Hi all,

I've submitted a new individual Internet-Draft proposing an identity
protocol for autonomous AI agents:

  draft-gudlab-agentid-protocol-00
  "AgentID: An Identity Protocol for Autonomous AI Agents"

  https://datatracker.ietf.org/doc/draft-gudlab-agentid-protocol/

PROBLEM
-------

OAuth solved user-to-app delegation. OpenID Connect solved user
identity federation. But as AI agents increasingly make autonomous
requests to APIs and services, we have no standardised answer to:

  1. Which agent is making this request?
  2. Who is accountable for it?
  3. What is it permitted to do?

The result is ad-hoc solutions: raw API keys with no ownership
tracing, OAuth tokens repurposed beyond their design intent, and
proprietary agent authentication schemes that fragment the ecosystem.

APPROACH
--------

AgentID introduces the Agent Identity Token (AIT) - a signed JWT
(ES256) carrying:

  - Agent identity claims (agent_id, name, version)
  - Owner accountability claims (owner_id, verification_level 0-3)
  - Capability claims (resource:action namespace)
  - Delegation chain with scope attenuation

The protocol defines:

  - Four owner verification levels (email -> domain DNS -> KYB)
  - Three service-side access tiers (open/authenticated/permissioned)
  - Transparent delegation chains where each hop can only narrow
    permissions (scope attenuation)
  - A registry API for public key distribution (JWKS), agent lookup,
    and real-time revocation

RELATIONSHIP TO EXISTING WORK
-----------------------------

This draft is complementary to:

  - draft-klrc-aiagent-auth-00 (Kasselman et al.) which proposes
    applying existing OAuth/WIMSE standards to agent auth. AgentID
    focuses specifically on the *identity* layer - giving each agent
    a stable, verifiable identity with owner accountability and
    delegation provenance. The two drafts address different layers
    of the same problem.

  - draft-yl-agent-id-requirements-00 (Yao, Liu) which defines
    requirements for AI agent digital identity. AgentID proposes a
    concrete protocol meeting many of those requirements.

  - OAuth 2.0 Token Exchange (RFC 8693) which AgentID's delegation
chain references as one evidence mechanism ("oauth2:token_exchange").

AgentID does NOT replace OAuth. It adds agent-to-service identity
as a layer that works alongside OAuth user authorization. A service
can verify "which agent?" (AgentID) independently from "what did the
user allow?" (OAuth).

KEY DESIGN DECISIONS
--------------------

  - ES256-only (compact signatures for high-frequency agent traffic)
  - Self-contained tokens (offline verification via cached JWKS)
  - Max 24h token lifetime (1h recommended)
  - jti-based replay prevention
  - Owner verification is tiered, not binary
  - Delegation chains enforce scope attenuation at each hop

FEEDBACK REQUESTED
------------------

I would particularly welcome feedback on:

  1. Whether the AIT claim set is sufficient or over-specified
  2. The delegation chain model vs. alternatives (e.g., nested JWTs,
     token exchange chains)
  3. Interaction with WIMSE and existing workload identity work
  4. Whether this belongs as a standalone draft or should be folded
     into the broader agent auth effort (draft-klrc)

The spec, reference implementation, and discussion are also on GitHub:
https://github.com/gudlab/agentid

Looking forward to the discussion.

Best,
Tim Uzua
GudLab | gudlab.org

_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to