| Internet-Draft | HDP Agentic Delegation | March 2026 |
| Helixar | Expires 26 September 2026 | [Page] |
Agentic AI systems operate on behalf of human principals, often delegating tasks through multi-step chains of AI agents. There is currently no standard mechanism to record who authorized an agent to act, under what scope, and through what chain of delegation , in a way that can be verified offline, without a central registry, and without third-party trust anchors.¶
This document specifies the Human Delegation Provenance Protocol (HDP) version 0.1, a lightweight token-based protocol that captures, structures, cryptographically signs, and verifies human delegation context in agentic AI systems. An HDP token binds a human authorization event to a session, records each agent's delegation action as a signed hop in an append-only chain, and enables any participant to verify the full provenance record using only the issuer's Ed25519 public key and the current session identifier. Verification is fully offline. No registry lookup, no network call, and no third-party trust anchor is required.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 2 September 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Autonomous AI agents are increasingly used to execute consequential actions: sending emails, modifying files, running code, calling APIs, and transacting on behalf of users. When a human authorizes an orchestrator agent, which in turn delegates to sub-agents, which further delegate to tool-execution agents, the originating human authorization becomes disconnected from the terminal action. There is no standard record of the authorization chain.¶
This gap creates accountability, auditability, and safety problems:¶
HDP addresses this by defining a token that:¶
The need for agentic delegation provenance is not hypothetical. Production deployments of AI orchestration systems (LangChain, AutoGPT, CrewAI, and similar frameworks) today pass natural language task descriptions between agents with no cryptographic binding to the original human authorization. The operational risk compounds as models become more capable and agents are granted access to higher- consequence tools.¶
A provenance token that travels alongside the task , tamper-evident, offline-verifiable, and scoped to what the human actually approved , provides the foundation for auditable, accountable agentic systems.¶
HDP is designed with the following goals in order of priority:¶
The Intent Provenance Protocol [I-D.haberkamp-ipp] addresses the same problem space. HDP and IPP share the use of Ed25519 signatures and append-only provenance chains but make different architectural trade-offs, which are detailed in Section 12. The two protocols are not interoperable. HDP is offered as a distinct design point, not a revision of IPP.¶
The full HDP protocol specification is available at [HDP-SPEC]. A TypeScript reference implementation is available at [HDP-IMPL].¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] and [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
principal object.¶
chain array.¶
session_id
string, established between the issuer and the agent framework
before the token is issued.¶
An HDP token is a JSON object with six top-level fields. The token MUST conform to the following structure. All integer timestamps are Unix milliseconds (milliseconds since 1970-01-01T00:00:00Z).¶
{
"hdp" : "0.1", // protocol version
"header" : { ... }, // session binding + lifecycle
"principal" : { ... }, // authorizing human
"scope" : { ... }, // authorized intent + constraints
"chain" : [ ... ], // delegation hops (append-only)
"signature" : { ... } // root Ed25519 signature
}
The header object carries token lifecycle and session
binding fields.¶
{
"token_id" : "550e8400-e29b-41d4-a716-446655440000",
"issued_at" : 1711483200000,
"expires_at" : 1711569600000,
"session_id" : "sess-20260326-abc123",
"version" : "0.1",
"parent_token_id" : "..." // OPTIONAL: re-authorization linkage
}
¶
hdp
field.¶
The principal object identifies the authorizing human.
It MUST contain id and id_type. All other
fields are OPTIONAL.¶
{
"id" : "usr_alice_opaque",
"id_type" : "opaque",
"display_name" : "Alice Chen",
"poh_credential" : "...",
"metadata" : {}
}
¶
The id_type field MUST be one of the following registered
values, or a custom string prefixed with x-:¶
opaque: Application-defined identifier. No resolution
semantics are implied.¶
email: RFC 5321 email address.¶
uuid: RFC 4122 UUID.¶
did: W3C Decentralized Identifier
[W3C.DID]. DID resolution is application-
defined and not required by this protocol.¶
poh: A Proof-of-Humanity credential identifier.
