Internet-Draft | Agentic EAT Cap Attest | June 2025 |
Huang | Expires 15 December 2025 | [Page] |
This document specifies extensions to the Entity Attestation Token (EAT) [RFC9248] to support robust, interoperable attestation of capabilities in agentic AI systems. These extensions introduce new claims and guidance for securely asserting agent functional, reasoning, and operational capabilities, as well as their compositional structure and policy constraints. The goal is to enable trustworthy, verifiable, and privacy-respecting capability attestation for autonomous agents in dynamic, decentralized environments.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 3 December 2025.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The Entity Attestation Token (EAT) [RFC9248] defines a CBOR/COSE-based structure for representing signed claims about an entity's identity, configuration, and operational state. While EAT is widely adopted for device attestation, agentic AI systems—such as autonomous planners, LLM-based agents, and API orchestrators—require more granular and dynamic attestation of their capabilities, constraints, and compositional structure.¶
This document defines EAT extensions for agentic AI, supporting:¶
These extensions are intended to facilitate secure agent interaction, policy-based access control, and dynamic trust establishment.¶
The following claims are introduced for agent capability attestation. Each claim is assigned a unique CBOR label in the EAT claims registry.¶
Example agent_capabilities claim:¶
{ "planning": ["BFS", "A*", "LlamaPlan"], "nlp_models": ["llama3-8b", "gpt-4.5-turbo"], "tool_use": ["web_access", "code_exec"], "reasoning": ["symbolic", "LLM-hybrid"], "delegation": true }¶
Example policy_constraints claim:¶
{ "data_access": ["PII_restricted"], "temperature_limit": 0.8, "explainability_required": true }¶
Agentic AI systems may be composed of multiple modules, each with distinct capabilities and trust requirements. The submodules claim enables the inclusion of multiple signed, nested EATs, each representing a submodule. Each submodule EAT must include its own agent_capabilities and be signed by the same or a recognized authority.¶
This compositional approach supports modular attestation, allowing verifiers to assess the trustworthiness of both the agent as a whole and its individual components.¶
Endorsements provide third-party assurance of agent capability claims. The endorsements claim encodes information such as the issuer, certificate type, and a COSE_Sign1 signature over the claims or schema.¶
Example endorsements claim:¶
{ "issuer": "AgenticAITrust.org", "cert_type": "capability-schema", "signature": "<COSE_Sign1 representation>" }¶
Trust anchors for capability validation should be managed by ecosystem authorities, using X.509 or DICE profiles as appropriate. Verifiers must validate endorsement signatures and check certificate revocation status as part of the trust evaluation process.¶
This document requests allocation of CBOR labels 40001–40008 in the Entity Attestation Token (EAT) claims registry.¶