t>
  </dd>
</dl>

<t><strong>Tier 3 Registration (Experimental):</strong></t>

<t>For development and testing environments only.</t>

<dl>
  <dt>Requirements:</dt>
  <dd>
    <t><list style="symbols">
      <t>Agent label <strong>MUST</strong> carry <spanx style="verb">X-</spanx> prefix</t>
      <t>Not published to the public AGTP registry</t>
      <t><strong>MUST NOT</strong> be deployed in production environments</t>
      <t>Governance platform issues a locally-scoped Birth Certificate</t>
    </list></t>
  </dd>
</dl>

</section>
<section anchor="registration-lifecycle"><name>Registration Lifecycle</name>

<figure title="AGTP Agent Registration Lifecycle" anchor="agent-reg-lifecycle"><artwork><![CDATA[
1. PACKAGE
   Author creates .agent or .nomo package containing:
   - Embedded manifest (agent_label, job_description,
     authority_scope_categories, supported_methods,
     behavioral_trust_score)
   - Integrity hash of all package contents
   - For .nomo: CA-signed certificate chain

2. SUBMIT (ACTIVATE transaction)
   Registrant submits ACTIVATE request to governance endpoint:
   - Package file (.agent or .nomo)
   - Proposed agent label and org domain
   - Owner identity (maps to Birth Certificate owner field)
   - Archetype declaration
   - For Tier 1: DNS challenge token

3. VALIDATE (governance platform)
   Governance platform:
   - Verifies package integrity hash
   - For .nomo: validates certificate chain
   - For Tier 1: verifies DNS challenge against
     _agtp.[org_domain] TXT record
   - Checks proposed label for uniqueness within org namespace

4. ISSUE (Birth Certificate and canonical Agent-ID assigned)
   Governance platform:
   - Issues Agent Birth Certificate with all fields populated
   - Derives canonical Agent-ID from certificate_hash
   - Creates registry record with Active lifecycle state
   - Records genesis audit entry in immutable audit log
     (genesis record includes full Birth Certificate)
   - Publishes agent to Namespace Document
     (triggers Namespace Document re-signing)

   The Birth Certificate is delivered to the registrant.
   It is the permanent record of the agent's genesis.
   Loss of the Birth Certificate does not invalidate the agent;
   the certificate_hash remains the authoritative identity anchor.

5. ACTIVE
   Agent enters Active lifecycle state.
   Canonical Agent-ID is valid for AGTP protocol sessions.
   agtp://[org_domain]/agents/[label] resolves to manifest
   derived from the Birth Certificate.

6. LIFECYCLE EVENTS (post-activation)
   SUSPEND:    Agent temporarily inactive. Manifest returns 503.
               Birth Certificate and canonical ID remain valid.
               Initiated by trust violation or human decision.
   REINSTATE:  Human-authorized return to Active state.
               Birth Certificate unchanged. Reinstatement
               recorded in audit trail.
   REVOKE:     Agent permanently deactivated. Manifest returns 410.
               Birth Certificate archived. Canonical ID retired
               permanently and never reissued.
   DEPRECATE:  Controlled end-of-life. Manifest returns 410 with
               successor_agent field if applicable. Birth
               Certificate retained per Section 8.5 retention policy.
]]></artwork></figure>

</section>
<section anchor="governance-tokens-and-runtime-authorization"><name>Governance Tokens and Runtime Authorization</name>

<t>Following successful registration, the agent's Birth Certificate is
the static identity anchor. Runtime authorization for specific actions
is carried by Governance Tokens: signed, time-limited JWT artifacts
issued by the governance platform encoding a specific governance
verdict (ALLOW, DENY) for a specific action.</t>

<t>Governance Tokens <strong>MUST NOT</strong> be reused. Each action requires a
fresh evaluation and a fresh token. Default TTL is 30 seconds. The
token's <spanx style="verb">agent_id</spanx> field <strong>MUST</strong> match the canonical Agent-ID from
the Birth Certificate. Tokens that fail this validation <strong>MUST</strong> be
rejected and the failure <strong>MUST</strong> be logged.</t>

<t>The relationship between Birth Certificate and Governance Token
parallels the relationship between a passport and a visa: the passport
establishes persistent identity; the visa encodes a specific
time-bounded permission. Holding a passport does not imply holding
any particular visa.</t>

</section>
<section anchor="friendly-name-availability-and-re-registration"><name>Friendly Name Availability and Re-Registration</name>

<t>An agent label becomes available for re-registration 90 days after
its associated agent enters Revoked or Deprecated lifecycle state.
The canonical Agent-ID and Birth Certificate are permanently archived.
The canonical Agent-ID <strong>MUST NOT</strong> be reissued under any
circumstances, including re-registration of the same label by the same
organization. This policy prevents ID reuse attacks in which a newly
registered agent inherits the trust history of a revoked predecessor.</t>

</section>
</section>
</section>
<section anchor="method-definitions"><name>Method Definitions</name>

<section anchor="design-philosophy"><name>Design Philosophy</name>

<t>AGTP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>

</section>
<section anchor="core-methods"><name>Core Methods</name>

<section anchor="query"><name>QUERY</name>

<t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location.</t>

<texttable title="QUERY Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>intent</c>
      <c><strong>MUST</strong></c>
      <c>Natural language or structured expression of the information need</c>
      <c>scope</c>
      <c><strong>SHOULD</strong></c>
      <c>Data domains or sources to include or exclude</c>
      <c>format</c>
      <c><strong>MAY</strong></c>
      <c>Desired response format: structured, natural, raw</c>
      <c>confidence_threshold</c>
      <c><strong>MAY</strong></c>
      <c>Minimum confidence score for included results (0.0-1.0)</c>
      <c>context</c>
      <c><strong>MAY</strong></c>
      <c>Session context for disambiguation</c>
</texttable>

<t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>

</section>
<section anchor="summarize"><name>SUMMARIZE</name>

<t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data.</t>

<texttable title="SUMMARIZE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>source</c>
      <c><strong>MUST</strong></c>
      <c>Content inline (up to implementation limit) or URI reference</c>
      <c>length</c>
      <c><strong>SHOULD</strong></c>
      <c>Target summary length: brief, standard, detailed</c>
      <c>focus</c>
      <c><strong>MAY</strong></c>
      <c>Aspect to emphasize in the summary</c>
      <c>format</c>
      <c><strong>MAY</strong></c>
      <c>Output format: bullets, prose, structured</c>
      <c>audience</c>
      <c><strong>MAY</strong></c>
      <c>Intended reader context, for calibrating complexity</c>
</texttable>

<t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>

</section>
<section anchor="book"><name>BOOK</name>

<t>Purpose: Reserve a resource, time slot, seat, or allocation on behalf of
the agent's principal. State-modifying. Notable error codes: 409 Conflict
(resource unavailable), 451 Scope Violation (principal not authorized for
this resource type).</t>

<texttable title="BOOK Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>resource_id</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the resource to reserve</c>
      <c>principal_id</c>
      <c><strong>MUST</strong></c>
      <c>The human or system on whose behalf the booking is made</c>
      <c>time_slot</c>
      <c><strong>MUST</strong> (if time-based)</c>
      <c>ISO 8601 datetime or range</c>
      <c>quantity</c>
      <c><strong>MAY</strong></c>
      <c>Number of units to reserve</c>
      <c>options</c>
      <c><strong>MAY</strong></c>
      <c>Resource-specific booking parameters</c>
      <c>confirm_immediately</c>
      <c><strong>MAY</strong></c>
      <c>Boolean; if false, creates a hold pending confirmation</c>
</texttable>

<t>Response: Booking confirmation with booking_id, status (confirmed / held),
and expiry timestamp if a hold. Idempotent: No.</t>

