<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-kuehlewind-audit-architecture-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Agent Auditing Architecture">An Architecture for Auditing AI Agent Delegation and Interactions</title>
    <seriesInfo name="Internet-Draft" value="draft-kuehlewind-audit-architecture-00"/>
    <author initials="M." surname="Kuehlewind" fullname="Mirja Kuehlewind">
      <organization>Ericsson</organization>
      <address>
        <email>mirja.kuehlewind@ericsson.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <date year="2026" month="May" day="18"/>
    <keyword>audit</keyword>
    <keyword>accountability</keyword>
    <keyword>delegation</keyword>
    <keyword>agent</keyword>
    <keyword>attestation</keyword>
    <keyword>transparency</keyword>
    <keyword>traceability</keyword>
    <abstract>
      <?line 55?>

<t>This document describes an architecture for auditing of agent-driven interactions on the Internet.
Autonomous and semi-autonomous software agents, including those based on artificial intelligence, increasingly act on behalf of users, organizations, and services.
Existing auditing mechanisms often capture isolated system events but do not consistently represent delegation relationships, user intent, or evolving authorization.
In agent-driven systems, auditability requires linking intent, delegation, authorization, and execution.
The proposed architecture enables this through distributed audit record generation, propagation of audit context, optional attestation, and additonal logging for transparency.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/mirjak/draft-audit-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Autonomous and semi-autonomous software agents based on large language models (LLMs) and similar non-deterministic systems are deployed to take consequential actions on behalf of users and organizations.
These agents interact across administrative and trust domains, delegate tasks and authority to other agents or tools, and initiate consequential actions without per-step human oversight.
The question of whether the recorded actions of an agent faithfully represent what the agent actually did has acquired new urgency.</t>
      <t>Autonomous agents may run long-lived workflows without tight user interaction or may be very short-lived, e.g. for a delegated sub-tasks.
Agents may be authenticated to several services, request step-up approval from a human, spawn further sub-agents, and produc records that long outlive its own process.
Existing auditing mechanisms often capture isolated system events but do not consistently represent delegation relationships, user intent, or evolving authorization.
In agent-driven systems, auditability requires linking intent, delegation, authorization, and execution.</t>
      <t>This document describes an architecture that enables this form of auditing through three layers:
- distributed audit record generation by each participant,
- propagation of audit context across protocol interactions, and
- optional attestation and independent third-party logging for transparency that provides verifiable assurances about the content and origin of records.</t>
      <t>The architecture in this document identifies roles and their duties, describes the classes of interaction that must be audited, and discusses an example data model to make audits interoperable across vendors, domains, and time.</t>
      <t>Two principles frame the rest of this document:</t>
      <ol spacing="normal" type="1"><li>
          <t>Agents participate in <em>two distinct classes of interaction</em> that must each be auditable: user-facing interactions (prompts, approvals, human-in-the-loop confirmations) and system-facing interactions (API calls, tool invocations, delegation to other agents or services).
Effective auditing requires linking user intent to resulting system actions across protocol and administrative boundaries.</t>
        </li>
        <li>
          <t>Unlike traditional delegated workflows in which authorization transitions are explicit and predefined, AI agent systems introduce dynamic, fine-grained authorization changes that arise during execution and are driven by agent decisions, sub-agent delegation, and human interaction.
Auditing must therefore capture authorization as a <em>time-evolving state</em> and must correlate transitions across interactions and domains by maintaining common context.</t>
        </li>
      </ol>
      <section anchor="relationship-to-other-ietf-work">
        <name>Relationship to Other IETF Work</name>
        <t>The architecture is designed to compose existing IETF building blocks to make verifiable what these layers already do rather than redefining them.</t>
        <t>Remote attestation follows RATS <xref target="RFC9334"/> supplies the environmental evidence of the record's origin: RATS Evidence, Attestation Results, and Endorsements are reused verbatim as the vocabulary for environmental claims about audit-record producers.</t>
        <t>Transparency follows SCITT <xref target="I-D.ietf-scitt-architecture"/>that makes a record's existence later un-deniable: SCITT Signed Statements, Receipts, and Transparent Statements are the canonical artifacts, and SCITT-compatible Transparency Services are the canonical substrate for non-repudiable custody.</t>
        <t>The Verifiable Agent Conversations data model <xref target="I-D.birkholz-verifiable-agent-conversations"/> could be utilizd as an Interaction Record.</t>
        <t>HTTP may be used as the transport mechanism for conveying audit context alongside requests. JSON-based formats, including JWT and COSE, can proide representations for audit records and attestations, along with mechanisms for cryptographic protection.</t>
        <t>Authority and delegation are based on by OAuth 2.0 <xref target="RFC6749"/>, Token Exchange <xref target="RFC8693"/>, Transaction Tokens <xref target="I-D.ietf-oauth-transaction-tokens"/>, Identity Chaining <xref target="I-D.ietf-oauth-identity-chaining"/>, Identity Assertion Authorization Grants <xref target="I-D.ietf-oauth-identity-assertion-authz-grant"/>, RAR <xref target="RFC9396"/>, attestation-based client authentication <xref target="I-D.ietf-oauth-attestation-based-client-auth"/>, DPoP <xref target="RFC9449"/>, Status Lists <xref target="I-D.ietf-oauth-status-list"/>, and SPIFFE client authentication <xref target="I-D.ietf-oauth-spiffe-client-auth"/>.</t>
        <t>Workload identity follows WIMSE <xref target="I-D.ietf-wimse-arch"/>, which this document specializes for AI Agents.</t>
        <t>The three principal acting roles as described in the next section and shown in <xref target="fig-arch"/> have parallel counterparts in OAuth and WIMSE; a deployment may use both.
The following table shows a simple mapping:</t>
        <t>| Actor View (this document) | OAuth view <xref target="RFC6749"/> | WIMSE view <xref target="I-D.ietf-wimse-arch"/> |
|---|---|---|
| User | Resource Owner | Principal of a run; may also be a Workload in machine-only runs |
| AI Agent | OAuth Client | Workload (with <tt>sub_profile=ai_agent</tt>) presenting a Workload Identity Credential |
| External Service / Tool | Resource Server | Service-side Workload or external endpoint of another Trust Domain |
<!--{: #tbl-role-mappings title="OAuth and WIMSE role mappings for the three principal acting roles."}-->
        </t>
        <t>The auditing layer adds the cross-layer artifacts (audit records and context, agent interaction records, attestation references, and transparency receipts) that turn isolated layer events into a verifiable audit trail.</t>
      </section>
    </section>
    <section anchor="motivating-use-cases">
      <name>Motivating Use Cases</name>
      <t>The need for interoperable auditing of agent-driven systems arises from both regulatory requirements and user trust expectations.
The following examples highlight scenarios where traditional logging is insufficient and where an explicit auditing architecture for agents provides value.</t>
      <t>The proposed auditing architecture provides traceability of data access and enables reconstruction of the full chain from user intent to execution, including the full delegation chain that might change dynamically and authorization decisions, providing the desired verifiable audit trail suitable for compliance and review.</t>
      <section anchor="financial-transactions-by-agents">
