<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.1.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8615 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8615.xml">
<!ENTITY RFC8499 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8499.xml">
<!ENTITY RFC7942 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
<!ENTITY RFC8441 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8441.xml">
]>


<rfc ipr="trust200902" docName="draft-morrison-org-alter-policy-provision-01" category="info" submissionType="independent">
  <front>
    <title abbrev="Org-Alter Policy Provision">Policy Provision and Governance Inheritance from an Organisational Identity Substrate</title>

    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
      <address>
        <email>blake@truealter.com</email>
      </address>
    </author>

    <date year="2026" month="May" day="18"/>

    
    
    

    <abstract>


<?line 67?>

<t>This memo specifies how an artificial-intelligence agent runtime,
bound at instantiation to a principal identity handle, resolves at
session initialisation a target organisational identity substrate
from a manifest source bound to the runtime's working context and
retrieves from that substrate a typed policy stack comprising a
handbook artefact, a standard-operating-procedure registry pointer,
an enforcement-gate specification, and an audit-signal ingestion
endpoint.  The policy stack is then applied as runtime constraints
on subsequent tool invocations, with audit signals emitted back to
the same substrate.  Policy provision occurs in the same act of
session initialisation as principal identification, rather than as
a separate ceremony against a side-channel governance plane.  A
principal concurrently bound to multiple organisational substrates
operates the runtime under a deterministic composition of the
several policy stacks, with cross-organisational residual conflicts
routed to the peer-protocol Identity Accord ceremony <xref target="IDACCORD"></xref>
rather than to a meta-federation authority.  The memo is
Informational.  The wire surface relies on the DNS-based discovery
of <xref target="MCPDNS"></xref> and the handle namespace of <xref target="IDPRONOUNS"></xref>; no new
transport is introduced.</t>



    </abstract>



  </front>

  <middle>


<?line 90?>

<section anchor="status-of-this-memo"><name>Status of This Memo</name>

<t>This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.</t>

<t>Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF).  Note that other groups may also distribute
working documents as Internet-Drafts.  The list of current
Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.</t>

<t>Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time.  It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."</t>

</section>
<section anchor="introduction"><name>Introduction</name>

<t>Artificial-intelligence agent runtimes operated by a human principal
require, at the moment they begin acting on the principal's behalf,
a corpus of policy artefacts that constrain their behaviour:
permitted and refused actions, vocabulary and tone rules, escalation
procedures, audit destinations, and the standard operating
procedures the principal's organisation has adopted.  In current
practice these artefacts are supplied to the agent runtime by a
governance plane architecturally separate from the principal's
identity infrastructure.  The agent runtime authenticates to one
substrate (an identity provider) and receives policy from another
(a governance platform, an orchestration framework's configuration
plane, a per-tool policy console).  The two substrates are joined
by out-of-band integration work specific to each deployment.</t>

<t>This memo articulates a different arrangement and specifies the
wire surface that supports it.  An organisational identity
substrate, addressable by the same identity handle that authenticates
the principal as a member of the organisation, exposes typed
surfaces over the Model Context Protocol <xref target="MCP"></xref> that carry the
policy artefacts the agent runtime requires.  The agent runtime
resolves the substrate at session initialisation, fetches the
typed surfaces, applies them as runtime constraints, and emits
audit signals to the same substrate.  Policy provision is a
byproduct of principal identification rather than a separate
ceremony.</t>

<t>The arrangement composes directly with the discovery mechanism of
<xref target="MCPDNS"></xref>, the handle namespace of <xref target="IDPRONOUNS"></xref>, the attribution
grammar of <xref target="IDCOMMITS"></xref>, the cross-session coordination posture of
<xref target="SUBSTRATE"></xref>, and the cross-organisational ceremony of <xref target="IDACCORD"></xref>.
No new transport, no new handle category, and no new attribution
slot is introduced.  The contribution of this memo is the
specification of the typed surface set, the session-initialisation
flow that retrieves them, the runtime application of the retrieved
enforcement-gate specification, the audit-signal flow back to the
substrate, the live-update propagation, the multi-organisational
composition rule, and the compliance-state inheritance posture.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described
in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in
all capitals, as shown here.</t>

<t>The following terms are defined for the purposes of this document.
Terms previously defined by the referenced Morrison-family memos
retain their established meaning and are reproduced here only when
operative for the present specification.</t>

