<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ni-wimse-ai-agent-identity-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="wimse-ai-agent">WIMSE Applicability for AI Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-ni-wimse-ai-agent-identity-02"/>
    <author fullname="Yuan Ni">
      <organization>Huawei</organization>
      <address>
        <email>niyuan1@huawei.com</email>
      </address>
    </author>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="28"/>
    <area>Applications and Real-Time</area>
    <workgroup>Workload Identity in Multi System Environments</workgroup>
    <keyword>WIMSE</keyword>
    <keyword>AI Agent</keyword>
    <keyword>Identity</keyword>
    <abstract>
      <?line 51?>

<t>This document discusses WIMSE applicability to Agentic AI, so as to establish independent identities and credential management mechanisms for AI agents.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Workload Identity in Multi System Environments Working Group mailing list (<eref target="mailto:wimse@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/wimse/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/wimse/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 55?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>AI agents are autonomous software entities that receive an intent, process contextual information, and execute decisions at machine speed with minimal human intervention. Without appropriate guardrails, they may give rise to significant risks:</t>
      <ul spacing="normal">
        <li>
          <t>Blurred Network Boundaries: AI agents may operate across systems and platforms, which expands attack surface and amplifies security risks.</t>
        </li>
        <li>
          <t>Arbitrary and Unpredictable Access Patterns: AI agents may perform unexpected actions or access sensitive resources susceptible to malicious manipulation or logical errors.</t>
        </li>
        <li>
          <t>Lack of Accountability: Tracing an AI agent's actions is inherently difficult, leading to difficulty to detect erroneous behaviors.</t>
        </li>
        <li>
          <t>Context Rot: A gradual degradation of their ability to maintain relevant and coherent call contexts over time.</t>
        </li>
      </ul>
      <t>Therefore, for AI agents, the traditional perimeter-based security model has to transform into the identity-based security model, which is a prequisite to implementing precise access control and ensuring security visibility.</t>
      <t>To realize this goal, a mechanism should be designed considering the following requirements:</t>
      <ul spacing="normal">
        <li>
          <t>Independent, Trustworthy Identities: AI agents should have independent and trustworthy identities and credentials, distinct from those of devices and users. This allows the AI agent to act either on its own behalf or as a delegation of a user, have its own access tokens and workflows.</t>
        </li>
        <li>
          <t>Automated Credential Management: An automated mechanism is necessary for managing credentials with reduced validity period to minimize security exposure.</t>
        </li>
        <li>
          <t>Minimal Privileged Access Tokens: AI agents should have task-oriented, fine-grained access tokens with short validity periods.</t>
        </li>
        <li>
          <t>Explicit Workflows: AI agents need explicit workflow management in order to avoid random agentic access. The workflow could be long-termed and static, or could be short-termed and task-triggered, but the call context must always be visible and preserved.</t>
        </li>
      </ul>
      <t>This document discusses possibility of using WIMSE architecture to provide AI agent identities and credentials. It accords with the original WIMSE use case in Section 3.3.1 Bootstrapping Workload Identifiers and Credentials of <xref target="I-D.ietf-wimse-arch-06"/>. We also discuss requirements of extending WIMSE architecture to bind workload/AI agent identity to its owner's identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This document uses terms and concepts defined by WIMSE architecture. For a complete glossary please refer to <xref target="I-D.ietf-wimse-arch-06"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Trust Domain: A logical grouping of systems that share a common set of security controls and policies. Agent credentials are issued under the authority of a trust domain.</t>
        </li>
        <li>
          <t>AI Agent: The autonomous software entity that initiates the credential request. This document may refer to it as the "agent", but is is essentially the workload instead of the agent in the WIMSE architecture.</t>
        </li>
        <li>
          <t>Identity Server: A trusted entity issuing agent identity and credentials. For simplicity, this document may refer to this component as the "server".</t>
        </li>
        <li>
          <t>Identity Proxy: An intermediary component that can request, inspect, replace or augment agent identity credentials. It exposes an Agent API locally to agents. For simplicity, this document may refer to this component as the "proxy".</t>
        </li>
      </ul>
      <t>In addition, this document introduces the following new terms:
* Owner: An entity (individual or organization) responsible for the an agent, which can provide a cryptographic signature to bind the agent identity to a specific principal. Logically, an owner may manifest in various forms, including a natural person (e.g., via a manual confirmation process), a physical device (e.g., a hardware security module), or an automated policy engine that grants approval based on pre-defined security policies.