Verification semantics are application-defined; see
Section 9.3.¶
HDP does not mandate any specific identity model. The did
id_type is available for deployments with existing DID
infrastructure; it is not required.¶
The scope object records what the human authorized. It
is signed as part of the root signature and MUST NOT be modified
after issuance.¶
{
"intent" : "Analyze Q1 sales data and produce a report.",
"authorized_tools" : ["database_read", "file_write"],
"authorized_resources" : ["db://sales/q1-2026"],
"data_classification" : "confidential",
"network_egress" : false,
"persistence" : true,
"max_hops" : 3
}
¶
public, internal,
confidential, restricted. Expresses the
sensitivity level of data the agent is authorized to access.¶
HDP does not mandate a central taxonomy for intent,
authorized_tools, or authorized_resources.
These are self-described by the issuer. Semantic validation of
agent actions against declared scope is an application-layer
concern.¶
The chain array is append-only. Each element records a
single delegation event (hop). The array is empty at issuance and
grows as the token passes through agents. Agents MUST NOT remove
or modify existing entries.¶
{
"seq" : 1,
"agent_id" : "orchestrator-v2",
"agent_type" : "orchestrator",
"agent_fingerprint" : "sha256:abc123...",
"timestamp" : 1711483260000,
"action_summary" : "Decompose analysis task; delegate to sub-agents.",
"parent_hop" : 0,
"hop_signature" : "<base64url-encoded Ed25519 signature>"
}
¶
orchestrator, sub-agent,
tool-executor, custom.¶
The signature object carries the root signature computed
by the issuer.¶
{
"kid" : "alice-signing-key-v1",
"alg" : "Ed25519",
"value" : "<base64url-encoded Ed25519 signature over canonical JSON>"
}
¶
The alg field MUST be Ed25519 for HDP v0.1.
The kid field SHOULD be used by verifiers to identify
the correct public key when multiple keys are in circulation.¶
The root signature is computed by the issuer at token creation time. It covers the token's header, principal, and scope , the fields that constitute the human authorization event.¶
The signing procedure is:¶
hdp, header, principal,
scope, and chain (empty array at issuance)
fields.¶
signature object (kid,
alg, value) to the token.¶
The signature field itself MUST NOT be included in the
canonical JSON payload before signing. The signed payload is
deterministically recoverable by stripping the signature
field from the complete token and re-serializing with RFC 8785.¶
Each hop MUST carry a hop_signature. This signature
binds the new hop record to the entire accumulated delegation
history and to the root signature, making retroactive chain
modification detectable.¶
The hop signing procedure is:¶
hop_signature).¶
[hop_1, hop_2, ..., hop_(n-1), new_hop_unsigned]
where hop_1 through hop_(n-1) are the
previously signed hops (WITH their hop_signature
fields) and new_hop_unsigned is the new hop record
WITHOUT its hop_signature.¶
[root_sig_value, hop_1, ..., new_hop_unsigned].
This chains the hop signature to the root.¶
hop_signature
field on the new hop record.¶
chain array.¶
The asymmetry between previously-signed hops (WITH
hop_signature) and the new hop (WITHOUT
hop_signature) in step 2 is intentional and critical.
The verifier MUST reconstruct this exact payload structure
when verifying each hop. See Section 5.¶
The following rules govern chain construction and MUST be enforced by both extenders and verifiers:¶
seq values MUST start at 1 and increment by
exactly 1. No gaps are permitted.¶
parent_hop MUST reference a valid prior
hop index (0 for the root human authorization, or the
seq value of a prior hop).¶
scope.max_hops is set, the chain length MUST
NOT exceed it. A token with a full chain MUST NOT be
extended.¶
timestamp SHOULD be monotonically
non-decreasing.¶
hop_signature field MUST be present on every
hop. A hop without a hop_signature is a protocol
violation and MUST cause verification to fail.¶
A verifier MUST execute the following seven steps in order. A failure at any step MUST cause immediate rejection with an appropriate error. The verifier MUST NOT proceed to subsequent steps after a failure.¶
hdp field MUST contain a recognized protocol
version string. For this specification, the only recognized
value is "0.1".¶
header.expires_at MUST be strictly
greater than the current time. Expired tokens MUST be
rejected.¶
signature field and serializing the remaining token
object per RFC 8785. Verify the Ed25519 signature in
signature.value against this payload using the
issuer's public key. A failure indicates tampering with the
header, principal, or scope.¶
chain, verify that
hop.seq == (index + 1). Any gap or duplication
MUST cause rejection.¶
Hop signature verification.