<dl>
  <dt>~handle</dt>
  <dd>
    <t>A principal identity handle as defined by <xref target="IDPRONOUNS"></xref>.  A
Sovereign-tier handle is human-controlled (e.g. <spanx style="verb">~alice</spanx>); an
Instrument-tier handle is agent-runtime-vendor-controlled and
conventionally prefixed <spanx style="verb">~cc-</spanx> (e.g. <spanx style="verb">~cc-example-model</spanx>).  A
handle's trust tier is a property of the handle, not a property
of any session it appears in.</t>
  </dd>
  <dt>Organisational identity substrate</dt>
  <dd>
    <t>A network-addressable system that authoritatively recognises a
set of <spanx style="verb">~handles</spanx> as members of an organisation, maintains the
organisation's policy artefacts, and exposes typed surfaces by
which authenticated agent runtimes of recognised members may
retrieve those artefacts and submit audit signals back.  The
substrate is itself addressable by a handle, conventionally
domain-qualified (e.g. <spanx style="verb">~example.com</spanx>).</t>
  </dd>
  <dt>Policy artefact</dt>
  <dd>
    <t>A datum retrieved from the organisational identity substrate
that constrains an agent runtime's subsequent behaviour.  The
load-bearing policy artefacts specified by this memo are the
handbook, the standard-operating-procedure registry, the
enforcement-gate specification, and the audit-signal ingestion
endpoint.</t>
  </dd>
  <dt>Enforcement gate</dt>
  <dd>
    <t>A single rule within the enforcement-gate specification
comprising a trigger predicate evaluated against tool name and
arguments, an action selected from a defined action set, an
applicability scope, and an explanation string.  Enforcement
gates are policy retrieved from the substrate; they are not
hardcoded behaviour of the agent runtime.</t>
  </dd>
  <dt>Audit signal</dt>
  <dd>
    <t>An append-only record submitted by the agent runtime to the
organisational identity substrate's ingestion endpoint following
a runtime event that meets a substrate-specified significance
predicate.</t>
  </dd>
  <dt>Session-bind</dt>
  <dd>
    <t>The discrete act, at agent runtime instantiation, of
authenticating the bound principal handle to the resolved
organisational identity substrate and retrieving the policy
artefacts that will govern the session.</t>
  </dd>
  <dt>Manifest source</dt>
  <dd>
    <t>A configuration surface bound to the agent runtime's working
context (project-resident anchor file, DNS TXT record under the
<spanx style="verb">_alter.</spanx> scheme of <xref target="MCPDNS"></xref>, environment variable, or handle-
scoped fallback) that names the target organisational identity
substrate for the session.</t>
  </dd>
  <dt>Accord</dt>
  <dd>
    <t>The peer-protocol cross-organisational ceremony defined by
<xref target="IDACCORD"></xref>.  Referenced here as the terminator of unresolvable
multi-organisational policy-composition residuals.</t>
  </dd>
</dl>

</section>
<section anchor="architecture"><name>Architecture</name>

<t>The arrangement specified by this memo comprises four operative
surfaces and three flow stages.</t>

<section anchor="operative-surfaces"><name>Operative Surfaces</name>

<t>The organisational identity substrate SHALL expose at minimum the
following four typed surfaces over the Model Context Protocol
<xref target="MCP"></xref> to authenticated agent runtimes of recognised members.  Each
surface is addressable as a tool invocation against the substrate.</t>

<dl>
  <dt><spanx style="verb">org_alter_handbook</spanx></dt>
  <dd>
    <t>Returns the organisational handbook artefact.  The handbook
comprises the body of prose policy that an organisation
customarily supplies to a contractor at the commencement of an
engagement: voice and tone rules, vocabulary constraints,
positioning rules, decision-routing rules, and any further
prose policy the organisation considers operative.  The surface
SHALL support both whole-handbook retrieval and section-scoped
retrieval by section identifier.</t>
  </dd>
  <dt><spanx style="verb">org_alter_sop_registry</spanx></dt>
  <dd>
    <t>Returns the registry of standard operating procedures maintained
by the organisational identity substrate.  Each registry entry
carries a stable identifier, a title, a status (live, draft,
deprecated), a body, and an invocation verb under which the
agent runtime may execute the procedure.  The surface SHALL
support both registry listing and individual-procedure retrieval.</t>
  </dd>
  <dt><spanx style="verb">org_alter_enforcement_gates</spanx></dt>
  <dd>
    <t>Returns the specification of enforcement gates the agent runtime
is to apply to subsequent tool invocations.  The grammar of an
enforcement gate is defined in Section 5.</t>
  </dd>
  <dt><spanx style="verb">org_alter_ingest</spanx></dt>
  <dd>
    <t>Accepts audit signals submitted by the agent runtime per
Section 6.  The surface is append-only; admitted signals are
written to the organisational identity substrate's append-only
event log and are not retractable or amendable.</t>
  </dd>
</dl>

<t>Additional surfaces (a roster surface, a decisions surface, a
compliance surface) MAY be exposed by the organisational identity
substrate; agent runtimes consulting such surfaces operate beyond
the load-bearing minimum specified here.</t>

</section>
<section anchor="flow-stages"><name>Flow Stages</name>

<t>The session-bind flow comprises three stages, executed in order:</t>

<t><list style="numbers" type="1">
  <t><strong>Resolve.</strong>  The agent runtime determines the target
organisational identity substrate by consulting the manifest
source, as specified in Section 4.</t>
  <t><strong>Retrieve.</strong>  The agent runtime authenticates to the resolved
substrate using the bound principal handle's session credential
and retrieves the four load-bearing policy artefacts via the
surfaces of Section 3.1.</t>
  <t><strong>Apply.</strong>  The agent runtime translates the retrieved
enforcement-gate specification into runtime hooks, registers
the audit-signal endpoint as the destination for subsequent
significant-event emissions, and surfaces the handbook and
SOP registry to the bound principal as in-context advisory
material.</t>
</list></t>