* Dual-Identity Credential:  A credential that contains the identifiers and associated public keys of both an agent and its owner. The credential is cryptographically bound to both entities.</t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <section anchor="bootstrapping-ai-agent-identity-and-credentials">
        <name>Bootstrapping AI Agent Identity and Credentials</name>
        <t>This document presumes that the identity server has already been issued a signing certificate which has set keyCertSign in the key usage extension. The server and the proxy are assumed to have established a secure channel.       A basic workflow is shown in Figure 1.</t>
        <ol spacing="normal" type="1"><li>
            <t>As an intermediary between the server and the agents, the proxy provides an agent API that agents can use to initiate identity credential requests. These requests include a public key and a signature as proof-of-possession to demonstrate control of the corresponding private key.</t>
          </li>
          <li>
            <t>The proxy forwards these requests,  along with the attestation evidence for verifing the operational status of the agent, to the server for processing.</t>
          </li>
          <li>
            <t>The server validates the evidence received from the proxy, and issues the corresponding identity credentials.</t>
          </li>
          <li>
            <t>Once issued, the proxy forwards the agent identity credentials.</t>
          </li>
        </ol>
        <artwork><![CDATA[
  +----------------------------+
  |       Identity Server      |
  +-------------- ^ + ---------+
      (2)identity | |(3)identity
      credential  | | credential
      request &   | |
      evidence    | |
+-----------------+-+-----------------------------------+
|  Trust Domain   | |            (1)identity            |
|                 | |            credential             |
| +--------------++ v ---------+ request      +-------+ |
| |              |             <--------------+       | |
| |Identity Proxy|  Agent API  +--------------> Agent | |
| |              |             | (4)identity  |       | |
| +--------------+----- ^ -----+ credential   +-------+ |
|              evidence |                               |
+-----------------------+-------------------------------+
|          Hosting Operating Systems and Hardware       |
+-------------------------------------------------------+

]]></artwork>
        <t><em>Figure 1: Basic Architecture and the Workflow</em></t>
      </section>
      <section anchor="attestation">
        <name>Attestation</name>
        <t>During the request and issuance of identity credentials, the proxy should gather attestation evidence from the operating system and hardware to verify the operational status of the agent. This information is used by a RATS Verifier (could be the server) to support identity server's decision of whether or not to issue the identity credential of an agent, whether it is a bootstrapping or a renewal request. The structure and claims of this evidence may refer to the Entity Attestation Token (EAT) profile for Autonomous AI Agents <xref target="I-D.draft-messous-eat-ai-01"/>, which defines specialized claims for AI agent integrity, training provenance, and runtime authorization.</t>
      </section>
    </section>
    <section anchor="identity-binding-extensions-for-wimse">
      <name>Identity Binding Extensions for WIMSE</name>
      <t>The basic WIMSE architecture ensures a trusted entity owns a trusted workload identity that is secure to connect to. However, the agent often operates on behalf of a human user or an organization. Consequently, an agent requires a credential that cryptographically binds its identity to its owner’s identity. This dual-identity credential provides a necessary foundation for access control and accountability. This section describes the necessity of dual-identity credential through two representative use cases and defines three operational models to issue it.</t>
      <section anchor="use-cases">
        <name>Use Cases</name>
        <t>### Network Access Control in Campus</t>
        <t>Campus administrators require authentication of agents before granting access to internal network via authentication protocols such as IEEE 802.1X (e.g., using EAP-TLS). In this scenario, the Authentication Server must verify the agent's credential and determine its network privileges. A single-identity credential only allows the Authentication Server to identify the agent itself. Without further information, Authentication Server may treat the agent as a guest, providing only limited public access or rejecting the request to protect sensitive zones. A dual-identity credential allows the Authentication Server to verify both the agent's identity and the specific user or department it represents. For instance, an agent representing Alice from the R&amp;D department can be identified as a trusted entity, and can receive proper access privileges according to existing IAM information (like RBAC). This enables the network to implement user-specific segmentation, such as automatically assigning the agent to the R&amp;D VLAN rather than a guest network.</t>
        <section anchor="cross-organization-interaction">
          <name>Cross-organization Interaction</name>
          <t>In collaborative enterprise environments, it is essential to ensure that any agent requesting services is explicitly approved by its organization. This requirement spans the entire credential lifecycle, from issuance to interaction.</t>
          <ul spacing="normal">
            <li>