For each hop at index i:¶
hop_signature is present. Absence
MUST cause rejection.¶
i without its hop_signature, prepended
by the root signature value.¶
hop_signature against the issuer's public key
(the same key used for the root signature in HDP v0.1).¶
scope.max_hops is defined, the length of
chain MUST NOT exceed it.¶
header.session_id MUST exactly match the
session_id provided by the verifying application. This
prevents token replay across sessions. See
Section 10.4.¶
An optional eighth step MAY be performed if the application has
registered a Proof-of-Humanity verifier: if
principal.poh_credential is present and a verifier
callback is configured, the credential MUST be validated by that
callback. See Section 9.3.¶
Verification is fully offline. Steps 1 through 7 require only the issuer's Ed25519 public key and the current session identifier. No network call, registry lookup, or third-party contact is required at any step.¶
HDP v0.1 supports one principal per token. Joint authorization
by multiple humans is achieved by sequential chaining: Human A
issues token T1; Human B issues token T2 with
parent_token_id equal to T1's token_id.
Each token is independently signed with its issuer's key.¶
To verify a multi-principal chain, the verifier MUST:¶
T[i].header.parent_token_id == T[i-1].header.token_id
for all i > 0.¶
session_id.¶
This pattern provides joint authorization auditably without requiring a threshold signature scheme. Each principal's authorization is a distinct signed artifact. A future version of HDP (v0.2) is planned to introduce simultaneous multi- signature primitives using threshold signature schemes.¶
HDP tokens MAY be transmitted in HTTP requests and responses
using the X-HDP-Token header. The header value is the
base64url encoding (RFC 4648, no padding) of the UTF-8
JSON serialization of the complete token object.¶
Implementations MUST NOT include tokens in URL query parameters, as this exposes sensitive data in server logs and browser history.¶
When token size is a concern (e.g., large chains), the token
MAY be stored server-side and referenced by its
token_id using the X-HDP-Token-Ref header.¶
Implementations using token-by-reference MUST secure the token store and use transport-layer security (TLS) for all reference resolution.¶
Issuers that wish to publish their Ed25519 public keys for
automated discovery SHOULD serve a JSON document at
/.well-known/hdp-keys.json with the following
structure:¶
{
"keys": [
{
"kid" : "alice-signing-key-v1",
"alg" : "Ed25519",
"pub" : "<base64url-encoded 32-byte Ed25519 public key>"
}
]
}
¶
This format is intentionally minimal. Implementations MAY
extend it with additional metadata. The alg field
MUST be "Ed25519" for HDP v0.1 keys. Consumers MUST
reject entries with unrecognized alg values.
Consumers MUST validate that the decoded public key is
exactly 32 bytes.¶
The principal object may contain PII (email address,
display name). Issuers SHOULD apply the principle of minimum
disclosure when constructing tokens that will traverse multiple
agents. Specifically:¶
id_type: "opaque" with an application-internal
identifier rather than embedding the user's email address in
tokens that will be sent to third-party agents.¶
display_name when the receiving agent does not
require a human-readable identity.¶
The token structure separates the identity fields
(principal) from the audit-relevant fields
(header, scope, chain). Implementations
MAY strip the principal object when forwarding tokens
to agents that do not require principal identity, while preserving
the integrity of the signature chain. Note that stripping
principal invalidates the root signature; stripped tokens
MUST be clearly marked as audit-only records and MUST NOT be
presented for signature verification.¶
HDP tokens may constitute personal data under applicable privacy
regulations (e.g., GDPR Article 4(1)) when the
principal.id or principal.display_name fields
contain directly or indirectly identifying information.¶
Implementations SHOULD:¶
header.expires_at.¶
principal.id where
possible, maintaining a separate mapping that can be
destroyed independently of the token audit log.¶
The optional principal.poh_credential field MAY carry
a credential attesting that the principal is a human (e.g., a
Worldcoin World ID proof, a CAPTCHA session token, or a
biometric attestation identifier). The HDP protocol does not
define the semantics of this field; verification is entirely
application-defined.¶
When a PoH verifier is configured, the verification pipeline MUST validate the credential as the final step (after session binding) and MUST reject the token if validation fails. The verifier callback SHOULD be idempotent and SHOULD NOT have side effects.¶
HDP is designed to provide provenance and tamper evidence, not runtime enforcement. An agent that exceeds its declared scope is still a bad actor , HDP creates an evidence trail, not a capability boundary. Applications requiring runtime enforcement MUST implement it at the application layer using the HDP token as audit input.¶
A forged token , one whose header, principal,
or scope fields do not match the original issuance , will
fail Step 3 of the verification pipeline (root signature check).