</section>
<section anchor="schedule"><name>SCHEDULE</name>

<t>Purpose: Define a sequence of actions, method calls, or events to be
executed at specified times or in response to specified triggers. Creates
a durable plan, not an immediate execution.</t>

<texttable title="SCHEDULE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>steps</c>
      <c><strong>MUST</strong></c>
      <c>Ordered list of AGTP method calls with parameters</c>
      <c>trigger</c>
      <c><strong>MUST</strong></c>
      <c>immediate, datetime, event, or condition</c>
      <c>trigger_value</c>
      <c><strong>MUST</strong> (if not immediate)</c>
      <c>Datetime, event name, or condition expression</c>
      <c>on_failure</c>
      <c><strong>SHOULD</strong></c>
      <c>Behavior on step failure: abort, skip, retry, escalate</c>
      <c>notify</c>
      <c><strong>MAY</strong></c>
      <c>Notification targets on completion or failure</c>
</texttable>

<t>Response: Schedule record with schedule_id, confirmed steps, and next
execution timestamp. Idempotent: No.</t>

</section>
<section anchor="learn"><name>LEARN</name>

<t>Purpose: Update the agent's session context, knowledge state, or persistent
memory. An explicit context write where the agent asserts that something should
be retained.</t>

<texttable title="LEARN Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>content</c>
      <c><strong>MUST</strong></c>
      <c>Information to be learned (structured or unstructured)</c>
      <c>scope</c>
      <c><strong>MUST</strong></c>
      <c>session (ephemeral), principal (persists for principal), global (shared)</c>
      <c>category</c>
      <c><strong>SHOULD</strong></c>
      <c>Semantic category for retrieval optimization</c>
      <c>confidence</c>
      <c><strong>MAY</strong></c>
      <c>Agent's confidence in the content (0.0-1.0)</c>
      <c>source</c>
      <c><strong>MAY</strong></c>
      <c>Provenance of the learned content</c>
      <c>ttl</c>
      <c><strong>MAY</strong></c>
      <c>Expiry for the learned content</c>
</texttable>

<t>Response: Confirmation with learn_id and effective scope. Idempotent: No.</t>

</section>
<section anchor="delegate"><name>DELEGATE</name>

<t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new AGTP session on behalf of the delegating
agent, carrying forward authority lineage.</t>

<texttable title="DELEGATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>target_agent_id</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the agent to delegate to</c>
      <c>task</c>
      <c><strong>MUST</strong></c>
      <c>AGTP method call (or sequence) to execute</c>
      <c>authority_scope</c>
      <c><strong>MUST</strong></c>
      <c>Scope granted to sub-agent <strong>MUST</strong> be a strict subset of delegating agent's scope</c>
      <c>delegation_token</c>
      <c><strong>MUST</strong></c>
      <c>Signed token proving delegation authority</c>
      <c>callback</c>
      <c><strong>SHOULD</strong></c>
      <c>AGTP endpoint for result delivery</c>
      <c>deadline</c>
      <c><strong>MAY</strong></c>
      <c>Maximum time for task completion</c>
</texttable>

<t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 451 Scope Violation if violated. This is the
protocol-level defense against authority laundering. Idempotent: No.</t>

</section>
<section anchor="collaborate"><name>COLLABORATE</name>

<t>Purpose: Initiate a multi-agent coordinated task where two or more agents
work in parallel or in defined roles toward a shared goal. Unlike DELEGATE
(hierarchical), COLLABORATE is peer-to-peer.</t>

<texttable title="COLLABORATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>collaborators</c>
      <c><strong>MUST</strong></c>
      <c>List of Agent-IDs invited to collaborate</c>
      <c>objective</c>
      <c><strong>MUST</strong></c>
      <c>Shared goal expressed as a task description or structured specification</c>
      <c>role_assignments</c>
      <c><strong>SHOULD</strong></c>
      <c>Map of Agent-IDs to roles within the collaboration</c>
      <c>coordination_model</c>
      <c><strong>SHOULD</strong></c>
      <c>parallel, sequential, or consensus</c>
      <c>result_aggregation</c>
      <c><strong>MAY</strong></c>
      <c>How results from collaborators are combined</c>
</texttable>

<t>Response: Collaboration session receipt with collaboration_id. Each
collaborator receives an AGTP NOTIFY to join. Idempotent: No.</t>

</section>
<section anchor="confirm"><name>CONFIRM</name>

<t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record.</t>

<texttable title="CONFIRM Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>target_id</c>
      <c><strong>MUST</strong></c>
      <c>ID of the action, booking, schedule, or item being confirmed</c>
      <c>status</c>
      <c><strong>MUST</strong></c>
      <c>accepted, rejected, or deferred</c>
      <c>reason</c>
      <c><strong>SHOULD</strong> (if rejected/deferred)</c>
      <c>Explanation of the decision</c>
      <c>attestation</c>
      <c><strong>MAY</strong></c>
      <c>Agent-signed confirmation payload for audit</c>
</texttable>

<t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>

</section>
<section anchor="escalate"><name>ESCALATE</name>

<t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems as a first-class method.</t>

<texttable title="ESCALATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>task_id</c>
      <c><strong>MUST</strong></c>
      <c>The task or method invocation triggering escalation</c>
      <c>reason</c>
      <c><strong>MUST</strong></c>
      <c>Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</c>
      <c>context</c>
      <c><strong>MUST</strong></c>
      <c>Full context needed for the escalation recipient to act</c>
      <c>priority</c>
      <c><strong>SHOULD</strong></c>
      <c>urgent, normal, or low</c>
      <c>recipient</c>
      <c><strong>MAY</strong></c>
      <c>Specific human or agent to escalate to; if absent, routes to default handler</c>
      <c>deadline</c>
      <c><strong>MAY</strong></c>
      <c>Time by which a response is needed</c>
</texttable>

<t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on AGTP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>

</section>
<section anchor="notify"><name>NOTIFY</name>

<t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient.</t>

<texttable title="NOTIFY Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>recipient</c>
      <c><strong>MUST</strong></c>
      <c>Target Agent-ID, human endpoint, or broadcast group</c>
      <c>content</c>
      <c><strong>MUST</strong></c>
      <c>Notification payload</c>
      <c>urgency</c>
      <c><strong>SHOULD</strong></c>
      <c>critical, informational, or background</c>
      <c>delivery_guarantee</c>
      <c><strong>MAY</strong></c>
      <c>at_most_once, at_least_once, or exactly_once</c>
      <c>expiry</c>
      <c><strong>MAY</strong></c>
      <c>Timestamp after which the notification should not be delivered</c>
</texttable>

<t>Response: Delivery receipt with notification_id. Idempotent: No.</t>

</section>
<section anchor="describe"><name>DESCRIBE</name>

<t>Purpose: Return the operational capabilities of a known agent endpoint.
The requesting agent specifies what capability dimensions it needs to
evaluate; the server returns a structured Capability Document. Used for
pre-task negotiation before committing to DELEGATE or COLLABORATE. If
<spanx style="verb">capability_domains</spanx> is omitted, the server <strong>SHOULD</strong> return all supported
domains. Category: ACQUIRE.</t>

<texttable title="DESCRIBE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>capability_domains</c>
      <c><strong>SHOULD</strong></c>
      <c>Comma-separated domains to return: <spanx style="verb">methods</spanx>, <spanx style="verb">modalities</spanx>, <spanx style="verb">tools</spanx>, <spanx style="verb">version</spanx>, <spanx style="verb">budget</spanx>, <spanx style="verb">zones</spanx>. If omitted, server <strong>SHOULD</strong> return all.</c>
      <c>version_min</c>
      <c><strong>MAY</strong></c>
      <c>Minimum acceptable version for capability negotiation.</c>
      <c>context</c>
      <c><strong>MAY</strong></c>
      <c>Session context for capability filtering.</c>
</texttable>