<t>The three stages constitute session-bind.  All three SHALL complete
before the agent runtime acts on the principal's first prompt of
the session.  If any stage fails, session-bind SHALL fail; partial
inheritance of policy is not permitted (Section 9).</t>

</section>
</section>
<section anchor="discovery-and-resolution"><name>Discovery and Resolution</name>

<t>The agent runtime SHALL resolve the target organisational identity
substrate from a manifest source bound to the runtime's working
context.  Manifest sources are evaluated in the priority order
below.  The first source that yields a handle is operative; later
sources are not consulted.</t>

<t><list style="numbers" type="1">
  <t><strong>Project-resident anchor.</strong>  A file at an implementation-
defined path within the working directory tree (a recommended
path is <spanx style="verb">.alter/org-alter.toml</spanx> or an <spanx style="verb">[org-alter]</spanx> block
within <spanx style="verb">pyproject.toml</spanx>, <spanx style="verb">package.json</spanx>, or <spanx style="verb">Cargo.toml</spanx>)
names the target substrate by handle.</t>
  <t><strong>DNS TXT record under the <spanx style="verb">_alter.</spanx> scheme of <xref target="MCPDNS"></xref>.</strong>
The agent runtime resolves the working directory's source-
control remote (where present) to a domain name and queries
<spanx style="verb">_alter.&lt;domain&gt;</spanx> per <xref target="MCPDNS"></xref>.  The TXT record's <spanx style="verb">org_alter</spanx>
field, when present, names the target substrate.</t>
  <t><strong>Environment variable.</strong>  An implementation-defined
environment variable (a recommended name is
<spanx style="verb">ALTER_ORG_HANDLE</spanx>) carries the target substrate handle.</t>
  <t><strong>Handle-scoped fallback.</strong>  If sources (1) through (3) do
not resolve, the runtime falls back to the principal's own
handle-scoped substrate, which exposes the same typed surfaces
as an organisational identity substrate but is scoped to the
principal alone and does not participate in multi-organisational
composition (Section 8).</t>
</list></t>

<t>The resolved handle is translated to a substrate endpoint via the
DNS-based resolution mechanism of <xref target="MCPDNS"></xref>.  The agent runtime
opens a Model Context Protocol session against the endpoint,
authenticating with the bound principal handle's session credential
obtained from the implementation-defined session manifest.</t>

<t>A substrate that does not recognise the authenticating handle as a
member SHALL refuse the session; an unrecognised handle MUST NOT
receive policy artefacts.  The substrate MAY further refuse on
trust-tier grounds: an Instrument-tier handle SHALL be admitted
only when the substrate's policy explicitly admits Instrument-tier
sessions from the corresponding Sovereign-tier handle's delegation.</t>

</section>
<section anchor="enforcement-gate-grammar"><name>Enforcement Gate Grammar</name>

<t>The <spanx style="verb">org_alter_enforcement_gates</spanx> surface (Section 3.1) returns
an enforcement-gate specification.  An enforcement-gate
specification is a list of enforcement gates.  Each enforcement
gate is an object with the following fields.</t>

<dl>
  <dt><spanx style="verb">id</spanx> (string, REQUIRED)</dt>
  <dd>
    <t>A stable identifier for the gate, unique within the
specification.  Identifiers are used as the addressing target
for audit signals (Section 6) and for policy-update propagation
(Section 7).</t>
  </dd>
  <dt><spanx style="verb">trigger</spanx> (object, REQUIRED)</dt>
  <dd>
    <t>The trigger predicate evaluated against each prospective tool
invocation.  The object's keys are predicate operators; the
values are operator-specific patterns.  Minimum operator set:
</t>

    <t><list style="symbols">
      <t><spanx style="verb">tool_name_match</spanx> (string): regular expression matched against
the tool name.</t>
      <t><spanx style="verb">path_glob</spanx> (string): glob pattern matched against any
argument resolvable as a filesystem path.</t>
      <t><spanx style="verb">command_substring</spanx> (string): substring matched against any
argument carrying a command string.</t>
      <t><spanx style="verb">arg_arity</spanx> (object): minimum and maximum bounds on argument
list length.</t>
    </list></t>

    <t>A trigger object matches when every operator present in the
object matches.  Additional operators MAY be defined by the
substrate and SHOULD be ignored by agent runtimes that do not
understand them.</t>
  </dd>
  <dt><spanx style="verb">action</spanx> (enum, REQUIRED)</dt>
  <dd>
    <t>One of:
</t>