              <t>Issuance: When an agent requests an identity credential, the identity server may require organizational oversight. By binding the agent's identity credential request to its corresponding organization, the server can verify the organizational approval before issuing the credential. In other words, dual-identity credential could be a manifestation of Human-in-the-Loop (HITL) mechanisms.</t>
            </li>
            <li>
              <t>Interaction: When an agent accesses another agent or a service across organizational boundaries, authentication is necessary to ensure the request is from a valid entity, as illustrated in the A2A protocol<xref target="A2A-SPEC"/> and WIMSE architecture<xref target="I-D.ietf-wimse-arch-06"/>. A dual-identity credential carries an organizational approval, which provides a strong basis for trust, ensuring both accountability and traceability for cross-organization interactions.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="issuance-models">
        <name>Issuance Models</name>
        <t>Identity binding can be integrated into the WIMSE workflow in several ways. we introduce the following three models according to the mediation point where the agent's identity and organizational authority are cryptographically bound. Before initiating the dual-identity issuance flow, a pre-established trust relationship must exist, where the identity server is provisioned with trust anchors (e.g., public keys, CA certificates, or hardware-backed credentials) to verify the owner’s signature. The mechanism by which these trust anchors are established, distributed, or updated is out of scope of this document.</t>
        <section anchor="agent-mediated-owner-pre-signed">
          <name>Agent-Mediated (Owner-Pre-Signed)</name>
          <t>In this model, the owner acts as a local offline approvar, which provides a signature on the agent's request before it is submitted to the proxy. The identity binding phase, consisting of the following two steps, is added prior to the standard issuance flow defined in Figure 1:</t>
          <t>a. The agent generates an identity credential request and sends it to the owner.</t>
          <t>b. The owner signs the request and returns the signature to the agent. The agent then combines the original request and the owner's signature into a new composite request.</t>
          <t>The following steps are similar to the basic architecture, that is, the agent send the new composite request to the server via the proxy (steps 1 and 2), then the server verifies the request and issues the dual-identity credential to the agent via the proxy (steps 3 and 4).</t>
          <artwork><![CDATA[
  +----------------------------+
  |       Identity Server      |
  +-------------- ^ + ---------+
               (2)| |(3)
+-----------------+-+---------------------------------+
| Trust Domain    | |              +-------+          |
|                 | |              | owner |          |
|                 | |              +--^-+--+          |
|                 | |       (a)request| |(b)signature |
| +--------------++ v -------+ (1) +--+-v--+          |
| |              |           ------+       |          |
| |Identity Proxy| Agent API ------> Agent |          |
| |              |           | (4) |       |          |
| +--------------+-----------+     +-------+          |
+-----------------------------------------------------+
]]></artwork>
          <t><em>Figure 2: Agent-Mediate Model</em></t>
          <ul spacing="normal">
            <li>
              <t>Typical Application Scenarios: This model is ideal for local identity binding where the owner and agent operate on the same host . It supports asynchronous and offline owner confirmation, allowing the owner use local signing module (e.g., a hardware security key)  to pre-sign the agent's request. For instance, a developer using a personal hardware security key to sign an agent's request directly on their local machine. Therefore, this model obviously supports hardware-based identity binding, cryptographically anchoring the agent’s dual-identity to the specific physical device managed by the owner.</t>
            </li>
            <li>
              <t>Attack Surface: The primary attack surface lies at the local environment,  focusing on two main risks. First is human-agent trust exploitation: an attacked or rogue agent may manipulate human users to approve malicious request. Second is the compromise of signing keys: if the owner’s local private keys are not protected by hardware (e.g., TPM), an attacker can forge confirmations.</t>
            </li>
          </ul>
        </section>
        <section anchor="owner-mediated-gateway-mode">
          <name>Owner-Mediated (Gateway Mode)</name>
          <t>In this model, the owner acts as the supervisory gatekeeper between the proxy and the server. It inspects requests relayed by the proxy to ensure compliance with organizational policies, providing cryptographic binding only after approval.</t>
          <t>Such a mechanism is intergrated in the basic architecture as shown in Figure 3. Firstly, the agent generates an identity credential request and sends it to the proxy(step 1), then：</t>
          <t>a. The proxy intercepts the request and relays it to the owner for administrative inspection.</t>
          <t>b. The owner reviews and signs the request. It then combines the original request and the owner's signature into a new composite request to be submitted to the server, along with additional organizational materials, such as an oragnizational credential.</t>
          <t>c. The server validates the received information and issues the dual-identity credential back to the owner, who then dispatches it to the proxy.</t>