<t>Response: Capability Document with the following structure:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "supported_methods": ["QUERY", "SUMMARIZE", "DESCRIBE"],
  "modalities": ["text", "image", "streaming"],
  "tools": ["web_search", "code_execute"],
  "version": "2.0.0",
  "version_min_satisfied": true,
  "behavioral_trust_score": 0.94,
  "budget_units_accepted": ["tokens", "compute-seconds"],
  "zones_accepted": ["zone:internal", "zone:partner"]
}
]]></sourcecode></figure>

<t>Idempotent: Yes. Primary error codes: 404, 422.</t>

</section>
<section anchor="suspend"><name>SUSPEND</name>

<t>Purpose: Pause a specific active session workflow in a recoverable state.
Issues a resumption nonce the requesting agent uses to resume the session.
Method-level SUSPEND is session-scoped and does not affect registry
lifecycle state or Birth Certificate validity. The distinction between
method-level SUSPEND and lifecycle SUSPEND (Section 6.7.6) is
architectural: method-level SUSPEND is a workflow primitive; lifecycle
SUSPEND is an administrative action on the agent's registry record.
Category: ORCHESTRATE.</t>

<texttable title="SUSPEND Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>session_id</c>
      <c><strong>MUST</strong></c>
      <c>The session to suspend.</c>
      <c>reason</c>
      <c><strong>SHOULD</strong></c>
      <c>Structured reason: <spanx style="verb">awaiting_input</spanx>, <spanx style="verb">resource_limit</spanx>, <spanx style="verb">scheduled_pause</spanx>, <spanx style="verb">external_dependency</spanx>.</c>
      <c>resume_by</c>
      <c><strong>MAY</strong></c>
      <c>ISO 8601 deadline for resumption. If exceeded without RESUME, session transitions to expired.</c>
      <c>checkpoint</c>
      <c><strong>MAY</strong></c>
      <c>Agent-provided state snapshot for resumption context. Stored by server for duration of suspension.</c>
</texttable>

<t>Response: Suspension receipt with the following structure:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "suspension_id": "susp-0042",
  "session_id": "sess-a1b2c3d4",
  "resumption_nonce": "[128-bit random value, base64url]",
  "resume_by": "2026-04-15T09:00:00Z",
  "status": "suspended"
}
]]></sourcecode></figure>

<t>The <spanx style="verb">resumption_nonce</spanx> <strong>MUST</strong> be a cryptographically random 128-bit
value encoded as base64url. It is single-use: once presented to resume
a session, the nonce is invalidated and <strong>MUST NOT</strong> be accepted again.
Idempotent: No. Primary error codes: 404, 408.</t>

<t>Servers MUST generate nonces with at least 128 bits of entropy using 
a CSPRNG.</t>

</section>
</section>
<section anchor="method-summary-table"><name>Method Summary Table</name>

<texttable title="AGTP Core Method Summary">
      <ttcol align='left'>Method</ttcol>
      <ttcol align='left'>Intent</ttcol>
      <ttcol align='left'>State-Modifying</ttcol>
      <ttcol align='left'>Idempotent</ttcol>
      <ttcol align='left'>Primary Error Codes</ttcol>
      <c>QUERY</c>
      <c>Retrieve information</c>
      <c>No</c>
      <c>Yes</c>
      <c>404, 422</c>
      <c>SUMMARIZE</c>
      <c>Synthesize content</c>
      <c>No</c>
      <c>Yes</c>
      <c>400, 422</c>
      <c>BOOK</c>
      <c>Reserve a resource</c>
      <c>Yes</c>
      <c>No</c>
      <c>409, 451</c>
      <c>SCHEDULE</c>
      <c>Plan future actions</c>
      <c>Yes</c>
      <c>No</c>
      <c>400, 409</c>
      <c>LEARN</c>
      <c>Update agent context</c>
      <c>Yes</c>
      <c>No</c>
      <c>400, 403</c>
      <c>DELEGATE</c>
      <c>Transfer task to sub-agent</c>
      <c>Yes</c>
      <c>No</c>
      <c>403, 451, 551</c>
      <c>COLLABORATE</c>
      <c>Coordinate peer agents</c>
      <c>Yes</c>
      <c>No</c>
      <c>404, 403</c>
      <c>CONFIRM</c>
      <c>Attest to a prior action</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>404, 400</c>
      <c>ESCALATE</c>
      <c>Defer to human/authority</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>404</c>
      <c>NOTIFY</c>
      <c>Push information</c>
      <c>No</c>
      <c>No</c>
      <c>400, 404</c>
      <c>DESCRIBE</c>
      <c>Retrieve endpoint capabilities</c>
      <c>No</c>
      <c>Yes</c>
      <c>404, 422</c>
      <c>SUSPEND</c>
      <c>Pause session workflow</c>
      <c>Yes</c>
      <c>No</c>
      <c>404, 408</c>
</texttable>

</section>
<section anchor="method-registry-and-extensibility"><name>Method Registry and Extensibility</name>

<t>AGTP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification, at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>

<t><list style="numbers" type="1">
  <t>Have a unique uppercase ASCII name</t>
  <t>Define required and optional parameters</t>
  <t>Define expected response structure</t>
  <t>Specify idempotency behavior</t>
  <t>Specify applicable error codes</t>
  <t>Include a security considerations section</t>
  <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
</list></t>

<t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration.</t>

<t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>

<t>QUOTE is defined as a Tier 2 Standard Extended Method in <xref target="AGTP-METHODS"/>.
QUOTE provides pre-flight cost estimation for a proposed method invocation:
the requesting agent submits a proposed method call; the server returns a
<spanx style="verb">Cost-Estimate</spanx> response without executing the method. Servers supporting
budget negotiation via the <spanx style="verb">Budget-Limit</spanx> header <strong>SHOULD</strong> implement QUOTE
to enable agents to validate cost before committing to execution. Servers
that implement QUOTE <strong>MUST</strong> list it in the <spanx style="verb">Supported-Methods</spanx> response
header at session establishment.</t>

</section>
<section anchor="extended-method-vocabulary-and-industry-profiles"><name>Extended Method Vocabulary and Industry Profiles</name>

<section anchor="three-tier-method-architecture"><name>Three-Tier Method Architecture</name>

<t>The AGTP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance.</t>

<dl>
  <dt>Tier 1. Core Methods (defined in Section 6.2):</dt>
  <dd>
    <t>The baseline vocabulary required for AGTP compliance. Every conformant
AGTP implementation <strong>MUST</strong> support all Tier 1 methods.</t>
  </dd>
  <dt>Tier 2. Standard Extended Methods:</dt>
  <dd>
    <t>Registered in the IANA AGTP Method Registry and available for use in any
AGTP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Defined in <xref target="AGTP-METHODS"/>.</t>
  </dd>
  <dt>Tier 3. Industry Profile Methods:</dt>
  <dd>
    <t>Domain-specific method sets defined and registered by industry
communities as named AGTP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations.</t>
  </dd>
</dl>

</section>
<section anchor="method-category-taxonomy"><name>Method Category Taxonomy</name>

<t>All AGTP methods are organized into five categories:</t>

<dl>
  <dt>ACQUIRE:</dt>
  <dd>
    <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
  </dd>
  <dt>COMPUTE:</dt>
  <dd>
    <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
  </dd>
  <dt>TRANSACT:</dt>
  <dd>
    <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
  </dd>
  <dt>COMMUNICATE:</dt>
  <dd>
    <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
  </dd>
  <dt>ORCHESTRATE:</dt>
  <dd>
    <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
  </dd>
</dl>