    <t><list style="symbols">
      <t><spanx style="verb">block</spanx>: the tool invocation is refused.  The runtime returns
the gate's explanation string to the agent reasoning loop as
a synthetic error and emits a <spanx style="verb">policy.violation</spanx> audit signal.</t>
      <t><spanx style="verb">prompt-for-confirmation</spanx>: the tool invocation is paused and
a confirmation prompt is rendered to the Sovereign-tier
principal.  The invocation proceeds only on principal
confirmation.  A <spanx style="verb">gate.confirmation-requested</spanx> audit signal
is emitted on prompt; a <spanx style="verb">gate.confirmation-granted</spanx> or
<spanx style="verb">gate.confirmation-denied</spanx> signal is emitted on outcome.</t>
      <t><spanx style="verb">allow-with-audit</spanx>: the tool invocation proceeds, and a
<spanx style="verb">gate.allowed-with-audit</spanx> audit signal is emitted.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">scope</spanx> (object, OPTIONAL)</dt>
  <dd>
    <t>An applicability scope restricting the gate's effect.  Recognised
keys:
</t>

    <t><list style="symbols">
      <t><spanx style="verb">trust_tiers</spanx> (array of strings): the trust tiers (Sovereign,
Instrument, Bot) to which the gate applies.  Omission
indicates all tiers.</t>
      <t><spanx style="verb">working_context_glob</spanx> (string): a glob matched against the
agent runtime's working directory path.  Omission indicates
all contexts.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">explanation</spanx> (string, REQUIRED)</dt>
  <dd>
    <t>A human-readable explanation of the gate, returned to the agent
runtime on action execution.  The explanation SHOULD be
sufficient for the reasoning loop to surface to the principal
without further substrate round-trip.</t>
  </dd>
  <dt><spanx style="verb">audit_emit_on</spanx> (array of strings, OPTIONAL)</dt>
  <dd>
    <t>A list of event types for which audit signals are emitted on
this gate's evaluation, beyond the action-implicit signals
enumerated above.  Substrate-significance predicates (Section 6)
may select event types not directly tied to a gate; this field
carries the per-gate overrides.</t>
  </dd>
</dl>

<t>When two or more gates trigger on a single prospective tool
invocation (after applicability-scope filtering), the gate whose
action is most restrictive prevails.  Order of restrictiveness,
from most to least, is <spanx style="verb">block</spanx>, <spanx style="verb">prompt-for-confirmation</spanx>,
<spanx style="verb">allow-with-audit</spanx>.</t>

<t>The agent runtime SHALL NOT maintain enforcement gates outside the
specification retrieved from the substrate.  Gates are policy,
sourced from the substrate; an agent runtime that hardcodes a gate
operates outside the surface of this memo.</t>

</section>
<section anchor="audit-signal-flow"><name>Audit Signal Flow</name>

<t>The agent runtime emits audit signals to the substrate's
<spanx style="verb">org_alter_ingest</spanx> surface for runtime events that meet a
substrate-specified significance predicate.  The significance
predicate is itself policy retrieved from the substrate; the
substrate determines which events are significant, not the runtime.</t>

<t>An audit signal is an object with the following minimum fields:</t>

<dl>
  <dt><spanx style="verb">type</spanx> (string, REQUIRED)</dt>
  <dd>
    <t>The event type.  The minimum-set of event types a conformant
runtime SHALL emit when triggered comprises:
</t>

    <t><list style="symbols">
      <t><spanx style="verb">session.start</spanx> at session bind, carrying the bound principal
handle, trust tier, resolved substrate handle, and manifest
source used for resolution.</t>
      <t><spanx style="verb">session.end</spanx> at session termination, carrying the bound
handle and a structured summary of session activity.</t>
      <t><spanx style="verb">tool.invoke</spanx> per tool invocation that meets the substrate-
specified significance predicate, carrying the tool name, a
redacted argument summary, the gate evaluation outcome, and
the result classification.</t>
      <t><spanx style="verb">policy.violation</spanx> when a <spanx style="verb">block</spanx> gate action fires, carrying
the gate identifier and the offending invocation.</t>
      <t><spanx style="verb">policy.update</spanx> on receipt of a live-substrate policy update
(Section 7), acknowledging the new policy epoch.</t>
      <t><spanx style="verb">gate.confirmation-requested</spanx>, <spanx style="verb">gate.confirmation-granted</spanx>,
<spanx style="verb">gate.confirmation-denied</spanx> on <spanx style="verb">prompt-for-confirmation</spanx> flow.</t>
      <t><spanx style="verb">gate.allowed-with-audit</spanx> on the corresponding action.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">payload</spanx> (object, REQUIRED)</dt>
  <dd>
    <t>Event-type-specific structured data.  The substrate's significance
predicate MAY constrain payload shape per event type.</t>
  </dd>
  <dt><spanx style="verb">attribution</spanx> (object, REQUIRED)</dt>
  <dd>
    <t>Carries the Sovereign-tier handle and any in-scope Instrument-tier
handle.  The grammar follows the trailer slots defined by
<xref target="IDCOMMITS"></xref>; the audit-signal <spanx style="verb">attribution</spanx> field is the
protocol-layer companion to the commit-trailer block.</t>
  </dd>
  <dt><spanx style="verb">timestamp</spanx> (string, REQUIRED)</dt>
  <dd>
    <t>RFC 3339 timestamp at which the runtime emitted the signal.</t>
  </dd>
  <dt><spanx style="verb">gate_id</spanx> (string, OPTIONAL)</dt>
  <dd>
    <t>When the signal arises from a gate evaluation, the identifier
of the gate.</t>
  </dd>
</dl>