        <name>Financial Transactions by Agents</name>
        <t>Agents may execute financial operations such as payments or procurement actions on behalf of users, often involving multiple systems.
Regulatory frameworks (e.g., SOX, PSD2) require that transactions be attributable, authorized, and auditable.</t>
        <t>Traditional logs typically capture only execution events (e.g., “payment executed”), without clearly linking them to user intent, approvals, or delegation steps.
This makes it difficult to verify whether actions were properly authorized.</t>
      </section>
      <section anchor="long-running-autonomous-agents">
        <name>Long-Running Autonomous Agents</name>
        <t>Some agents operate continuously over extended periods, making decisions and performing actions based on changing conditions.
For example, a procurement agent may manage ordering and inventory over days or weeks.
In such scenarios, authorization evolves over time due to policy changes, approvals, or context-dependent decisions.
Delegation paths may also change dynamically.</t>
      </section>
      <section anchor="everyday-agent-interaction">
        <name>Everyday Agent Interaction</name>
        <t>Even simple consumer use cases benefit from improved auditing.
For example, an assistant may book a restaurant on behalf of a user by selecting a venue and interacting with a booking service.
If the result is unexpected, traditional logs provide limited insight into how the decision was made or which services were involved.</t>
      </section>
      <section anchor="data-sharing-and-user-trust">
        <name>Data Sharing and User Trust</name>
        <t>Agents often access and share (sensitive) user data with external services.
For example, an assistant may send a user’s address to a delivery provider.
Without detailed auditing, it is difficult to verify what data was accessed, what was shared, and with whom. Unintended disclosure can undermine user trust.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Architectural Overview</name>
      <t><xref target="fig-arch"/> shows a high level end-to-end view of the proposed architecture: three principal acting roles produce records about their own behaviour. These records flow into supporting services that store, attest, and expose them to consumers that can verify their authenticity and provenance.</t>
      <figure anchor="fig-arch">
        <name>Roles view: principal acting roles, auditing services, and the records that flow among them.</name>
        <artwork><![CDATA[
+---------------+        +---------------+        +---------------+
|     User      |        |   AI Agent    |        |   External    |
|               +------->+               +------->+   Services /  |
+---------------+        +---------------+        |   Tools       |
         |                        |               +---------------+
         |                        |                       |
         v                        v                       v
   Interaction Records     Agent Records           Service Records
         |                        |                       |
         +------------------------+-----------------------+
                                  |
                                  v
       +--------------------------+---------------------------+
       |                   Auditing Service                   |
       |  +--------------+  +--------------+  +------------+  |
       |  |  Attestation |  |   Audit      |  |Transparency|  |
       |  |              |  |   Store      |  |Log         |  |
       |  +--------------+  +--------------+  +------------+  |
       +------------------------------------------------------+
                                  |
                                  v
                +-----------------+-------------------+
                |    Audit Consumers / Verifiers      |
                +-------------------------------------+
]]></artwork>
      </figure>
      <t>The proposed architecture enables interoperable auditing of agent-driven interactions by combining distributed audit record generation, audit context propagation, and optional attestation and transparency logging.
Audit information is produced by multiple actors operating across administrative domains and is later reconstructed and validated by audit consumers through a shared audit context and may be accompanied by attestations.</t>
      <t>Audit records are generated distributively.
Each principal acting role (user, agent, service/tool) records its own behaviour rather than relying on a central observer.
These records are linked via a propagated audit context with a coherent trail:
Interaction Records flow are generated by the User; Action and Delegation Records flowby the Agent; Service Records flow by external Services/Tools.
Each actor may produce mutiple records to, e.g., audit actions, delegation, or authorization changes.
Distributed record generation limits the trust placed in any single point.
Two trust mechanisms are composed (attestation and transparency logging).
An auditing system may select either, both, or neither according to the strength of evidence its Auditors require.</t>
      <t>The auditing services (Attestation, Audit Store, and Transparency Log) are distinct from the interaction and authorization layers that drives the three acting roles.
They can be or need to be operated by different parties dependeing on trust requirements of auditor.
Attestations may be directly provided by the producer or supplied on request by an Attestation Service.
An Audit Store canonicalises observable agent signals into the records and exposes them to Audit Consumers and Verifiers.
The Store is logically distinct from the Agent it records, because an agent that records itself can produce useful telemetry but cannot, by itself, deliver non-repudiation to a third party.
Transparency receipts provided by the Transparency Log are embedded in or referenced from the records.</t>
      <section anchor="audit-records-and-context">
        <name>Audit Records and Context</name>
        <t>Audit records are generated independently by participating actors and reflect different perspectives of an interaction.
User-facing systems produce records capturing intent, such as prompts or approvals.
Agents produce records describing decisions, actions, and delegation steps.
Services produce records reflecting execution outcomes.</t>
        <t>These records are linked through a shared audit context that is propagated across protocol interactions.
This context carries identifiers such as a trace identifier and references to prior events, enabling reconstruction of a causal chain.
It also carries identity information, including the acting entity and, where applicable, the entity on whose behalf the action is performed.</t>
        <t>Transport mechanisms such as HTTP are used for propagating this context, for example via headers or message metadata.
Existing approaches such as W3C's trace context propagation can serve as a basis but require extension to include identity, delegation, and authorization state.
As such, correlation is not performed by a centralized component.
Instead, it emerges from consistent use of shared identifiers and structures across all participants.</t>
      </section>
      <section anchor="attestation-model">
        <name>Attestation Model</name>
        <t>Audit records may include attestation evidence that provides verifiable assurances about their content.
An attestation binds a statement to a cryptographic identity and allows relying parties to validate claims about events, delegation, or execution.</t>
        <t>Attestations are generated at or on behalf of the entity asserting a claim and are associated with audit records at creation time.
Attestation can have different levels of assurance, depending on the type of origin (ranging from self-assertions to RATS evidence).
An agent or service may self-attest its actions using mechanisms such as JSON Web Signatures or COSE-based signatures.
In other cases, the producer interacts (taking on the role of a RATS Attester) with an external remote attestation service (i.e., a RATS Verifier) to obtain an additional statement (an Attestation Result).</t>
        <t>Further, the transparency service may attest that a record has been recorded in an append-only log.
And the audit store may provide additional attestations, such as timestamping or proof of inclusion.