<texttable title="Core Method Category Mapping">
      <ttcol align='left'>Core Method</ttcol>
      <ttcol align='left'>Category</ttcol>
      <c>QUERY</c>
      <c>Acquire</c>
      <c>SUMMARIZE</c>
      <c>Compute</c>
      <c>BOOK</c>
      <c>Transact</c>
      <c>SCHEDULE</c>
      <c>Orchestrate</c>
      <c>LEARN</c>
      <c>Compute</c>
      <c>DELEGATE</c>
      <c>Orchestrate</c>
      <c>COLLABORATE</c>
      <c>Orchestrate</c>
      <c>CONFIRM</c>
      <c>Transact</c>
      <c>ESCALATE</c>
      <c>Orchestrate</c>
      <c>NOTIFY</c>
      <c>Communicate</c>
      <c>DESCRIBE</c>
      <c>Acquire</c>
      <c>SUSPEND</c>
      <c>Orchestrate</c>
</texttable>

</section>
<section anchor="standard-extended-methods-tier-2"><name>Standard Extended Methods (Tier 2)</name>

<t>The following methods constitute the initial Tier 2 registration set,
defined in <xref target="AGTP-METHODS"/>. Listed here by category with brief semantic
definitions; full parameter specifications are in the companion document.</t>

<t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>

<t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>

<t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>

<t>COMMUNICATE category: REPLY, SEND, REPORT.</t>

<t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>

<t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 451 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>

</section>
<section anchor="short-form-and-industry-inspired-methods"><name>Short-Form and Industry-Inspired Methods</name>

<t>A set of short-form verb methods, e.g., SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK, are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>

<t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>

</section>
<section anchor="industry-profile-method-sets"><name>Industry Profile Method Sets</name>

<t>AGTP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named AGTP profiles. A profile is a published companion
specification that:</t>

<t><list style="numbers" type="1">
  <t>Declares a profile name (e.g., agtp-profile-healthcare,
agtp-profile-financial, agtp-profile-legaltech)</t>
  <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
  <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
  <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
</list></t>

<t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>

<t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>

<t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>

<t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>

<t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>

<t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA AGTP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>

</section>
<section anchor="registration-path-for-new-methods"><name>Registration Path for New Methods</name>

<dl>
  <dt>For Tier 2 Standard Methods:</dt>
  <dd>
    <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, and security considerations.</t>
  </dd>
  <dt>For Industry Profile Methods:</dt>
  <dd>
    <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established AGTP registry liaison) covering all
methods in the profile and profile compliance requirements.</t>
  </dd>
  <dt>For Experimental Methods:</dt>
  <dd>
    <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing the
registration process. Experimental method names do not reserve the
unprefixed name.</t>
  </dd>
</dl>

<t>The AGTP Method Registry is published at:
https://www.iana.org/assignments/agtp-methods/</t>

</section>
</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This section satisfies the mandatory IETF Security Considerations
requirement. All AGTP implementations <strong>MUST</strong> address the considerations
described here.</t>

<section anchor="mandatory-tls"><name>Mandatory TLS</name>

<t>All AGTP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>

</section>
<section anchor="agent-identity-headers-and-agent-certificate-extension"><name>Agent Identity Headers and Agent Certificate Extension</name>

<t>Every AGTP request <strong>MUST</strong> include Agent-ID and Principal-ID header fields.
In the base specification, these fields are not cryptographically
authenticated. They are self-asserted but logged mandatorily for
auditability. Implementations <strong>SHOULD</strong> use logging and anomaly detection
to identify inconsistencies.</t>

<t>Full cryptographic verification of agent identity and Authority-Scope is
provided by the AGTP Agent Certificate extension <xref target="AGTP-CERT"/>. That
extension binds Agent-ID, Principal-ID, and Authority-Scope to an X.509
v3 certificate presented during TLS mutual authentication, enabling
infrastructure-layer identity and scope verification without
application-layer access. Implementers planning deployments that require
verified agent identity <strong>SHOULD</strong> plan for the Agent Certificate
extension.</t>

<ul empty="true"><li>
  <t>Note: The Agent Certificate extension and the Agent Birth Certificate
mechanism may be subject to pending intellectual property claims.
See Section 7.7 and the IPR Notice preceding the Abstract for details.
The licensor is prepared to grant a royalty-free license to implementers.</t>
</li></ul>

<t>Every AGTP server <strong>MUST</strong> log Agent-ID and Principal-ID fields for every
request, creating an attributable audit trail even in deployments without
the Certificate extension.</t>

</section>
<section anchor="authority-scope-enforcement"><name>Authority Scope Enforcement</name>

<t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant AGTP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 451 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. Scope declarations
are self-asserted in the base spec, analogous to scope assertions in
OAuth 2.0 <xref target="RFC6749"/>. Cryptographically signed and infrastructure-enforced
scopes are defined in <xref target="AGTP-CERT"/>.</t>

</section>
<section anchor="threat-model"><name>Threat Model</name>

<section anchor="agent-spoofing"><name>Agent Spoofing</name>

<t>Threat: A malicious actor forges Agent-ID and Principal-ID headers to
impersonate a trusted agent. Base spec mitigation: mandatory logging and
anomaly detection. Full mitigation requires <xref target="AGTP-CERT"/>.</t>

</section>
<section anchor="authority-laundering"><name>Authority Laundering</name>

<t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 451 Scope Violation
returned and logged. In DELEGATE chains, each hop's scope <strong>MUST</strong> be a
strict subset of the delegating agent's scope.</t>

</section>
<section anchor="delegation-chain-poisoning"><name>Delegation Chain Poisoning</name>

<t>Threat: A malicious agent inserts itself into a DELEGATE chain. Mitigation:
Delegation-Chain headers are logged at each hop. 551 Authority Chain Broken
is returned if any chain entry is unverifiable. Full mitigation requires
<xref target="AGTP-CERT"/> for signed delegation tokens.</t>

</section>
<section anchor="denial-of-service-via-high-frequency-agent-traffic"><name>Denial of Service via High-Frequency Agent Traffic</name>

<t>Threat: Agents that are compromised, misconfigured, or adversarial generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID.
When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID quotas can be cryptographically
tied to verified identity, preventing quota evasion through Agent-ID
spoofing.</t>

</section>
<section anchor="session-hijacking"><name>Session Hijacking</name>

<t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>

</section>
<section anchor="escalation-suppression"><name>Escalation Suppression</name>

<t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>

</section>
<section anchor="birth-certificate-spoofing"><name>Birth Certificate Spoofing</name>

<t>Threat: A malicious actor fabricates a Birth Certificate to claim a
legitimate agent's identity or construct a false identity with elevated
trust. Mitigation: Birth Certificates are issued only by governance
platforms with verified ownership of the <spanx style="verb">org_domain</spanx>. In the base spec,
mandatory logging provides auditability. Full mitigation requires
<xref target="AGTP-CERT"/> for cryptographically bound Birth Certificate verification at
the transport layer. Governance platforms <strong>MUST</strong> treat any ACTIVATE
request that presents a certificate hash matching an existing registry
record as a collision attack and <strong>MUST</strong> reject it.</t>

</section>
<section anchor="domain-transfer-identity-hijacking"><name>Domain Transfer Identity Hijacking</name>

<t>Threat: An attacker acquires an expired domain to inherit the agent
registry and trust history of prior registrants. Mitigation: agents under
an expired domain are automatically Suspended within 24 hours of domain
expiry detection. A new owner of the domain <strong>MUST NOT</strong> inherit prior
agent registrations. See Section 9.6 for the full domain expiry policy.</t>

</section>
<section anchor="attribution-forgery"><name>Attribution Forgery</name>

<t>Threat: A malicious agent submits a fabricated or replayed
Attribution-Record to claim credit for an action it did not perform, or
to conceal the true execution context of an action it did perform.</t>