<t>The substrate's audit-signal endpoint is append-only.  Admitted
signals SHALL NOT be retracted or amended by the emitting runtime
or by the substrate operator.  The structural co-location of
policy and audit at the same substrate is the load-bearing
property of this section; an audit channel addressable separately
from the policy that governed the audited events does not satisfy
this specification.</t>

</section>
<section anchor="live-policy-updates"><name>Live Policy Updates</name>

<t>The agent runtime maintains, for the duration of the session, a
subscription channel against the resolved organisational identity
substrate over which the substrate emits policy-update
notifications.  The subscription channel SHOULD be implemented as
a Server-Sent Events stream <xref target="RFC8441"></xref> or equivalent
unidirectional-from-substrate transport that the existing
Model Context Protocol session can carry without additional
authentication round-trip.</t>

<t>On receipt of a policy-update notification, the runtime SHALL:</t>

<t><list style="numbers" type="1">
  <t>Re-fetch the affected policy artefact via the corresponding
typed surface of Section 3.1.</t>
  <t>Recompute the runtime hooks of Section 5 from the updated
enforcement-gate specification.</t>
  <t>Atomically replace its in-memory policy state.  No tool
invocation issued after the atomic replacement observes a
partial composition of the pre-update and post-update gate
sets.</t>
  <t>Emit a <spanx style="verb">policy.update</spanx> audit signal acknowledging the new
policy epoch.</t>
</list></t>

<t>A runtime SHALL NOT require process restart to apply a policy
update.  An update notification that the runtime cannot apply
(because the substrate returned a malformed artefact, or because
the runtime's hook surface cannot represent the updated gate set)
SHALL cause the runtime to emit a <spanx style="verb">policy.update-failed</spanx> audit
signal and either retain the prior policy state and surface the
condition to the principal, or terminate the session at the
substrate's configured failure-mode.</t>

</section>
<section anchor="multi-organisational-composition"><name>Multi-Organisational Composition</name>

<t>A principal MAY be concurrently recognised by multiple
organisational identity substrates.  When the manifest source
resolution of Section 4 returns more than one substrate handle
(for example, when the project-resident anchor names a primary
substrate and the session credential carries auxiliary memberships),
the agent runtime composes the retrieved policy stacks under the
following rules.</t>

<dl>
  <dt><spanx style="verb">org_alter_handbook</spanx> composition</dt>
  <dd>
    <t>Handbooks compose by union.  Where two handbooks declare
conflicting sections, the substrate declared earlier in the
manifest's precedence order prevails.  In the absence of
explicit precedence, the substrate resolved from the working-
context anchor (Section 4(1) or 4(2)) prevails.</t>
  </dd>
  <dt><spanx style="verb">org_alter_sop_registry</spanx> composition</dt>
  <dd>
    <t>Standard-operating-procedure registries compose by union.
Procedures are identified by the tuple <spanx style="verb">(substrate-handle,
procedure-identifier)</spanx> to permit identically-named procedures
across substrates without collision.</t>
  </dd>
  <dt><spanx style="verb">org_alter_enforcement_gates</spanx> composition</dt>
  <dd>
    <t>Enforcement gates compose by union under a strictest-applicable
rule: where two gates from distinct substrates trigger on a
single prospective tool invocation, the gate whose action is
most restrictive prevails (order as in Section 5).</t>
  </dd>
  <dt><spanx style="verb">org_alter_ingest</spanx> fan-out</dt>
  <dd>
    <t>An audit signal arising from a gate whose evaluation drew on
policy from multiple substrates SHALL be emitted to the audit-
signal endpoints of all participating substrates.  Each
substrate receives the audit trail for its share of the agent
runtime's activity.  Fan-out is realised by parallel append
calls to each substrate's audit endpoint.</t>
  </dd>
</dl>

<t>Cross-organisational residual conflicts that the composition
rules above cannot resolve (for example, two substrates' handbooks
declaring mutually-inconsistent positioning rules where neither is
clearly subordinate under the manifest precedence) SHALL be routed
to the peer-protocol Identity Accord ceremony <xref target="IDACCORD"></xref> between
the participating substrates.  The agent runtime emits an
<spanx style="verb">accord.residual</spanx> audit signal to all participating substrates and
suspends the conflicting action pending resolution by the
substrates' principals.  Resolution does not proceed via a meta-
federation authority; a meta-federation authority is structurally
precluded by the multi-organisational topology this section
specifies.</t>

</section>
<section anchor="compliance-state-inheritance"><name>Compliance-State Inheritance</name>

<t>At session-bind, the agent runtime inherits the organisational
identity substrate's then-current compliance state as a single
coherent snapshot.  The snapshot comprises at minimum:</t>

<t><list style="symbols">
  <t>The audit-signal endpoint URI and its current write credential.</t>
  <t>The enforcement-gate specification at its current epoch.</t>
  <t>The standard-operating-procedure registry pointer at its
current revision.</t>
  <t>A hash of the handbook artefact at its current revision.</t>
  <t>The set of compliance commitments the substrate has accepted
and currently asserts (for example, a refusal of a specified
category of automated invocation, or a specified regulatory
posture).</t>
</list></t>