But this does not replace attestations generated by record producers.</t>
      </section>
      <section anchor="identity-substrate">
        <name>Identity Substrate</name>
        <t>An AI Agent is treated as a specialisation of a Workload <xref target="I-D.ietf-wimse-arch"/>, with a Workload Identifier <xref target="I-D.ietf-wimse-identifier"/> scoped within a Trust Domain and a Workload Identity Credential (e.g., a WIT <xref target="I-D.ietf-wimse-workload-creds"/>) bound to a key the workload generates and retains.
The credential is never a bearer token and is normally short-lived.
For auditing it is benefical if an Agent also carries a role profile (per <xref target="I-D.mcguinness-oauth-actor-profile"/>'s <tt>sub_profile</tt> convention) so that downstream parties can distinguish an AI-driven Workload from a human-operated client or a traditional service.
The role-profile vocabulary is the subject of a separate specification (WI-2 in <xref target="work-items"/>).</t>
      </section>
    </section>
    <section anchor="roles">
      <name>Roles</name>
      <t>A role is a function, not a deployment unit.
The same entity may take on several roles.</t>
      <section anchor="principle-agent-interaction-actors">
        <name>Principle Agent Interaction Actors</name>
        <t>The User is the human or organisation on whose behalf an Agent acts.
Where the User is a natural person they are also the OAuth Principal of the run: the <tt>sub</tt> of any token issued for the run and the original authorizing party in any delegation chain.
On the audit layer the User's duty is to issue intent in a verifiable form--prompt, approval, or signed grant--and to respond to step-up escalations.</t>
        <t>An AI Agent is a Workload <xref target="I-D.ietf-wimse-arch"/> whose behaviour is driven, in whole or in part, by a non-deterministic decision process (typically an LLM).
Agents operate within the authorization they were issued, propagate the upstream Principal's identity and the delegation context
unmodified except where an exchange explicitly authorises a change, and emit observable signals, such as prompts, actions, tool calls, sub-agent invocations, terminations, that an Audit Store can canonicalise.
Where an Agent signs records itself, it signs with a key bound to its Workload Identity Credential, never with a long-lived shared key.
A Sub-Agent is an Agent invoked by another Agent rather than directly by a User.
This distinction is positional and not categorical.
A Sub-Agent receives a downscoped authorization, represented in the delegation chain, and re-binds the chain on outbound calls so downstream Services can attribute the call correctly and trace back to the parent.</t>
        <t>A Tool is co-located with or directly invocable from an Agent runtime (filesystem, shell, sandbox, function call).
A Service is a remote workflow reached via a network protocol.
A Resource Server provides an access service to an authorization-protected resource.
All three enforce the Agent's presented authorization at the point of effect and emit per-request records bound to the Agent's Workload Identity Credential.
Those records reflect the canonical request as observed at the boundary, not as reported by the Agent.</t>
      </section>
      <section anchor="auditing-services">
        <name>Auditing Services</name>
        <t>The Auditing Service canonicalises observable records (Interaction, Action, Delegation, Authorization Transition), signs them with a key bound to its own identity, and submits them for registration with a Transparency Log before they leave the operational environment.
The Auditing Service is logically distinct from the User, Agent, or Tool it records: the architecture's accountability properties require either an independent Auditing Service.</t>
        <t>The Audit Store is a generic role of storing audit records after they have been produced.
Substrates range from append-only databases and SIEM-fed log stores to fully transparent registries.
Deployment requires only availability of records may use any type of Audit Store implementation.</t>
        <t>Attestation binds a record to the operational state of the environment in which it was produced.
A record may carry inline Evidence about that environment, an Attestation Result derived from that Evidence by a Verifier, or a stable reference to either, and the resulting record carries a verifiable claim about <em>what was running</em> and <em>in what configuration</em> when the recorded action took place.
Remote Attestation is the architecture's principal candidate for producing records that are authentic in this sense.
RATS <xref target="RFC9334"/> is the canonical instance.</t>
        <t>The Transparency Log binds a record to an append-only, non-equivocating statement sequence.
Once a Transparency Log has issued a receipt for a signed statement, the record's existence and content at registration time can no longer be denied, and no Auditor with read access can be presented with an inconsistent view of the history.
Transparency is the architecture's principal mechanism for producing records that are non-repudiable in this sense.
SCITT <xref target="I-D.ietf-scitt-architecture"/> is the canonical instance.</t>
        <t>Attestation and transparency answer different questions: attestation answers "is this record authentic?", transparency
answers "did this record exist as claimed?".
They compose freely as a record may carry attestation evidence and be transparently registered, and the resulting receipt then binds that combination immutably.</t>
      </section>
      <section anchor="auditor">
        <name>Auditor</name>
        <t>The Auditor consumes Interaction, Action, Delegation, and Authorization Transition Records together with the receipts that bind them, and determines whether recorded behaviour matched the User's intent and the authorization in force at the time and, where appropriate, whether the recorded evidence supports or contradicts a claim of compliance.
The Auditor is not required to trust the Agent: the entire point of the architecture is to make the Agent itself the auditable object.</t>
      </section>
      <section anchor="role-aggregation">
        <name>Role Aggregation</name>
        <t>An entity can assume one or more roles.
An Agent's host process may also implement the Audit Recorder role for that Agent.
Doing so simplifies deployment but introduces recorder-collusion threats that the architecture mitigates by either an independent Recorder or non-repudiable registration with a Transparency Service.
An Auditor can be operated by an organisation distinct from the one operating the Recorder, the Transparency Service, the Auditing Service, or the Agent.
The architecture's requirements apply across role boundaries even when those roles are co-located.</t>
      </section>
    </section>
    <section anchor="interactions">
      <name>Record Types</name>
      <t>This document proposes an initial set of four record types for agent auditing:</t>
      <dl>
        <dt>Interaction Records:</dt>
        <dd>
          <t>capture user-facing events (prompts, model responses, instructions, approvals, refusals) and agent-to-agent dialogue treated as conversation.</t>
        </dd>
      </dl>
      <t>The Verifiable Agent Conversations data model <xref target="I-D.birkholz-verifiable-agent-conversations"/> is the principal candidate format
for the user-Agent dialogue subtype.</t>
      <t>Human-in-the-loop escalations, like step-up approvals, refusals, or the rarer case of an action that should have been escalated but was not, appear as identifiable records bindable to the run's Interaction Record.</t>
      <dl>
        <dt>Action Records:</dt>
        <dd>
          <t>capture system-facing events at the boundary where the action took effect.</t>
        </dd>
      </dl>
      <t>An Action Record may carry inline Evidence, an Attestation Result, or a stable reference to either; where Evidence is unavailable, that absence is itself an audit-relevant fact and can be recorded.</t>
      <dl>
        <dt>Delegation Records:</dt>
        <dd>
          <t>capture the assignment of authority from one entity to another,e.g., delegator, delegatee, scope, and constraints
on use.</t>
        </dd>
      </dl>
      <t>Authorization delegation records are used to audit which authority is transmitted along the chain from User through Agent through Sub-Agent to Tool or Service.
