<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-shang-campus-agent-scope-down-00" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Campus Agent Scope-Down">Campus Agent Identification and Scope-Down Access Control</title>
    <seriesInfo name="Internet-Draft" value="draft-shang-campus-agent-scope-down-00"/>
    <author initials="C." surname="Shang" fullname="Chao Shang">
      <organization>Huawei</organization>
      <address>
        <email>chao.shang@huawei.com</email>
      </address>
    </author>
    <author initials="X." surname="Liang" fullname="Liang Xia">
      <organization>Huawei</organization>
      <address>
        <email>frank.xialiang@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Jiang" fullname="Weiyu Jiang">
      <organization>Huawei</organization>
      <address>
        <email>jiangweiyu1@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="12"/>
    <area>Security</area>
    <workgroup/>
    <keyword>AI Agent</keyword>
    <keyword>Campus Network</keyword>
    <keyword>Authorization</keyword>
    <keyword>Scope-down</keyword>
    <abstract>
      <?line 48?>

<t>AI agents operating in enterprise campus networks execute user-delegated tasks by invoking multiple tools and services, often without continuous user supervision. Traditional authorization models assume stable applications and human-driven interactions, creating a mismatch when applied to autonomous agents that can chain actions across heterogeneous systems.</t>
      <t>Campus environments also contain heterogeneous and legacy services across diverse protocols, making per-service agent-aware authorization difficult to deploy consistently. This document describes the problem space for campus agent access control and argues that agents require task-bound privilege reduction ("scope-down") and that enforcement can be provided by in-path network devices in order to preserve compatibility with existing systems.</t>
    </abstract>
  </front>
  <middle>
    <?line 54?>

<section anchor="status-of-this-memo">
      <name>Status of This Memo</name>
      <t>This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.</t>
      <t>Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). The list of current Internet-Drafts is available at:</t>
      <t><eref target="https://datatracker.ietf.org/drafts/current/">https://datatracker.ietf.org/drafts/current/</eref></t>
      <t>Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time.</t>
    </section>
    <section anchor="copyright-notice">
      <name>Copyright Notice</name>
      <t>Copyright (c) 2026 IETF Trust and the persons identified as the document authors.</t>
      <t>This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Enterprise campus networks increasingly carry traffic generated by AI agents acting on behalf of users. These agents may retrieve internal documents, query knowledge bases, invoke APIs, and automate workflows across multiple services.</t>
      <t>Unlike conventional applications, agents may be instantiated per task and autonomously chain operations based on intermediate results. Permissions that are safe for human operation may therefore become unsafe when exercised by an autonomous actor operating at machine speed.</t>
      <t>Existing standards such as OAuth 2.0 <xref target="RFC6749"/> and JSON Web Tokens <xref target="RFC7519"/> provide identity and delegation primitives. However, these mechanisms alone do not address task-bound privilege reduction or enforcement in heterogeneous campus environments.</t>
      <t>Deployable campus agent security therefore requires two capabilities:</t>
      <ul spacing="normal">
        <li>
          <t>recognition of agent-generated traffic</t>
        </li>
        <li>
          <t>enforcement of task-bound privilege scope</t>
        </li>
      </ul>
    </section>
    <section anchor="example-campus-network-architecture">
      <name>Example Campus Network Architecture</name>
      <figure anchor="fig-campus">
        <artwork type="ascii-art"><![CDATA[
                    +----------------------+
                    |   Private Cloud RS   |
                    +----------^-----------+
                               |
                    +----------------------+
                    |   Public Cloud RS    |
                    +----------^-----------+
                               |
                         +-----+-----+
                         |   Gateway  |
                         +--+------+--+
                            |      |
                            |      +-------------+
                            |                    |
                            v                    v
+------------------------------------+  +----------------------+
|        Campus Network              |  |   Branch Network     |
|                                    |  |                      |
|      +--------------------+        |  |    +-------------+   |
|      |     Core Switch    |        |  |    |   Switch    |   |
|      +----+----------+----+        |  |    +--+---------++   |
|           |          |             |  |       |         |    |
|     +-----+----+  +----+----+      |  |    +--+--+   +--+--+ |
|     | Switch   |  | Switch  |      |  |    | App |   |Agent| |
|     +----+-----+  +----+----+      |  |    +--+--+   +--+--+ |
|          |              |          |  |       |         |    |
|       +--+--+        +--+--+       |  |    +--+--+   +--+--+ |
|       | App |        |Agent|       |  |    |User |   |User | |
|       +--+--+        +--+--+       |  |    +-----+   +-----+ |
|          |              |          |  |                      |
|       +--+--+        +--+--+       |  |                      |
|       |User |        |User |       |  |                      |
|       +-----+        +-----+       |  |                      |
|                                    |  |                      |
|  +--------------+  +-------------+ |  |                      |
|  | Resource Svr |  | IdP / AS    | |  |                      |
|  +--------------+  +-------------+ |  |                      |
+------------------------------------+  +----------------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED",
"NOT RECOMMENDED", "MAY", and "OPTIONAL"
in this document are to be interpreted as described in
<xref target="RFC2119"/> and <xref target="RFC8174"/> when, and only when,
they appear in all capitals, as shown here.</t>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>Software that performs tasks on behalf of a user or principal and may autonomously invoke services or tools.</t>
        </dd>
        <dt>Agent Identifier (Agent-ID):</dt>
        <dd>