<t>Inheritance SHALL be atomic.  Either all snapshot elements are
inherited at a single substrate epoch, or session-bind fails.  A
session that proceeds with a partial snapshot is non-conformant.
The runtime SHALL surface session-bind failure to the principal
with the substrate-returned diagnostic; it SHALL NOT silently
degrade to a fallback policy stack.</t>

<t>Subsequent live updates (Section 7) modify the snapshot at the
runtime in place but do not retroactively alter the snapshot epoch
recorded at session-bind.  The audit trail of a session is the
sequence of policy epochs the runtime observed across its
lifetime, anchored by the session-bind snapshot.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This memo requests no IANA action.</t>

<t>The four load-bearing typed surfaces named in Section 3.1
(<spanx style="verb">org_alter_handbook</spanx>, <spanx style="verb">org_alter_sop_registry</spanx>,
<spanx style="verb">org_alter_enforcement_gates</spanx>, <spanx style="verb">org_alter_ingest</spanx>) are illustrative
of the reference substrate operated by Alter Meridian Pty Ltd.
Conforming substrates MAY name their surfaces by any convention
consistent with their addressing primitive; the load-bearing
contribution of this memo is the typed-surface enumeration over
an organisational identity substrate, not the surface names
themselves.  If a future revision of this memo, or a companion
specification, proposes a registry for canonical substrate-surface
names, that revision will request the corresponding IANA action.</t>

<t>Where a substrate elects to advertise its handle in the <xref target="MCPDNS"></xref>
discovery record, the <spanx style="verb">org_alter</spanx> field is added under the
field-extension mechanism of <xref target="MCPDNS"></xref>; this memo requests no
separate registry allocation.  No new DNS RR types, transport
identifiers, port numbers, URI schemes, or media types are
introduced.  The reuse of the <spanx style="verb">_alter.&lt;domain&gt;</spanx> DNS label
(Section 4(2)) is per <xref target="MCPDNS"></xref> and requires no further allocation
here.</t>

<t>The session-manifest path layout referenced by Section 4(1) and
Section 4(3) is implementation-defined and is not registered.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The arrangement specified by this memo concentrates policy,
attribution, and audit on a single substrate addressable by the
principal's identity credential.  The concentration is the load-
bearing property; it is also the principal source of the
following security considerations.</t>

<section anchor="substrate-compromise"><name>Substrate Compromise</name>

<t>A compromised organisational identity substrate may serve falsified
policy artefacts to authenticated members, induce the runtime to
emit audit signals to an attacker-controlled endpoint, or suppress
update notifications to keep runtimes operating under stale gates.
Mitigations:</t>

<t><list style="symbols">
  <t>The substrate's policy artefacts SHOULD be served over a
channel authenticated by the cryptographic identity envelope
of <xref target="MCPDNS"></xref> (the <spanx style="verb">_alter.&lt;domain&gt;</spanx> Ed25519 binding) so that a
consuming runtime can verify the artefact bears the substrate's
declared signing key.</t>
  <t>Audit-signal endpoints SHOULD be pinned at session-bind time
to the endpoint URI recorded in the compliance snapshot
(Section 9); mid-session redirection of the endpoint SHALL
require a <spanx style="verb">policy.update</spanx> notification carrying the new endpoint
under the same signing key.</t>
  <t>Runtimes SHOULD treat suppressed update notifications as an
observable substrate signal under the substrate-observation
posture of <xref target="SUBSTRATE"></xref>; prolonged absence of update events on
a substrate that asserts an active policy lifecycle is
itself diagnostic.</t>
</list></t>

</section>
<section anchor="trust-tier-escalation"><name>Trust-Tier Escalation</name>

<t>An Instrument-tier handle that successfully presents a Sovereign-
tier session credential (through credential theft, compromised
session manifest, or substrate misissuance) would receive the
Sovereign-tier gate set, which is by construction more permissive.
Mitigations:</t>

<t><list style="symbols">
  <t>The substrate SHALL bind trust tier to the handle itself, not
to the session, and SHALL refuse Instrument-tier handles
presenting Sovereign-tier credentials at the recognition step.</t>
  <t>Audit signals SHALL carry attribution per Section 6; an
Instrument-tier session writing to the audit log under a
Sovereign-tier attribution is detectable by post-hoc audit and
by the cross-tier checks defined in <xref target="IDCOMMITS"></xref>.</t>
  <t>Sovereign-tier confirmation prompts (Section 5's <spanx style="verb">prompt-for-
confirmation</spanx> action) SHOULD be rendered through an out-of-
band channel addressable only by the human principal, so that
an Instrument-tier session in possession of the Sovereign-tier
session credential cannot satisfy a confirmation on the
principal's behalf.</t>
</list></t>

</section>
<section anchor="multi-organisational-conflict-exploitation"><name>Multi-Organisational Conflict Exploitation</name>