Across that chain, the record remains append-only, meaning no actor removes or reorders prior actors.
Any cross-domain transition is recorded with enough fidelity that an Auditing Service on either side can make sense of it without access to the other side's pipeline.</t>
      <dl>
        <dt>Authorization Transition Records:</dt>
        <dd>
          <t>capture changes in permission state over time: initial grants, step-up approvals, scope narrowing on exchange, revocation, and expiry.</t>
        </dd>
      </dl>
      <t>Authorization is considered as a time-evolving state.
The ordered sequence of Authorization Transition Records of a run reconstructs the authorization in force at any point within it.</t>
      <t>Concrete illustrative shapes for each are given in <xref target="examples"/>.
The four classes of records share a common correlation identifier in the Audit Context (see <xref target="ex-audit-token"/> and WI-11), so that a User's stated intent and an Agent's executed action remain linkable across protocol and administrative boundaries.</t>
      <t>Consequential records are attested by an in-device or third-party service, stored in the Audit Store for retrival by an authorized auditor, and registered with a Transparency Service before they leave the operational environment, or as soon as network conditions permit.</t>
    </section>
    <section anchor="work-items">
      <name>Potential Work Items</name>
      <t>The following work items are proposed for potential specifications that support this architecture:</t>
      <ul spacing="normal">
        <li>
          <t><strong>WI-1: Audit Data Models and Semantics.</strong>
The canonical structure of Interaction, Action, Delegation, and Authorization Transition Records (<xref target="interactions"/>), encoded in at least one IETF-recognised serialisation (CBOR/COSE or JSON/JWS) with support for detached payloads, and carrying actor identity unambiguously across User, Agent, Sub-Agent, Tool, and Service.</t>
        </li>
        <li>
          <t><strong>WI-2: Delegation-Chain Wire Profile.</strong>
Specify both a Cryptographic Delegation Chain carried in token bodies (nested <tt>act</tt> per <xref target="RFC8693"/>; <tt>acti</tt>/<tt>actc</tt> candidates from <xref target="I-D.mw-oauth-actor-chain"/>) as well as a Tracing Delegation Chain (a flat, lightweight Actor sequence suitable for audit context, HTTP headers, and standalone records) with a defined reconciliation path between them.
This item includes a representation for cross-domain transitions, and a <tt>sub_profile</tt> <xref target="I-D.mcguinness-oauth-actor-profile"/> vocabulary that distinguishes AI Agent, Sub-Agent, Tool, Service, and Human.</t>
        </li>
        <li>
          <t><strong>WI-3: Interaction Record Profile.</strong>
A canonical Interaction Record format for prompts, responses, instructions, approvals, refusals, tool-invocation traces, reasoning traces (where exposed by the model), and system events, potentially with an identifiable HITL subtype and a registration profile compatible with SCITT.
<xref target="I-D.birkholz-verifiable-agent-conversations"/> is the principal candidate for the User-Agent dialogue subtype.
This work item does not preclude additional profiles for non-conversational interactions, such as network device interaction.</t>
        </li>
        <li>
          <t><strong>WI-4: Action Record Profile.</strong>
A canonical Action Record produced at the boundary where each tool or service call took effect, bound to its parent Interaction Record via SC-2/SC-11 tracing identifiers, to its authorizing Token, and (when available) to the Attestation Result for the executing environment.
Distinguishes the Recorder's signing identity from the recorded Agent's identity where the two are operationally separated.</t>
        </li>
        <li>
          <t><strong>WI-5: HITL Escalation Signalling.</strong>
Communication of step-up requests from Agent to User and the User's response, e.g., approval, refusal, or timeout, in a form auditable end-to-end and bindable to the resulting authorization state.</t>
        </li>
        <li>
          <t><strong>WI-6: Profile of RATS Evidence.</strong>
How Evidence is referenced from Interaction and Action Records using <xref target="RFC9334"/>'s encoding-agnostic Conceptual Messages, and how Attestation Results derived from such Evidence are consumed by Identity Issuance Authorities, Services, and Auditors.</t>
        </li>
        <li>
          <t><strong>WI-7: Profile of SCITT Transparency.</strong>
A Registraton Policy profile of <xref target="I-D.ietf-scitt-architecture"/> for auditing records--admissible Issuers (Agents, Sub-Agents, Recorders) and required payload media types--and a Receipt presentation profile permitting Auditors to verify non-repudiation independently of any single Transparency Service.</t>
        </li>
        <li>
          <t><strong>WI-8: Authorization Transition Encoding.</strong>
A canonical Authorization Transition Record format carrying previous state, new state, triggering event, and responsible actor (see <xref target="ex-auth-transition"/>), reusing <xref target="I-D.ietf-oauth-status-list"/> where the state is a token-status state, and replayable to reconstruct authorization in force at any timestamp within a run.</t>
        </li>
        <li>
          <t><strong>WI-9: Auditor-Facing Query Interface.</strong>
An optional specialised query profile over the Audit Store and Transparency Log, surfacing records by session, workflow, principal, agent, tool, or time range, with authorization and privacy controls.</t>
        </li>
        <li>
          <t><strong>WI-10: Deployment and Operations Best Practices.</strong>
Recorder placement, Identity Issuance Authority configuration for ephemeral Workloads, Trust Domain partitioning, operational separation between Agent runtime and audit pipeline, and the privacy guidance on redaction, retention, and disclosure that
<xref target="privconsec"/> relies on.</t>
        </li>
        <li>
          <t><strong>WI-11: Audit Context Propagation Protocol Extensions.</strong>
This could be realized by an HTTP headers carrying the Audit Context, e.g. a workflow-wide <tt>Audit-Trace-ID</tt>, an immediate-redecessor <tt>Audit-Parent-ID</tt>, the current <tt>Audit-Actor</tt>, the upstream <tt>Audit-On-Behalf-Of</tt>, the SC-2 tracing chain as <tt>Audit-Delegation-Chain</tt>, and a reference to the current <tt>Audit-Auth-State</tt>.
Alternatively, a single composite <tt>Audit-Context</tt> header could be defined that provides the audit context embedded in OAuth token claims (<xref target="ex-audit-token"/>).
The relationship to existing distributed-tracing conventions (W3C Trace Context, OpenTelemetry) need to be considered.</t>
        </li>
      </ul>
    </section>
    <section anchor="examples">
      <name>Illustrative Audit Record Examples</name>
      <t>This section is informative.
It illustrates the four classes of audit record introduced in <xref target="interactions"/> and the audit context introduced in SC-2 and SC-11 with concrete examples.
The exact field names, claim names, and encodings shown here are placeholders pending the specifications defined in SC-1 through SC-11.
They are intended to convey the relationships among the artifacts.</t>
      <t>To enable interoperability, audit records require a common structure that captures identity, delegation, and causal relationships.
Each record includes identifiers for correlation, such as a trace identifier and a reference to a preceding event.
It identifies the acting entity and may include an “on-behalf-of” identity to represent delegation.
The record also captures relevant authorization state, such as scope and validity, which may be derived from OAuth tokens or authorization responses.</t>
      <section anchor="ex-audit-token">
        <name>Audit Context in an Access Token</name>
        <t>An access token or similar credential MAY include an <tt>audit</tt> claim carrying correlation and tracing-chain information alongside the conventional OAuth claims.
The cryptographic delegation chain remains in the OAuth <tt>act</tt> claim <xref target="RFC8693"/>; the <tt>audit</tt> claim carries the tracing-layer chain (SC-2) and the correlation identifiers used to link records:</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "authz.example",
  "sub": "agent-42",
  "aud": "calendar.service",
  "exp": 1715674800,