<t>Mitigation: Attribution-Records <strong>MUST</strong> be signed with the agent's
governance key. The signature <strong>MUST</strong> cover the full record including the
Task-ID, Agent-ID, method, timestamp, and result hash. When <xref target="AGTP-CERT"/>
is deployed, the signature is verified at the transport layer against the
agent's X.509 certificate. For high-stakes domains, RATS attestation
evidence in the Attribution-Record per <xref target="RFC9334"/> provides hardware-rooted
proof of execution context that cannot be forged without compromising the
attesting environment itself. Attribution-Record signatures <strong>MUST</strong> be
verified before the record is admitted to an audit trail. Unverified records
<strong>MUST</strong> be logged with a <spanx style="verb">signature_unverified</spanx> flag and <strong>MUST NOT</strong> be
treated as authoritative for compliance purposes.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>Agent identity headers carry information about agent behavior that may be
sensitive:</t>

<t><list style="symbols">
  <t>Agent-ID and Principal-ID together may reveal organizational structure</t>
  <t>Session-ID and Task-ID reveal workflow patterns</t>
  <t>Delegation-Chain reveals multi-agent architecture</t>
</list></t>

<t>AGTP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>

<t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
The architecture for pseudonymous agent identity resolution is reserved
for a future companion document.</t>

</section>
<section anchor="denial-of-service-considerations"><name>Denial-of-Service Considerations</name>

<t>AGTP's agent identity headers provide a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate limiting
<strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID in addition to
per-IP-address controls.</t>

<t>When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="AGTP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>

<t>Additional recommended mitigations: Priority header enforcement (Priority:
background requests <strong>SHOULD</strong> have lower rate limit headroom than
Priority: critical); per-governance-zone aggregate limits in multi-tenant
deployments; and circuit breaker patterns for ESCALATE request floods.</t>

</section>
<section anchor="intellectual-property-considerations"><name>Intellectual Property Considerations</name>

<t>The core AGTP specification, including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document, is intended for open implementation without royalty obligation.</t>

<t>Certain elements referenced in this document may be subject to pending
patent applications by the author, specifically:</t>

<t><list style="symbols">
  <t>The Agent Certificate extension <xref target="AGTP-CERT"/>, which provides
cryptographic binding of agent identity and authority scope to AGTP
header fields.</t>
  <t>The ACTIVATE method, which provides AGTP-native transmission and
activation of governed agent packages.</t>
  <t>The Agent Birth Certificate mechanism (Section 5.7), which provides
the genesis identity record and canonical Agent-ID derivation
process for AGTP-registered agents.</t>
  <t>The <spanx style="verb">.agent</spanx> file format specification, an open packaging format
for AI agents.</t>
  <t>The <spanx style="verb">.nomo</spanx> file format specification, a governed packaging format
for AI agents with cryptographic governance binding.</t>
</list></t>

<t>Implementers of the core AGTP specification are not affected by any
intellectual property claims on these extensions and associated formats.</t>

<t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>

<t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests the following IANA actions upon advancement to
RFC status.</t>

<section anchor="port-assignment"><name>Port Assignment</name>

<t>Registration of the following service names in the IANA Service Name and
Transport Protocol Port Number Registry:</t>

<texttable title="Proposed Port Assignments">
      <ttcol align='left'>Service Name</ttcol>
      <ttcol align='left'>Port</ttcol>
      <ttcol align='left'>Transport</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>agtp</c>
      <c>TBD</c>
      <c>TCP</c>
      <c>Agent Transfer Protocol over TCP/TLS</c>
      <c>agtp-quic</c>
      <c>TBD</c>
      <c>UDP</c>
      <c>Agent Transfer Protocol over QUIC</c>
</texttable>

</section>
<section anchor="agtp-method-registry"><name>AGTP Method Registry</name>

<t>Establishment of a new IANA registry: Agent Transfer Protocol Methods.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Methods</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each
registration be accompanied by a published specification, at minimum a
publicly available Internet-Draft or equivalent document. The Designated
Expert <strong>SHOULD</strong> verify that the proposed method name is unique, the
reference specification is publicly accessible, and the method definition
includes the required fields (parameters, response structure, idempotency,
error codes, security considerations).</t>
  </dd>
  <dt>Reference:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>Initial registrations:</t>

<texttable title="Initial AGTP Method Registry Entries">
      <ttcol align='left'>Method</ttcol>
      <ttcol align='left'>Status</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>QUERY</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>SUMMARIZE</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>BOOK</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>SCHEDULE</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>LEARN</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>DELEGATE</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>COLLABORATE</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>CONFIRM</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>ESCALATE</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>NOTIFY</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>DESCRIBE</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
      <c>SUSPEND</c>
      <c>Permanent</c>
      <c>This document, Section 7.2</c>
</texttable>

</section>
<section anchor="agtp-status-code-registry"><name>AGTP Status Code Registry</name>

<t>Establishment of a new IANA registry: Agent Transfer Protocol Status Codes.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Status Codes</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review + published specification required.</t>
  </dd>
</dl>

<t>The following AGTP-specific status codes are registered with full
definitions:</t>

<texttable title="AGTP-Specific Status Code Definitions">
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Definition</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>451</c>
      <c>Scope Violation</c>
      <c>The requested action is outside the Authority-Scope declared in the request headers. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its Authority-Scope declaration. This is a governance signal, not a protocol error.</c>
      <c>This document, Section 5.5</c>
      <c>452</c>
      <c>Budget Exceeded</c>
      <c>The requested method execution would exceed the resource limits declared in the Budget-Limit request header. The agent <strong>MUST NOT</strong> retry without modifying the Budget-Limit or reducing request scope. This is a governance signal, not a protocol error. <strong>MUST</strong> be logged.</c>
      <c>This document, Section 5.5</c>
      <c>453</c>
      <c>Zone Violation</c>
      <c>The request would route outside the network boundary declared in the AGTP-Zone-ID header. SEP-enforced. The agent <strong>MUST NOT</strong> retry without modifying the AGTP-Zone-ID or obtaining explicit cross-zone authorization. <strong>MUST</strong> be logged.</c>
      <c>This document, Section 5.5</c>
      <c>550</c>
      <c>Delegation Failure</c>
      <c>A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</c>
      <c>This document, Section 5.5</c>
      <c>551</c>
      <c>Authority Chain Broken</c>
      <c>One or more entries in the Delegation-Chain header cannot be verified as part of a valid and continuous delegation sequence. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</c>
      <c>This document, Section 5.5</c>
</texttable>

</section>
<section anchor="header-field-registry"><name>Header Field Registry</name>

<t>AGTP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Header Fields</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review + published specification required.</t>
  </dd>
</dl>

<t>AGTP does not reuse the HTTP Field Name Registry, as AGTP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in AGTP, and AGTP
header fields are not valid HTTP fields.</t>

<t>Initial registrations (all Permanent): AGTP-Version, AGTP-Method, AGTP-Status,
Agent-ID, Principal-ID, Authority-Scope, Session-ID, Task-ID,
Delegation-Chain, Priority, TTL, Server-Agent-ID, Attribution-Record,
Continuation-Token, Supported-Methods, Budget-Limit, AGTP-Zone-ID,
Content-Schema, Telemetry-Export, Cost-Estimate, Attestation-Evidence.</t>

</section>
<section anchor="uri-scheme-registration"><name>URI Scheme Registration</name>

<t>Registration of the agtp:// URI scheme per <xref target="RFC7595"/>, as described in
Section 5.1.8 of this document.</t>

</section>
<section anchor="agtp-budget-unit-registry"><name>AGTP Budget Unit Registry</name>