          <t>Finally, the proxy send the credential to the corresponding agents(step 4).</t>
          <t>Figure 3 shows a one-to-one mapping case between the owner and the proxy. In this case, the function of owner can be integrated directly into the proxy, collapsing the hierarchy into a single entity to simplify the deployment. Moreover, this model also supports a one-to-many topology, allowing a central owner to manage multiple proxies across various trust domains.</t>
          <artwork><![CDATA[
  +----------------------------+
  |      Identity Server       |
  +------------------^-+-------+
      (b)request     | | (c)dual-identity
      (signature)    | |  credential
  +------------------+-v-------+
  |           Owner            |
  +------------------^-+-------+
      (a)request     | | (c)
+--------------------+-+--------------------------------+
| Trust Domain       | |                                |
| +--------------+---+-v-------+     (1)      +-------+ |
| |              |             <---------------       | |
| |Identity Proxy|  Agent API  |--------------> Agent | |
| |              |             |     (4)      |       | |
| +--------------+-------------+              +-------+ |
+-------------------------------------------------------+
]]></artwork>
          <t><em>Figure 3: Owner-Mediate Model</em></t>
          <ul spacing="normal">
            <li>
              <t>Typical Application Scenarios: This model is ideal for enterprise governance. Since the owner sits in the middle, acting like a middlebox to ensure no request reaches server unless it complies with enterprise security policies and compliance requirements. It is particularly suitable for hierarchical environments where the owner acts as a centralized gateway for multiple proxies.</t>
            </li>
            <li>
              <t>Attack Surface: The owner becomes a high-value target and a single point of failure. If it is compromised, an attacker can forge approvals for any agent across the managed proxies. To mitigate this, mutual authentication and cryptographic integrity are mandatory between proxies and the owner. Furthermore, as a centralized gateway, the owner is vulnerable to Denial-of-Service attacks. It is essential to implement rate limiting and request queuing.</t>
            </li>
          </ul>
        </section>
        <section anchor="server-mediated-challenge-response">
          <name>Server-Mediated (Challenge-Response)</name>
          <t>In this model, the owner acts as an independent verifier. The server orchestrates the binding phase by contacting the owner as a separate step in the issuance logic, decoupling the binding from the agent's request.</t>
          <t>This mechanism is integrated into the basic architecture as shown in Figure 4. First, the agent sends an identity credential request to the server via the proxy (steps 1 and 2), then:</t>
          <t>a. The server pauses the process and sends a binding challenge to the owner on whose behalf the requesting agent acts. This initiates the owner confirmation flow.</t>
          <t>b. The owner reviews the challenge, signs it, and returns the response to the server.</t>
          <t>After that, the server validates the owner's response, completes the identity binding, and issues the dual-identity credential to the agent via the proxy (steps 3 and 4).</t>
          <artwork><![CDATA[
  +----------------------------+(a)challenge  +---- --+
  |                            +-------------->       |
  |       Identity Server      <--------------+ Owner |
  |                            |(b)signature  |       |
  +-------------- ^ +----------+              +---- --+
               (2)| |(3)
+-----------------+-+-----------------------------------+
| Trust Domain    | |                                   |
| +---------------+-v----------+     (1)      +-------+ |
| |              |             |--------------+       | |
| |Identity Proxy|  Agent API  |--------------> Agent | |
| |              |             |     (4)      |       | |
| +----------------------------+              +-------+ |
+-------------------------------------------------------+
]]></artwork>
          <t><em>Figure 4: Server-Mediate Model</em></t>
          <ul spacing="normal">
            <li>
              <t>Typical Application Scenarios: This model is suitable for scenarios requiring independent and real-time confirmation from an owner who is not involved in the initial request path. For instance, An agent is deployed by a service provider on behalf of an organization. When the agent requests an identity credential, the server initiates an out-of-band verification directly to the administrative center.</t>
            </li>
            <li>
              <t>Attack Surface: The primary risk lies in the out-of-band channel. Without nonces or mutual authentication, an attacker could intercept this channel to perform response forgery or replay attacks.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="comparison-with-cheq">
      <name>Comparison with CHEQ</name>
      <t>While both this document and CHEQ <xref target="I-D.draft-rosenberg-cheq-00"/> introduce a human element to enhance security,  their goals and the underlying mechanisms are different.</t>
      <t>CHEQ focuses primarily on controlling the actions of AI agents. It requires user double confirmation when an AI Agent invokes an OAuth access token request, preventing possible deviation from user expectations.</t>
      <t>The purpose of this document is to provide distinct identity and credentials to AI agents, whether or not it is bound to an owner user of device's parent identity. Whether or not the agent inherits access permission privileges from its user is out of scope of this document.</t>