<t>A principal recognised by multiple substrates may be the vector
for an exploit in which one substrate's gate is suppressed by a
falsified or absent gate from a second substrate.  Mitigations:</t>

<t><list style="symbols">
  <t>The strictest-applicable rule of Section 8 SHALL be evaluated
over the gates actually retrieved from each substrate.  A
substrate that fails to return its enforcement-gate
specification at session-bind SHALL cause session-bind to fail
for that substrate (no implicit empty-gate-set composition).</t>
  <t>The principal's manifest precedence declarations SHOULD be
authenticated against the principal's signing key per
<xref target="IDPRONOUNS"></xref> so that a forged precedence claim cannot install
a less-restrictive substrate as the primary.</t>
</list></t>

</section>
<section anchor="live-update-replay"><name>Live-Update Replay</name>

<t>An attacker positioned to observe the subscription channel may
attempt to replay an aged <spanx style="verb">policy.update</spanx> notification to roll a
runtime back to an earlier policy epoch.  Mitigations:</t>

<t><list style="symbols">
  <t>Update notifications SHALL carry a monotonic substrate-emitted
epoch identifier.</t>
  <t>Runtimes SHALL reject notifications carrying an epoch less than
or equal to the runtime's currently-applied epoch.</t>
  <t>The substrate's append-only audit log retains the ordered
history of issued epoch identifiers and is consultable for
post-hoc replay detection.</t>
</list></t>

</section>
<section anchor="pseudonymous-discovery-substrates"><name>Pseudonymous Discovery Substrates</name>

<t>The handle-scoped fallback of Section 4(4) operates the typed
surfaces against a principal-scoped substrate that does not assert
organisational membership.  An agent runtime in this configuration
inherits the principal's own policy stack but does not benefit
from multi-organisational composition.  Implementations SHOULD
surface to the principal that the session is operating in the
fallback configuration so that the absence of an organisational
substrate is not silently consumed.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>The audit-signal flow of Section 6 records the agent runtime's
tool-invocation activity on the substrate.  The substrate operator
has visibility into the principal's session activity at the
granularity of the substrate-specified significance predicate.
Three privacy postures arise.</t>

<section anchor="significance-predicate-scope"><name>Significance-Predicate Scope</name>

<t>The substrate determines which events are significant and therefore
audited.  A significance predicate covering every tool invocation
yields a complete activity log; a narrower predicate audits
only events the substrate considers operative.  Substrate operators
SHOULD publish their significance predicates as part of the
handbook artefact so that authenticated members understand the
scope of audit they consent to as a function of membership.</t>

</section>
<section anchor="argument-redaction"><name>Argument Redaction</name>

<t>Tool-invocation arguments SHOULD be redacted before inclusion in
the <spanx style="verb">tool.invoke</spanx> audit signal payload.  Minimum redaction practice
is removal of secret material (credentials, signing keys),
personally-identifying information about third parties referenced
in the invocation, and any field the principal has marked
sensitive in a per-session redaction profile.  Substrate operators
SHOULD specify their argument-redaction expectations in the
handbook artefact.</t>

</section>
<section anchor="cross-substrate-audit-fan-out"><name>Cross-Substrate Audit Fan-Out</name>

<t>Under multi-organisational composition (Section 8), audit signals
arising from gates contributed by multiple substrates are fanned
out to all contributing substrates.  Each substrate receives the
audit trail for invocations its policy participated in evaluating;
each substrate may therefore see activity the principal did not
intend to surface to it.  Principals SHOULD be made aware of the
fan-out posture at the time their multi-organisational membership
is established; substrates SHOULD declare in their handbook
artefact the fan-out events they expect to receive from sessions
of members concurrently bound to peer substrates.</t>

</section>
</section>
<section anchor="relation-to-companion-memos"><name>Relation to Companion Memos</name>

<t>This memo composes with five Morrison-family Internet-Drafts.</t>

<t><xref target="MCPDNS"></xref> supplies the DNS-based discovery surface from which the
manifest-source resolution of Section 4(2) draws and the
cryptographic identity envelope referenced in Section 11.  This
memo introduces no new DNS records or labels beyond those
specified by <xref target="MCPDNS"></xref>.</t>

<t><xref target="IDPRONOUNS"></xref> supplies the handle namespace and trust-tier
taxonomy referenced throughout this memo.  This memo introduces
no new handle category.</t>

<t><xref target="IDCOMMITS"></xref> supplies the attribution grammar that the audit-
signal <spanx style="verb">attribution</spanx> field of Section 6 mirrors at the protocol
layer.  An audit signal and a <spanx style="verb">Acted-By:</spanx> / <spanx style="verb">Drafted-With:</spanx> commit
trailer block carry the same attribution shape, one at runtime,
one at version-control commit time.</t>

<t><xref target="SUBSTRATE"></xref> supplies the substrate-observation posture under which
the runtime treats absence of expected update notifications as a
substrate signal (Section 11).  Substrate observation also supplies
the cross-session coordination floor against which multiple
concurrent runtimes of the same principal deconflict without
exchanging coordination messages.</t>