  "audit": {
    "trace_id": "trace-abc",
    "parent_id": "int-001",
    "delegation_chain": ["user-123", "agent-42"]
  },

  "authorization": {
    "scope": ["calendar.write"],
    "expires_at": "2026-05-14T11:00:00Z"
  }
}
]]></sourcecode>
        <t>The same information MAY be propagated using HTTP headers (SC-11)
or included in standalone audit records.</t>
      </section>
      <section anchor="ex-action">
        <name>Action Record</name>
        <t>An Action Record produced at the boundary where a tool or service call took effect:</t>
        <sourcecode type="json"><![CDATA[
{
  "event_id": "act-456",
  "trace_id": "trace-abc",
  "parent_id": "int-001",
  "timestamp": "2026-05-14T10:00:00Z",
  "type": "action",

  "actor": { "type": "agent", "id": "agent-42" },
  "on_behalf_of": { "type": "user", "id": "user-123" },

  "action": {
    "type": "api_call",
    "target": "calendar.service",
    "operation": "create_event"
  },

  "delegation_chain": ["user-123", "agent-42"],

  "authorization": {
    "scope": ["calendar.write"],
    "expires_at": "2026-05-14T11:00:00Z"
  }
}
]]></sourcecode>
        <t>The <tt>parent_id</tt> references the Interaction Record that motivated the action.
The <tt>delegation_chain</tt> is the SC-2 tracing chain.
The cryptographic chain lives in the authorizing token and is not duplicated here.</t>
      </section>
      <section anchor="ex-delegation">
        <name>Delegation Record</name>
        <t>A Delegation Record produced when an Agent narrows or assigns authority to a Sub-Agent:</t>
        <sourcecode type="json"><![CDATA[
{
  "event_id": "del-789",
  "trace_id": "trace-abc",
  "parent_id": "act-456",
  "timestamp": "2026-05-14T10:01:00Z",
  "type": "delegation",