    </section>
    <section anchor="initial-trust-establishment">
      <name>Initial Trust Establishment</name>
      <t>AI agents may operate in cloud or campus. In the cloud, the initial trust establishment between the proxy and the server has already been solved by solutions like SPIRE.  However, in campus scenarios,  the heterogeneity and limited manageability of devices make credential provisioning challenging, complicating initial trust establishment.</t>
      <t>BRSKI <xref target="RFC8995"/> provides a feasible method by introducing a cryptographically signed artifact called "voucher".</t>
      <t>In the BRSKI flow, the proxy (acting as a BRSKI pledge) discovers the server (acting as a BRSKI registrar), initiates a TLS handshake, and sends a voucher request including its immutable manufacturer credential-the IDevID (Initial Device Identifier). The server uses this IDevID to contact the manufacturer's service (MASA). After validating the request, the MASA issues a signed voucher.</t>
      <t>The proxy then verifies the manufacturer's signature on the voucher, which securely transferring trust from the manufacturer to the local domain. This verified trust is a prerequisite for the server to issue a local domain device certificate (LDevID). This certificate enrollment step essentially follows the standard EST mechanism <xref target="RFC7030"/>.</t>
      <t>However, it should be noted that BRSKI is not necessarily the only way to achieve this secure integration. The core goal is to bridge the initial trust gap. If the proxy is pre-configured with the target server's public key or certificate and can securely locate it, the standard EST protocol alone may be sufficient to establish trust and obtain the LDevID certificate.</t>
      <t><strong>Open Question:</strong> What are the precise conditions and mechanisms for determining the use of various bootstrap methods (including but not limited to BRSKI and EST)?</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-wimse-arch-06">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as a
   running instance of software executing for a specific purpose.  This
   document discusses an architecture for designing and standardizing
   protocols and payloads for conveying workload identity and security
   context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-06"/>
        </reference>
        <reference anchor="I-D.draft-rosenberg-cheq-00">
          <front>
            <title>CHEQ: A Protocol for Confirmation AI Agent Decisions with Human in the Loop (HITL)</title>
            <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
              <organization>Five9</organization>
            </author>
            <author fullname="Pat White" initials="P." surname="White">
              <organization>Bitwave</organization>
            </author>
            <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
              <organization>Cisco</organization>
            </author>
            <date day="24" month="July" year="2025"/>
            <abstract>
              <t>   This document proposes Confirmation with Human in the Loop (HITL)
   Exchange of Quotations (CHEQ).  CHEQ allows humans to confirm
   decisions and actions proposed by AI Agents prior to those decisions
   being acted upon.  It also allows humans to provide information
   required for tool invocation, without disclosing that information to
   the AI agent, protecting their privacy.  CHEQ aims to guarantee that
   AI Agent hallucinations cannot result in unwanted actions by the
   human on whose behalf they are made.  CHEQ can be integrated into
   protocols like the Model Context Protocol (MCP) and the Agent-to-
   Agent (A2A) protocols.  It makes use of a signed object which can be
   carried in those protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rosenberg-cheq-00"/>
        </reference>
        <reference anchor="I-D.draft-messous-eat-ai-01">
          <front>
            <title>Entity Attestation Token (EAT) Profile for Autonomous AI Agents</title>
            <author fullname="Ayoub MESSOUS" initials="A." surname="MESSOUS">
              <organization>Huawei R&amp;D</organization>
            </author>
            <author fullname="Lionel Morand" initials="L." surname="Morand">
              <organization>Huawei R&amp;D</organization>
            </author>
            <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
              <organization>Huawei</organization>
            </author>
            <date day="23" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a profile for the Entity Attestation Token
   (EAT) to support remote attestation of autonomous AI agents across
   domains.  It specifies a set of standardized claims for attesting the
   integrity of AI model parameters, the provenance of training data,
   and the constraints of inference-time data access policies.  Optional
   extensions for 5G/6G network functions—such as slice-type
   authorization—are included for interoperability with ETSI ENI and
   3GPP architectures.  The profile is encoded in CBOR Web Tokens (CWTs)
   or JSON Web Tokens (JWTs) and is designed to be used within the IETF
   RATS architecture.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-messous-eat-ai-01"/>
        </reference>
        <reference anchor="A2A-SPEC" target="https://a2a-protocol.org/latest/topics/enterprise-ready/">
          <front>
            <title>Agent2Agent (A2A) Protocol Specifications</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 290?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