<t>Establishment of a new IANA sub-registry: Agent Transfer Protocol Budget
Units.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Budget Units</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review per <xref target="RFC8126"/>. New unit registrations <strong>MUST</strong> define:
unit name (lowercase ASCII, no spaces or special characters), semantic
description, value format (integer or decimal), whether fractional values
are permitted, and a reference specification. Units representing financial
denominations <strong>MUST</strong> specify the currency and <strong>MUST</strong> define precision
(decimal places). The Designated Expert <strong>SHOULD</strong> verify that the proposed
unit does not duplicate an existing registration and that the value format
is unambiguous.</t>
  </dd>
  <dt>Reference:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>Initial registrations:</t>

<texttable title="Initial AGTP Budget Unit Registry Entries">
      <ttcol align='left'>Unit</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Value Format</ttcol>
      <ttcol align='left'>Fractional</ttcol>
      <c>tokens</c>
      <c>Language model token consumption</c>
      <c>Integer</c>
      <c>No</c>
      <c>compute-seconds</c>
      <c>CPU/GPU compute time in seconds</c>
      <c>Decimal</c>
      <c>Yes</c>
      <c>USD</c>
      <c>US Dollar financial limit</c>
      <c>Decimal, 2 places</c>
      <c>Yes</c>
      <c>EUR</c>
      <c>Euro financial limit</c>
      <c>Decimal, 2 places</c>
      <c>Yes</c>
      <c>GBP</c>
      <c>Pound Sterling financial limit</c>
      <c>Decimal, 2 places</c>
      <c>Yes</c>
      <c>calls</c>
      <c>Downstream API call count</c>
      <c>Integer</c>
      <c>No</c>
</texttable>

</section>
<section anchor="agent-registry-retention-policy"><name>Agent Registry Retention Policy</name>

<t>The AGTP registry <strong>MUST</strong> retain records for all registered agents
regardless of lifecycle state. The following minimum retention periods apply:</t>

<texttable title="AGTP Registry Minimum Retention Periods">
      <ttcol align='left'>Lifecycle State</ttcol>
      <ttcol align='left'>Minimum Retention Period</ttcol>
      <c>Active</c>
      <c>Duration of Active state + 7 years</c>
      <c>Suspended</c>
      <c>Duration of Suspended state + 7 years</c>
      <c>Revoked</c>
      <c>10 years from revocation date</c>
      <c>Deprecated</c>
      <c>7 years from deprecation date</c>
</texttable>

<t>The 7-year minimum reflects common enterprise compliance requirements
(SOX, GDPR audit trails, HIPAA). Governance platform operators in regulated
industries <strong>SHOULD</strong> extend these minimums to match applicable regulatory
requirements.</t>

<t>The retained record for a Revoked or Deprecated agent <strong>MUST</strong> include:</t>

<t><list style="symbols">
  <t>Canonical Agent-ID (permanently retired, not reissued)</t>
  <t>Agent label and org domain at time of registration</t>
  <t>Trust tier at time of registration</t>
  <t>Activation date and activating principal</t>
  <t>Revocation or deprecation date, initiating principal, and reason code</t>
  <t>Genesis audit record hash (pointer to immutable audit log)</t>
  <t>Full Birth Certificate (archived, not publicly accessible)</t>
  <t>All lifecycle state transitions with timestamps</t>
</list></t>

<t>The retained record <strong>MUST NOT</strong> contain package executable contents,
active session data, or Authority-Scope grant tokens.</t>

<section anchor="domain-name-expiry-interaction"><name>Domain Name Expiry Interaction</name>

<t>If an organization's <spanx style="verb">org_domain</spanx> expires or transfers to a new owner:</t>

<t><list style="numbers" type="1">
  <t>All Active agents registered under the expired domain <strong>MUST</strong> be
automatically Suspended within 24 hours of domain expiry detection.</t>
  <t>The governance platform <strong>MUST</strong> notify the registered principal
contact before suspension takes effect, with a minimum notice period
of 30 days if domain expiry was predictable.</t>
  <t>Suspended agents under an expired domain transition to Deprecated
state after 90 days if the domain has not been renewed.</t>
  <t>A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. New ACTIVATE transactions are required.</t>
</list></t>

<t>This policy prevents domain-transfer-based identity hijacking in which
an attacker acquires an expired domain to claim the trust history of
agents that operated under it.</t>

</section>
</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>
<reference anchor="RFC9001">
  <front>
    <title>Using TLS to Secure QUIC</title>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9001"/>
  <seriesInfo name="DOI" value="10.17487/RFC9001"/>
</reference>
<reference anchor="RFC9110">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>
<reference anchor="RFC8179">
  <front>
    <title>Intellectual Property Rights in IETF Technology</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <author fullname="J. Contreras" initials="J." surname="Contreras"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="79"/>
  <seriesInfo name="RFC" value="8179"/>
  <seriesInfo name="DOI" value="10.17487/RFC8179"/>
</reference>
<reference anchor="RFC8555">
  <front>
    <title>Automatic Certificate Management Environment (ACME)</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
    <author fullname="D. McCarney" initials="D." surname="McCarney"/>
    <author fullname="J. Kasten" initials="J." surname="Kasten"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8555"/>
  <seriesInfo name="DOI" value="10.17487/RFC8555"/>
</reference>
<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9114">
  <front>
    <title>HTTP/3</title>
    <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9114"/>
  <seriesInfo name="DOI" value="10.17487/RFC9114"/>
</reference>
<reference anchor="RFC7540">
  <front>
    <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
    <author fullname="M. Belshe" initials="M." surname="Belshe"/>
    <author fullname="R. Peon" initials="R." surname="Peon"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
      <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7540"/>
  <seriesInfo name="DOI" value="10.17487/RFC7540"/>
</reference>
<reference anchor="RFC6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>
<reference anchor="RFC7595">
  <front>
    <title>Guidelines and Registration Procedures for URI Schemes</title>
    <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <author fullname="T. Hardie" initials="T." surname="Hardie"/>
    <date month="June" year="2015"/>
    <abstract>
      <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="35"/>
  <seriesInfo name="RFC" value="7595"/>
  <seriesInfo name="DOI" value="10.17487/RFC7595"/>
</reference>

<reference anchor="A2A" target="https://a2aprotocol.ai">
  <front>
    <title>Agent-to-Agent Protocol Specification</title>
    <author >
      <organization>Linux Foundation</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="ACP" >
  <front>
    <title>Agent Communication Protocol</title>
    <author >
      <organization>IBM Research</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="MCP" target="https://modelcontextprotocol.io">
  <front>
    <title>Model Context Protocol</title>
    <author >
      <organization>Anthropic</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="ANP" >
  <front>
    <title>Agent Network Protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="AGTP-CERT" >
  <front>
    <title>AGTP Agent Certificate Extension</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
</reference>
<reference anchor="AGTP-METHODS" >
  <front>
    <title>AGTP Standard Extended Method Vocabulary</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-00"/>
</reference>
<reference anchor="AGTP-WEB3" >
  <front>
    <title>AGTP Web3 Bridge Specification</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
</reference>
<reference anchor="AGTP-DISCOVER" >
  <front>
    <title>AGTP Agent Discovery and Name Service</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
</reference>
<reference anchor="AGTP-COMPOSITION" >
  <front>
    <title>AGTP Composition with Agent Group Messaging Protocols</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-composition-00"/>
</reference>


    </references>

</references>


<?line 2524?>

<section anchor="authority-scope-format"><name>Authority-Scope Format</name>

<t>Authority-Scope values are expressed as a space-separated list of scope
tokens following the pattern: [domain]:[action] or [domain]:* for
full domain access. Tokens <strong>MUST</strong> be lowercase ASCII with a single colon
separator.</t>

<t>Examples:</t>

<figure><artwork><![CDATA[
Authority-Scope: calendar:book calendar:query
Authority-Scope: documents:summarize documents:query knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:* payments:confirm
]]></artwork></figure>