  "delegator": { "type": "agent", "id": "agent-42" },
  "delegatee": { "type": "agent", "id": "agent-sub-1" },

  "scope": ["email.send"],

  "constraints": {
    "expires_at": "2026-05-14T10:30:00Z"
  }
}
]]></sourcecode>
      </section>
      <section anchor="ex-auth-transition">
        <name>Authorization Transition Record</name>
        <t>An Authorization Transition Record produced when a Principal's authorization state changes.
This example illustrates a user approval:</t>
        <sourcecode type="json"><![CDATA[
{
  "event_id": "auth-001",
  "trace_id": "trace-abc",
  "parent_id": "int-002",
  "timestamp": "2026-05-14T10:02:00Z",
  "type": "authorization_transition",

  "previous_state": { "scope": ["calendar.read"] },
  "new_state":      { "scope": ["calendar.read", "calendar.write"] },

  "trigger": { "type": "user_approval" },
  "actor":   { "type": "user", "id": "user-123" }
}
]]></sourcecode>
        <t>An ordered sequence of such records reconstructs the authorization state in force at any point in a recorded run.</t>
      </section>
    </section>
    <section anchor="secconsec">
      <name>Security Considerations</name>
      <t>The architecture's security properties are properties of the combination of mitigations supplied by the underlying layers (RATS, SCITT, WIMSE, OAuth) plus the bindings added by this architecture and any new potenial specification (<xref target="work-items"/>).
No single layer suffices on its own.</t>
      <t>While the final architecture and set of specification require a detailed security and threat model analysis, some initial consideration are stated here:</t>
      <t>First, the Agent is <em>not</em> trusted; the architecture is designed precisely for the case where the Agent's internal behaviour is the
subject of scrutiny.</t>
      <t>Second, the Audit Store is only partially trusted: its records are corroborated by independent Service-side records and, for
consequential actions, by registration with a Transparency Service.</t>
      <t>Third, neither a single Verifier nor a single Transparency Service is assumed sufficient: a deployment that requires defence against
compromise of either re-appraises Evidence against independent Reference Values and Endorsements, registers records to multiple
Transparency Services, and verifies mutual consistency in each case.</t>
      <t>The architecture does <em>not</em> solve the case of an adversarial Service that refuses to record what happened at its boundary, nor the case of operator collusion across all roles, nor the alignment of the model behind the Agent.</t>
    </section>
    <section anchor="privconsec">
      <name>Privacy Considerations</name>
      <t>Audit records of AI agent activity are intrinsically rich in information about the User, the User's intent, the Agent's reasoning trace where exposed, and the data the Agent processed in tool calls.
As such privacy considerations are of special importance for auditing.</t>
      <t>Prompt and response content frequently contain personally identifiable information, confidential business information, or content under contractual confidentiality.
Records of this content registered to a Transparency Service may be visible to a broader set of parties than the original interlocutors.
Subsequent specifications (WI-3) must permit detached payloads so that the registered Signed Statement may carry only a hash of the conversation, with the content held elsewhere under deployment controls; WI-10 best practice need to address redaction and retention policies.</t>
      <t>The chain identifier required for cross-service correlation (<xref target="interactions"/>) also enables correlation of an Agent's--and by extension a User's--activity across the Services it touches.
Chain identifiers can be encrypted to specific Auditors when the Service does not need to correlate itself, and pairwise per-Service identifiers (<xref target="I-D.johansson-direct-presentation-arch"/>'s pairwise pattern) could substitute for a single global chain identifier where correlation is not required.</t>
      <t>Tool-call outputs should be referenceable by hash rather than included inline in WI-4 Action Records.
Where inline inclusion is required, encryption to a specific Auditor should be supported.
Receipts <xref target="I-D.ietf-scitt-architecture"/> bind a registration to a position in the Transparency Service's data structure. the fact of registration leaks the existence of an interaction at a time even when the Statement payload is hash-only.</t>
      <t>Where an Agent operates across organisational boundaries, the audit context propagated outward reveals the existence and rough size of the workflow (via Trace ID continuity), the identity or pseudonym of every Actor that participated earlier in the workflow (via the
Tracing Delegation Chain), and the structural shape of the workflow (via the Parent ID graph).
These are not theoretical concerns; the same primitives are the basis of operational distributed-tracing systems where the trace stream is routinely used for capacity planning, account profiling, and adversarial reconnaissance.
To address this, the Tracing Delegation Chain could be replaced at an organisational boundary by an opaque identifier whose mapping is retained only at the originating side's Audit Store (the egress identity generalisation pattern of <xref section="3.3.8" sectionFormat="of" target="I-D.ietf-wimse-arch"/>).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>
        <reference anchor="I-D.ietf-wimse-arch">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as
   software executing for a specific purpose, potentially comprising one
   or more running instances.  This document discusses an architecture
   for designing and standardizing protocols and payloads for conveying
   workload identity and security context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-07"/>
        </reference>
        <reference anchor="I-D.ietf-wimse-identifier">
          <front>
            <title>Workload Identifier</title>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document defines a canonical identifier for workloads, referred
   to as the Workload Identifier.  A Workload Identifier is a URI that
   uniquely identifies a workload within the context of a specific trust
   domain.  This identifier can be embedded in digital credentials,
   including X.509 certificates and security tokens, to support
   authentication, authorization, and policy enforcement across diverse
   systems.  The Workload Identifier format ensures interoperability,
   facilitates secure identity federation, and enables consistent
   identity semantics.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-identifier-02"/>
        </reference>
        <reference anchor="I-D.ietf-wimse-workload-creds">
          <front>
            <title>WIMSE Workload Credentials</title>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>Defakto Security</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="5" month="May" year="2026"/>
            <abstract>
              <t>   The WIMSE architecture defines authentication and authorization for
   software workloads in a variety of runtime environments, from the
   most basic ones up to complex multi-service, multi-cloud, multi-
   tenant deployments.