<t><xref target="IDACCORD"></xref> supplies the peer-protocol ceremony to which Section 8's
cross-organisational residuals are routed.</t>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>A reference implementation of the agent-runtime side of this
specification is operated by the present author against a
production substrate that exposes the surfaces of Section 3.1.
The reference deployment supplies policy artefacts to
instrument-tier agent-runtime sessions of recognised members and
writes audit signals to the substrate's append-only event log.</t>

<t>In the spirit of <xref target="RFC7942"></xref>, the present author notes that this
section is intended to document implementation experience and is
expected to be removed before the document advances beyond the
Independent Stream.  No claim of interoperability is made; the
reference deployment is a single substrate operated by the
specification's author.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<t>draft-morrison-org-alter-policy-provision-01 (May 2026):</t>

<t><list style="symbols">
  <t>Retitles the memo from "Org-Alter-Mediated Policy Provision and
Governance Inheritance for Agent Runtimes Bound to a Principal
Identity" to "Policy Provision and Governance Inheritance from
an Organisational Identity Substrate".  The retitled framing
generalises the substrate above the operator-specific
<spanx style="verb">org_alter_*</spanx> surface naming and clarifies that the load-bearing
contribution is the typed-surface enumeration over the substrate,
not the surface-name convention.  The abbreviated title and the
body terminology are retained.</t>
  <t>Softens the IANA Considerations section.  The previous revision
requested establishment of a Model Context Protocol Tool Surface
Names registry with the four <spanx style="verb">org_alter_*</spanx> names as initial
entries.  The revised section requests no IANA action; the
surface names are explicitly illustrative of the reference
substrate, and conforming substrates MAY name surfaces by any
convention consistent with their addressing primitive.  A future
revision or companion specification proposing such a registry
remains possible.</t>
  <t>Folds in the architectural framing developed in the parallel
draft-morrison-alter-collective-policy-provision-00 (May 2026)
on the substrate-as-load-bearing-primitive question.  That
parallel draft is retired in favour of this revision; the
organisational-identity-substrate framing it introduced is
carried forward here.</t>
  <t>No substantive change to the typed surface set, the
session-bind flow, the enforcement-gate grammar, the audit-
signal flow, the live-update mechanism, the multi-organisational
composition rules, or the compliance-state inheritance posture.</t>
</list></t>

<t>draft-morrison-org-alter-policy-provision-00 (May 2026):</t>

<t><list style="symbols">
  <t>Initial submission.</t>
  <t>Specifies the four load-bearing typed surfaces of the
organisational identity substrate (<spanx style="verb">org_alter_handbook</spanx>,
<spanx style="verb">org_alter_sop_registry</spanx>, <spanx style="verb">org_alter_enforcement_gates</spanx>,
<spanx style="verb">org_alter_ingest</spanx>).</t>
  <t>Defines the session-bind flow (Resolve, Retrieve, Apply).</t>
  <t>Specifies the enforcement-gate grammar and the strictest-
applicable composition rule.</t>
  <t>Specifies the audit-signal flow and the append-only ingestion
endpoint.</t>
  <t>Specifies the live-policy-update subscription and atomic-
replacement requirement.</t>
  <t>Specifies multi-organisational composition and the cross-
organisational residual route to <xref target="IDACCORD"></xref>.</t>
  <t>Specifies compliance-state inheritance and the atomic-snapshot
requirement.</t>
</list></t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC8174;
&RFC8615;
<reference anchor="MCPDNS" target="https://datatracker.ietf.org/doc/draft-morrison-mcp-dns-discovery/">
  <front>
    <title>Discovery of Model Context Protocol Servers via DNS TXT Records</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="IDPRONOUNS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-pronouns/">
  <front>
    <title>Identity Pronouns: A Reference-Axis Extension to ~handle Identity Systems</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="IDCOMMITS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-attributed-commits/">
  <front>
    <title>Identity-Attributed Git Commits via Tier-Structured Trailers</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="SUBSTRATE" target="https://datatracker.ietf.org/doc/draft-morrison-substrate-observation/">
  <front>
    <title>Substrate-Observation as an Alternative to Envelope Coordination for Concurrent Sessions</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="IDACCORD" target="https://datatracker.ietf.org/doc/draft-morrison-identity-accord/">
  <front>
    <title>Identity Accord Protocol</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="MCP" target="https://modelcontextprotocol.io">
  <front>
    <title>Model Context Protocol Specification</title>
    <author >
      <organization>Agentic AI Foundation</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC8499;
&RFC7942;
&RFC8441;


    </references>

</references>


<?line 848?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>This memo grew out of internal architectural work on the question
of how an agent runtime, bound to a principal at instantiation,
should receive the corpus of policy artefacts a real organisation
supplies a new contractor on commencement of an engagement.  The
realisation that the corpus is structurally co-located with the
identity that names the principal as a member, and that the
prevailing architectural separation between governance plane and
identity plane is itself the failure mode, is the load-bearing
insight behind this specification.</t>

</section>
<section numbered="false" anchor="authors-address"><name>Author's Address</name>

<t>Blake Morrison
Alter Meridian Pty Ltd
Email: blake@truealter.com</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