<t>Reserved domains (initial set):</t>

<texttable title="Reserved Authority-Scope Domains">
      <ttcol align='left'>Domain</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>calendar</c>
      <c>Scheduling and time-based resource management</c>
      <c>documents</c>
      <c>Document access, summarization, and annotation</c>
      <c>knowledge</c>
      <c>Agent context and memory operations</c>
      <c>booking</c>
      <c>Reservation and resource allocation</c>
      <c>payments</c>
      <c>Financial transactions and confirmations</c>
      <c>agents</c>
      <c>Delegation and collaboration with other agents</c>
      <c>escalation</c>
      <c>Escalation routing and handler management</c>
      <c>activation</c>
      <c>Governed agent package activation (ACTIVATE method extension)</c>
      <c>discovery</c>
      <c>Agent discovery and capability query operations (DISCOVER, DESCRIBE)</c>
      <c>budget</c>
      <c>Resource budget declaration and QUOTE pre-flight operations</c>
      <c>telemetry</c>
      <c>Telemetry export and observability operations</c>
      <c>zone</c>
      <c>Network zone boundary declaration and enforcement</c>
      <c>suspend</c>
      <c>Session suspension and resumption operations</c>
      <c>*</c>
      <c>All domains require explicit grant; use with caution</c>
</texttable>

</section>
<section anchor="example-agtp-wire-formats"><name>Example AGTP Wire Formats</name>

<t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all AGTP
message bodies is application/agtp+json.</t>

<section anchor="query-request-and-response"><name>QUERY Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
TTL: 3000
Content-Type: application/agtp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP re: HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

AGTP/1.0 200 OK
Task-ID: task-0042
Server-Agent-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-agtp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork></figure>

</section>
<section anchor="book-request-and-response"><name>BOOK Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 BOOK
Agent-ID: agt-travel-planner
Principal-ID: usr-chris-hood
Authority-Scope: booking:* calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Priority: normal
Content-Type: application/agtp+json

{
  "method": "BOOK",
  "task_id": "task-0107",
  "parameters": {
    "resource_id": "flight-AA2847",
    "principal_id": "usr-chris-hood",
    "time_slot": "2026-04-15T08:00:00Z",
    "options": {"seat_preference": "aisle", "class": "economy"},
    "confirm_immediately": true
  }
}

AGTP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork></figure>

</section>
<section anchor="escalate-request-and-response"><name>ESCALATE Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Principal-ID: usr-finance-dept
Authority-Scope: booking:* payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Priority: urgent
Content-Type: application/agtp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "BOOK",
      "resource": "vendor-contract-750k",
      "block_reason": "Exceeds agent authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

AGTP/1.0 202 Accepted
Task-ID: task-0881
Server-Agent-ID: srv-escalation-handler
Content-Type: application/agtp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="comparison-table"><name>Comparison Table</name>

<texttable title="AGTP Compared to Existing Approaches">
      <ttcol align='left'>Criterion</ttcol>
      <ttcol align='left'>AGTP</ttcol>
      <ttcol align='left'>HTTP/REST</ttcol>
      <ttcol align='left'>gRPC</ttcol>
      <ttcol align='left'>AGMP (MCP, A2A, ...)</ttcol>
      <c>Intent-native methods</c>
      <c>Yes (12 Tier 1)</c>
      <c>No</c>
      <c>No</c>
      <c>Partial</c>
      <c>Intent semantics at protocol level</c>
      <c>Native</c>
      <c>None</c>
      <c>None</c>
      <c>Messaging layer only</c>
      <c>Built-in agent identity</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Authority scope enforcement</c>
      <c>Protocol-level</c>
      <c>None</c>
      <c>None</c>
      <c>Application-layer</c>
      <c>Built-in attribution/audit</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>Varies by impl.</c>
      <c>Transport flexibility</c>
      <c>TCP/UDP/QUIC</c>
      <c>TCP/TLS</c>
      <c>HTTP/2</c>
      <c>HTTP</c>
      <c>Escalation as first-class primitive</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Ecosystem maturity</c>
      <c>Proposed</c>
      <c>Mature</c>
      <c>Mature</c>
      <c>Emerging</c>
      <c>Governance/observability</c>
      <c>Native</c>
      <c>Manual/bolt-on</c>
      <c>Manual</c>
      <c>Limited</c>
      <c>Method registry extensibility</c>
      <c>Yes (Expert Review)</c>
      <c>Frozen (IETF Review)</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>Open core / royalty-free</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Agent Manifest Document</c>
      <c>Native (.agtp format)</c>
      <c>None</c>
      <c>None</c>
      <c>None</c>
      <c>Tamper-proof identity surface</c>
      <c>Yes (hash + signature)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Browser-accessible agent identity</c>
      <c>Yes (read-only)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>URI collision prevention</c>
      <c>Domain-anchored</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>Agent Birth Certificate</c>
      <c>Yes (genesis record)</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Domain-expiry lifecycle handling</c>
      <c>Specified</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>Capability discovery</c>
      <c>Native (DESCRIBE)</c>
      <c>None</c>
      <c>Reflection (partial)</c>
      <c>None</c>
      <c>Resource budget enforcement</c>
      <c>Native (Budget-Limit, 452)</c>
      <c>None</c>
      <c>None</c>
      <c>None</c>
      <c>Execution attestation (RATS)</c>
      <c>Optional (RFC 9334)</c>
      <c>None</c>
      <c>None</c>
      <c>None</c>
      <c>Observability hooks</c>
      <c>Native (Telemetry-Export)</c>
      <c>None</c>
      <c>None</c>
      <c>None</c>
      <c>Network zone enforcement</c>
      <c>Native (AGTP-Zone-ID, 453)</c>
      <c>None</c>
      <c>None</c>
      <c>None</c>
      <c>Session suspension/recovery</c>
      <c>Native (SUSPEND method)</c>
      <c>None</c>
      <c>None</c>
      <c>None</c>
      <c>AGMP composition profiles</c>
      <c>Normative appendix</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
</texttable>

<t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
AGTP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>