   This document defines the credentials that workloads use to represent
   their identity.  They can be used in various protocols to
   authenticate workloads to each other.  To use these credentials,
   workloads must provide proof of possession of the associated private
   key material, which is covered in other documents.  This document
   focuses on the credentials alone, independent of the proof-of-
   possession mechanism.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-workload-creds-01"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-transaction-tokens">
          <front>
            <title>Transaction Tokens</title>
            <author fullname="Atul Tulshibagwale" initials="A." surname="Tulshibagwale">
              <organization>CrowdStrike</organization>
            </author>
            <author fullname="George Fletcher" initials="G." surname="Fletcher">
              <organization>Practical Identity LLC</organization>
            </author>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>Defakto Security</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   Transaction Tokens (Txn-Tokens) are designed to maintain and
   propagate user identity, workload identity and authorization context
   throughout the Call Chain within a trusted domain during the
   processing of external requests (e.g. such as API calls) or requests
   initiated internally within the trust domain.  Txn-Tokens ensure that
   this context is preserved throughout the Call Chain thereby enhancing
   security and consistency in complex, multi-service architectures.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-transaction-tokens-08"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-identity-chaining">
          <front>
            <title>OAuth Identity and Authorization Chaining Across Domains</title>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>Defakto Security</organization>
            </author>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>Defakto Security</organization>
            </author>
            <author fullname="Kelley Burgin" initials="K." surname="Burgin">
              <organization>MITRE</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>NSA-CCSS</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Aaron Parecki" initials="A." surname="Parecki">
              <organization>Okta</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   This specification defines a mechanism to preserve identity and
   authorization information across trust domains that use the OAuth 2.0
   Framework.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Web Authorization
   Protocol Working Group mailing list (oauth@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/oauth/.

   Source for this draft and an issue tracker can be found at
   https://github.com/oauth-wg/oauth-identity-chaining.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-identity-chaining-12"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-attestation-based-client-auth">
          <front>
            <title>OAuth 2.0 Attestation-Based Client Authentication</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>MATTR</organization>
            </author>
            <author fullname="Paul Bastian" initials="P." surname="Bastian">
              <organization>Bundesdruckerei</organization>
            </author>
            <author fullname="Christian Bormann" initials="C." surname="Bormann">
              <organization>SPRIND</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This specification defines an extension to the OAuth 2.0 protocol
   [RFC6749] that enables a client instance to include a key-bound
   attestation when interacting with an Authorization Server or Resource
   Server.  This mechanism allows a client instance to prove its
   authenticity verified by a client attester without revealing its
   target audience to that attester.  It may also serve as a mechanism
   for client authentication as per OAuth 2.0.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-attestation-based-client-auth-08"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-identity-assertion-authz-grant">
          <front>
            <title>Identity Assertion JWT Authorization Grant</title>
            <author fullname="Aaron Parecki" initials="A." surname="Parecki">
              <organization>Okta</organization>
            </author>
            <author fullname="Karl McGuinness" initials="K." surname="McGuinness">
              <organization>Independent</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="22" month="April" year="2026"/>
            <abstract>
              <t>   This specification provides a mechanism for an application to use an
   identity assertion to obtain an access token for a third-party API by
   coordinating through an identity provider that the downstream
   Resource Authorization Server already trusts for single sign-on
   (SSO), using Token Exchange [RFC8693] and JWT Profile for OAuth 2.0
   Authorization Grants [RFC7523].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-identity-assertion-authz-grant-03"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-status-list">
          <front>
            <title>Token Status List (TSL)</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>MATTR</organization>
            </author>
            <author fullname="Paul Bastian" initials="P." surname="Bastian">
              <organization>Bundesdruckerei</organization>
            </author>
            <author fullname="Christian Bormann" initials="C." surname="Bormann">
              <organization>SPRIND</organization>
            </author>
            <date day="20" month="April" year="2026"/>
            <abstract>
              <t>   This specification defines a status mechanism called Token Status
   List (TSL), data structures and processing rules for representing the
   status of tokens secured by JSON Object Signing and Encryption (JOSE)
   or CBOR Object Signing and Encryption (COSE), such as JWT, SD-JWT,
   CBOR Web Token, and ISO mdoc.  It also defines an extension point and
   a registry for future status mechanisms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-20"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-spiffe-client-auth">
          <front>
            <title>OAuth SPIFFE Client Authentication</title>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>Defakto Security</organization>
            </author>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>Defakto Security</organization>
            </author>
            <author fullname="Scott Rose" initials="S." surname="Rose">
              <organization>NIST</organization>
            </author>
            <author fullname="Stian Thorgersen" initials="S." surname="Thorgersen">
              <organization>IBM</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This specification profiles the Assertion Framework for OAuth 2.0
   Client Authentication and Authorization Grants [RFC7521], the JWT
   Profile for OAuth 2.0 Client Authentication and Authorization Grants
   [RFC7523], and OAuth 2.0 Attestation-Based Client Authentication
   [I-D.draft-ietf-oauth-attestation-based-client-auth] to enable the
   use of SPIFFE Verifiable Identity Documents (SVIDs) as client
   credentials in OAuth 2.0.  It defines how OAuth clients with SPIFFE
   credentials can authenticate to OAuth authorization servers using
   their JWT-SVIDs, WIT-SVIDs, or X.509-SVIDs without the need for
   client secrets.  This approach enhances security by enabling seamless
   integration between SPIFFE-enabled workloads and OAuth authorization
   servers while eliminating the need to distribute and manage shared
   secrets such as static client secrets.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-spiffe-client-auth-01"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8693">
          <front>
            <title>OAuth 2.0 Token Exchange</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
            <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8693"/>
          <seriesInfo name="DOI" value="10.17487/RFC8693"/>
        </reference>
        <reference anchor="RFC9396">
          <front>
            <title>OAuth 2.0 Rich Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="J. Richer" initials="J." surname="Richer"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document specifies a new parameter authorization_details that is used to carry fine-grained authorization data in OAuth messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9396"/>
          <seriesInfo name="DOI" value="10.17487/RFC9396"/>
        </reference>
        <reference anchor="RFC9449">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.birkholz-verifiable-agent-conversations">
          <front>
            <title>Verifiable Agent Conversation Records</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         </author>
            <author fullname="Tobias Heldt" initials="T." surname="Heldt">
         </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
         </author>
            <date day="25" month="February" year="2026"/>
            <abstract>
              <t>   Autonomous agents based on large language models increasingly perform
   consequential tasks on behalf of humans and other agents.
   Demonstrating that recorded agent behavior truthfully represents
   actual behavior is essential for accountability, compliance, and
   human oversight.  This document defines a data format for verifiable
   agent conversation records using CDDL, with representations in both
   JSON and CBOR.  The format captures session metadata, message
   exchanges, tool invocations, reasoning traces, and system events in a
   structured, extensible CDDL definition for verifiable agent
   conversation records.  COSE is used as the signing method to allow
   for native interoperability in SCITT Transparency Services and the
   CDDL definition allows for seemless integration in Evidence as
   specified in RFC 9334.  The specification supports cross-vendor
   interoperability by defining a common representation that
   accommodates translation from multiple existing agent implementations
   with distinct data structure layouts that are typically represented
   in JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-birkholz-verifiable-agent-conversations-00"/>
        </reference>
        <reference anchor="I-D.mcguinness-oauth-actor-profile">
          <front>
            <title>OAuth Actor Profile for Delegation</title>
            <author fullname="Karl McGuinness" initials="K." surname="McGuinness">
              <organization>Independent</organization>
            </author>
            <date day="30" month="April" year="2026"/>
            <abstract>
              <t>   OAuth deployments increasingly involve agents and workloads acting on
   behalf of human users across organizational boundaries.  Existing
   specifications provide relevant building blocks (notably the act
   claim from RFC 8693 Token Exchange) but do not define a consistent
   profile for representing delegated actor relationships across JWT
   assertion grants (RFC 7523), JWT access tokens (RFC 9068), and
   Transaction Tokens, nor for classifying actor entity types or
   signaling support between authorization servers and resource servers.
   The result is inconsistent actor representation and actor-
   representation interoperability gaps that force deployments to rely
   on proprietary conventions.