          <t>A verifiable identifier associated with a specific agent instance.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human user or entity on whose behalf the agent operates.</t>
        </dd>
        <dt>Authorization Server (AS):</dt>
        <dd>
          <t>The OAuth authorization server issuing tokens.</t>
        </dd>
        <dt>Resource Server (RS):</dt>
        <dd>
          <t>A server hosting protected resources.</t>
        </dd>
        <dt>In-Path Network Device (ND):</dt>
        <dd>
          <t>A network device positioned on the traffic path capable of enforcing policy decisions.</t>
        </dd>
      </dl>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>Traditional authorization models assume stable applications and human-driven workflows. Agents violate these assumptions by dynamically selecting targets and chaining tools across systems.</t>
      <t>Without task-bound constraints, agent-driven workflows introduce several risks:</t>
      <ul spacing="normal">
        <li>
          <t>over-broad aggregation of internal data across multiple systems</t>
        </li>
        <li>
          <t>cross-boundary exfiltration when generated output is transmitted externally</t>
        </li>
        <li>
          <t>unsupervised tool chaining across services without user review</t>
        </li>
        <li>
          <t>machine-scale amplification of data access or operations</t>
        </li>
      </ul>
      <t>Campus environments also contain heterogeneous services and legacy protocols, making it operationally infeasible to require each service to implement agent-aware authorization.</t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <artwork type="ascii-art"><![CDATA[
Principal      Agent        Network      Auth         Resource
   |        Application     Device       Server        Server
   |             |             |            |             |
   | OAuth req   |             |            |             |
   |--------------------------------------->|             |
   |             |             |            |             |
   |             |             |  OAuth token             |
   |             |             |<-----------|             |
   |             | resource request + Agent-ID            |
   |             |------------------------->|             |
   |             |             |            |             |
   |             |       policy evaluation  |             |
   |             |             |            |             |
   |             | request + scoped token   |             |
   |             |------------------------->|             |
]]></artwork>
    </section>
    <section anchor="deployment-models">
      <name>Deployment Models</name>
      <t>Different deployment models are possible.</t>
      <t>Model A: Network Device performs token validation and policy enforcement without issuing new tokens.</t>
      <t>Model B: Network Device obtains a reduced-scope token through OAuth Token Exchange <xref target="RFC8693"/> or via Authorization Server policy decisions.</t>
      <t>This document does not define a new OAuth grant type or token format and relies on existing OAuth mechanisms.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Deployments must address several threats.</t>
      <t>Agent identity spoofing: Deployments <strong>MUST</strong> ensure that Agent-ID cannot be forged or reused across devices.</t>
      <t>Token replay: Deployments <strong>SHOULD</strong> bind tokens to the Network Device as audience and <strong>MAY</strong> use mutual TLS or channel binding to reduce replay risk.</t>
      <t>Network bypass: Network architectures <strong>SHOULD</strong> enforce that agent traffic cannot bypass the Network Device through fabric policies, VRF isolation, or ACL enforcement.</t>
      <t>Intent mis-modeling: Scope-down mechanisms ensure that authorization does not expand privilege beyond the original delegation but cannot eliminate risks caused by incorrect intent interpretation.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Deployments may log Agent-ID and authorization decisions for auditing.</t>
      <t>Operators <strong>SHOULD</strong> minimize collection of unnecessary personal data and avoid storing sensitive token contents.</t>
      <t>Deployments <strong>SHOULD</strong> consider using short-lived or per-task Agent-IDs and <strong>SHOULD</strong> distinguish Principal identifiers from Agent-IDs in audit logs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors thank members of the research community for discussions on agent identity and authorization models in campus networks.</t>
    </section>
    <section anchor="references">
      <name>References</name>
      <section anchor="normative-references">
        <name>Normative References</name>
        <t><xref target="RFC2119"/></t>
        <t><xref target="RFC8174"/></t>
        <t><xref target="RFC6749"/></t>
        <t><xref target="RFC7519"/></t>
        <t><xref target="RFC8693"/></t>
        <t><xref target="RFC9068"/></t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6749.xml">
        <front>
          <title>The OAuth 2.0 Authorization Framework</title>
          <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6749"/>
        <seriesInfo name="DOI" value="10.17487/RFC6749"/>
      </reference>
      <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7519.xml">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="RFC8693" target="https://www.rfc-editor.org/info/rfc8693" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8693.xml">
        <front>
          <title>OAuth 2.0 Token Exchange</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
          <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
          <date month="January" year="2020"/>
          <abstract>
            <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8693"/>
        <seriesInfo name="DOI" value="10.17487/RFC8693"/>
      </reference>
      <reference anchor="RFC9068" target="https://www.rfc-editor.org/info/rfc9068" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9068.xml">
        <front>
          <title>JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens</title>
          <author fullname="V. Bertocci" initials="V." surname="Bertocci"/>
          <date month="October" year="2021"/>
          <abstract>
            <t>This specification defines a profile for issuing OAuth 2.0 access tokens in JSON Web Token (JWT) format. Authorization servers and resource servers from different vendors can leverage this profile to issue and consume access tokens in an interoperable manner.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9068"/>
        <seriesInfo name="DOI" value="10.17487/RFC9068"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