</section>
<section anchor="glossary"><name>Glossary</name>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
  </dd>
  <dt>AGMP (Agent Group Messaging Protocol):</dt>
  <dd>
    <t>The collective term for higher-layer AI agent messaging standards that
operate over AGTP as their transport substrate, including MCP, A2A, ACP,
and ANP. AGMPs define what agents say. AGTP defines how those messages
move. See Section 1.6.</t>
  </dd>
  <dt>Agent Birth Certificate:</dt>
  <dd>
    <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The genesis record of the
agent's existence; the source from which the canonical Agent-ID is
derived. Functions as the agent's social security number: issued once,
permanently bound, never reissued. See Section 6.7.</t>
  </dd>
  <dt>Agent Transfer Protocol (AGTP):</dt>
  <dd>
    <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
  </dd>
  <dt>Agent-ID:</dt>
  <dd>
    <t>A unique identifier for a specific agent instance, present in all AGTP
request headers. In the base spec, derived from the Birth Certificate
hash. With <xref target="AGTP-CERT"/>, cryptographically bound to a verified identity.</t>
  </dd>
  <dt>Agent Manifest Document:</dt>
  <dd>
    <t>A signed <spanx style="verb">application/agtp+json</spanx> document returned when an <spanx style="verb">agtp://</spanx>
URI is resolved. Derived from the agent's <spanx style="verb">.agent</spanx> or <spanx style="verb">.nomo</spanx> package.
Contains identity, lifecycle state, trust tier, behavioral scope, and
birth certificate fields. Never contains executable content.</t>
  </dd>
  <dt>AGTP-Zone-ID:</dt>
  <dd>
    <t>A request header declaring the network zone or organizational boundary
within which a request must be processed. SEPs <strong>MUST</strong> enforce zone
boundaries and return 453 Zone Violation if a DELEGATE or COLLABORATE
request would route outside the declared zone.</t>
  </dd>
  <dt>Attribution Record:</dt>
  <dd>
    <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes. <strong>MAY</strong> include RATS attestation evidence per
<xref target="RFC9334"/> for hardware-rooted execution proof in high-stakes domains.</t>
  </dd>
  <dt>Authority-Scope:</dt>
  <dd>
    <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as space-separated domain:action tokens.</t>
  </dd>
  <dt>Budget-Limit:</dt>
  <dd>
    <t>A request header declaring the maximum resource consumption the principal
authorizes for a method invocation, expressed as space-separated
<spanx style="verb">unit=value</spanx> tokens from the IANA AGTP Budget Unit Registry. Exceeding
the declared limit causes 452 Budget Exceeded.</t>
  </dd>
  <dt>Delegation Chain:</dt>
  <dd>
    <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
  </dd>
  <dt>DESCRIBE:</dt>
  <dd>
    <t>An AGTP Tier 1 core method returning the declared capabilities, supported
modalities, method vocabulary, and versioned feature set of a specific
agent endpoint. Used for pre-task negotiation. Category: ACQUIRE.</t>
  </dd>
  <dt>ESCALATE:</dt>
  <dd>
    <t>An AGTP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
  </dd>
  <dt>Governance Token:</dt>
  <dd>
    <t>A signed, time-limited JWT artifact encoding a specific governance verdict
for a specific action. The runtime companion to the Birth Certificate.
Default TTL: 30 seconds. Must not be reused.</t>
  </dd>
  <dt>Intent Verb:</dt>
  <dd>
    <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
  </dd>
  <dt>Method Registry:</dt>
  <dd>
    <t>The IANA-maintained registry of valid AGTP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
  </dd>
  <dt>Principal:</dt>
  <dd>
    <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
  </dd>
  <dt>Principal-ID:</dt>
  <dd>
    <t>The identifier of the principal on whose behalf an agent operates,
present in all AGTP request headers.</t>
  </dd>
  <dt>Scope-Enforcement Point (SEP):</dt>
  <dd>
    <t>An AGTP-aware infrastructure component, load balancer, gateway, proxy,
that enforces Authority-Scope and AGTP-Zone-ID compliance on AGTP
requests without application-layer access. Requires <xref target="AGTP-CERT"/>.</t>
  </dd>
  <dt>Scope Violation (451):</dt>
  <dd>
    <t>An AGTP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
  </dd>
  <dt>Session:</dt>
  <dd>
    <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
  </dd>
  <dt>SUSPEND (method):</dt>
  <dd>
    <t>An AGTP Tier 1 core method that places a specific active session into a
recoverable paused state, issuing a single-use base64url-encoded 128-bit
resumption nonce. Session-scoped; does not affect registry lifecycle state.
Category: ORCHESTRATE.</t>
  </dd>
  <dt>Trust Tier:</dt>
  <dd>
    <t>A classification (1, 2, or 3) assigned to an agent at registration based
on the strength of identity verification. Tier 1 requires DNS-anchored
domain verification and a <spanx style="verb">.nomo</spanx> governed package. Tier 2 is org-asserted
without DNS verification. Tier 3 is experimental, not production-eligible.</t>
  </dd>
  <dt>551 Authority Chain Broken:</dt>
  <dd>
    <t>An AGTP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
  </dd>
</dl>

</section>
<section anchor="agtp-composition-with-agmps"><name>AGTP Composition with AGMPs</name>

<t>This appendix provides normative mapping guidance for carrying AGMP
messages (MCP, A2A, ACP) over AGTP as their transport substrate. Full
composition specifications are provided in <xref target="AGTP-COMPOSITION"/>; this
appendix provides the canonical mapping table and precedence rules.</t>

<section anchor="precedence-rule"><name>Precedence Rule</name>

<t>AGTP headers (Agent-ID, Principal-ID, Authority-Scope, Delegation-Chain)
take precedence over equivalent fields in the messaging-layer payload for
routing, enforcement, and audit purposes. Infrastructure components including
SEPs and governance gateways <strong>MUST</strong> use AGTP header values for all
protocol-level decisions. Messaging-layer identity fields <strong>MAY</strong> be present
in the body for application-layer use but <strong>MUST NOT</strong> override AGTP header
values.</t>

</section>
<section anchor="agmp-to-agtp-canonical-mapping"><name>AGMP-to-AGTP Canonical Mapping</name>

<texttable title="AGMP-to-AGTP Canonical Mapping">
      <ttcol align='left'>AGMP</ttcol>
      <ttcol align='left'>Concept</ttcol>
      <ttcol align='left'>AGTP Mapping</ttcol>
      <c>A2A</c>
      <c>Task</c>
      <c>AGTP DELEGATE body; A2A <spanx style="verb">task.id</spanx> maps to Task-ID header</c>
      <c>A2A</c>
      <c>Capability</c>
      <c>AGTP DESCRIBE response; <spanx style="verb">capability_domains</spanx></c>
      <c>A2A</c>
      <c>Agent Card</c>
      <c>AGTP Agent Manifest Document</c>
      <c>A2A</c>
      <c>Provenance chain</c>
      <c>AGTP Delegation-Chain header</c>
      <c>A2A</c>
      <c>Artifact</c>
      <c>AGTP NOTIFY body with <spanx style="verb">content_type: artifact</spanx></c>
      <c>MCP</c>
      <c>Tool call</c>
      <c>AGTP QUERY or NOTIFY body</c>
      <c>MCP</c>
      <c>Context / conversation state</c>
      <c>AGTP Session-ID header + LEARN method</c>
      <c>MCP</c>
      <c>Sampling / inference request</c>
      <c>AGTP QUERY with <spanx style="verb">modality: inference</spanx></c>
      <c>MCP</c>
      <c>Resource</c>
      <c>AGTP QUERY with appropriate <spanx style="verb">scope</spanx></c>
      <c>ACP</c>
      <c>Agent-to-agent message</c>
      <c>AGTP NOTIFY or COLLABORATE body</c>
      <c>ACP</c>
      <c>Capability advertisement</c>
      <c>AGTP DESCRIBE response</c>
</texttable>

</section>
<section anchor="wire-example-a2a-task-over-agtp"><name>Wire Example: A2A Task over AGTP</name>

<figure><artwork><![CDATA[
AGTP/1.0 DELEGATE
Agent-ID: agtp://agtp.acme.tld/agents/orchestrator
Principal-ID: usr-chris-hood
Authority-Scope: agents:delegate documents:query
Delegation-Chain: agtp://agtp.acme.tld/agents/orchestrator
Session-ID: sess-a1b2c3d4
Task-ID: task-0099
Content-Schema: https://a2aprotocol.ai/schema/task/v1
Content-Type: application/agtp+json

{
  "method": "DELEGATE",
  "task_id": "task-0099",
  "parameters": {
    "target_agent_id": "agtp://agtp.acme.tld/agents/analyst",
    "authority_scope": "documents:query",
    "delegation_token": "[signed token]",
    "task": {
      "a2a_task_id": "a2a-task-7f3a",
      "message": "Summarize Q1 financial reports",
      "artifacts": []
    }
  }
}
]]></artwork></figure>

</section>
<section anchor="wire-example-mcp-tool-call-over-agtp"><name>Wire Example: MCP Tool Call over AGTP</name>

<figure><artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agtp://agtp.acme.tld/agents/assistant
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-mcp-b2c3d4
Task-ID: task-0100
Content-Schema: https://modelcontextprotocol.io/schema/tool-call/v1
Content-Type: application/agtp+json

{
  "method": "QUERY",
  "task_id": "task-0100",
  "parameters": {
    "intent": "web_search",
    "modality": "tool",
    "mcp_tool_name": "web_search",
    "mcp_tool_input": {"query": "IETF agent protocol drafts 2026"}
  }
}
]]></artwork></figure>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