   This document defines the OAuth Actor Profile for Delegation.  It
   specifies a common act claim structure extended with sub_profile for
   entity-type classification, processing rules for authorization
   servers and resource servers across the three token families and
   their Token Exchange inputs, and OAuth discovery metadata parameters
   for advertising actor-profile support.  The profile applies uniformly
   across token types and integrates with existing sender-constraint
   mechanisms (DPoP, mTLS).  It does not standardize the policies by
   which systems determine whether a given actor is permitted to act for
   a subject; those decisions remain deployment-specific.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mcguinness-oauth-actor-profile-00"/>
        </reference>
        <reference anchor="I-D.mw-oauth-actor-chain">
          <front>
            <title>Cryptographically Verifiable Actor Chains for OAuth 2.0 Token Exchange</title>
            <author fullname="A Prasad" initials="A." surname="Prasad">
              <organization>Oracle</organization>
            </author>
            <author fullname="Ramki Krishnan" initials="R." surname="Krishnan">
              <organization>JPMorgan Chase &amp; Co</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Srinivasa Addepalli" initials="S." surname="Addepalli">
              <organization>Aryaka</organization>
            </author>
            <date day="1" month="May" year="2026"/>
            <abstract>
              <t>   Multi-hop service-to-service and agentic workflows need a
   standardized way to preserve and validate delegation-path continuity
   across successive token exchanges.  This document defines six actor-
   chain profiles for OAuth 2.0 Token Exchange [RFC8693].  [RFC8693]
   permits nested act claims, but prior actors remain informational only
   and token exchange does not define how a delegation path is preserved
   and validated across successive exchanges.

   This document profiles delegation-chain tokens and defines profile-
   specific processing for multi-hop workflows.  The six profiles are:
   Declared Full Disclosure; Declared Subset Disclosure; Declared Actor-
   Only Disclosure; Verified Full Disclosure; Verified Subset
   Disclosure; and Verified Actor-Only Disclosure.

   These profiles preserve the existing meanings of sub, act, and
   may_act.  They support same-domain and cross-domain delegation and
   provide different tradeoffs among visible chain-based authorization,
   cryptographic accountability, auditability, privacy, and long-running
   workflow support.  Plain RFC 8693 impersonation-shaped outputs remain
   valid RFC 8693 behavior but are outside this profile family.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mw-oauth-actor-chain-00"/>
        </reference>
        <reference anchor="I-D.johansson-direct-presentation-arch">
          <front>
            <title>A reference architecture for direct presentation credential flows</title>
            <author fullname="Leif Johansson" initials="L." surname="Johansson">
              <organization>Sunet</organization>
            </author>
            <author fullname="Brent Zundel" initials="B." surname="Zundel">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Tim Cappalli" initials="T." surname="Cappalli">
              <organization>Okta</organization>
            </author>
            <date day="4" month="November" year="2025"/>
            <abstract>
              <t>   This document defines a reference architecture for direct
   presentation flows of digital credentials.  The architecture
   introduces the concept of a presentation mediator as the active
   component responsible for managing, presenting, and selectively
   disclosing credentials while preserving a set of security and privacy
   promises that will also be defined.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/leifj/wallet-refarch.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-johansson-direct-presentation-arch-01"/>
        </reference>
      </references>
    </references>
    <?line 549?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