The security of this step relies on the unforgeability of Ed25519
signatures and the collision resistance of SHA-512 (used
internally by Ed25519). An attacker who does not possess the
issuer's private key cannot produce a valid root signature for
a modified token.¶
Modification of any hop in chain , including removal,
reordering, or field modification , will cause hop signature
verification (Step 5) to fail for the tampered hop and all
subsequent hops, because each hop signature covers all previous
hops. Insertion of a fabricated hop will similarly fail unless
the attacker possesses the issuer's private key.¶
HDP provides two orthogonal replay defenses:¶
expires_at, 24h default). An expired token is
rejected at Step 2 regardless of network conditions.¶
session_id established out-of-band between issuer
and verifier. A token is valid only within the session for
which it was issued. Even a non-expired token cannot be
replayed across sessions.¶
Together, these defenses ensure that a stolen token is useful to an attacker only within the original session and only before it expires. Applications with high security requirements SHOULD use short token lifetimes (minutes, not hours).¶
Prompt injection attacks attempt to cause an agent to act as if it received instructions from a legitimate principal, when in fact the instructions originate from adversarial content in the agent's environment (e.g., a malicious web page or document). HDP mitigates but does not fully prevent this attack.¶
An HDP-aware agent SHOULD refuse to extend a token's chain with
an action_summary that contradicts the token's
scope.intent. However, the protocol cannot enforce
this semantically , the comparison between action intent and
token scope is application-defined.¶
The primary mitigation HDP provides is that injected actions
MUST be recorded in the chain to be valid, creating an
auditable record that the action occurred. Post-hoc detection of
prompt injection attacks is thereby supported.¶
The security of all HDP guarantees depends on the confidentiality of the issuer's Ed25519 private key. Implementations MUST:¶
kid while maintaining the old key in the verifier's
registry until all tokens signed with it have expired.¶
HDP makes a strong architectural guarantee: a correct implementation of the 7-step verification pipeline requires no network calls, no registry lookups, and no third-party contact. The complete trust state required for verification is:¶
This guarantee enables HDP verification in air-gapped environments, edge deployments with intermittent connectivity, and latency-sensitive contexts where a network round-trip before every action is unacceptable.¶
This document requests registration of the following HTTP header fields in the "Hypertext Transfer Protocol (HTTP) Field Name Registry" maintained at <https://www.iana.org/assignments/http-fields/>.¶
This document requests registration of the media type
application/hdp-token+json in the "Media Types"
registry for use in contexts where the Content-Type of an
HDP token must be explicitly identified.¶
The Intent Provenance Protocol [I-D.haberkamp-ipp] and HDP address the same root problem with different architectural trade-offs. The key differences are:¶
session_id binding as the revocation mechanism; no
registry polling is required at any point.¶
genesis_seal , a cryptographic
artifact linking every token to the specification author's
public key at
https://ipp.khsovereign.com/keys/founding_public.pem.
Self-hosted IPP deployments are cryptographically bound to
this third-party key. HDP tokens carry no genesis seal and no
spec-level attribution; any organization can issue and verify
HDP tokens without anchoring to a third party.¶
id_type: "opaque" as a first-class
option, making DID infrastructure optional rather than
required.¶
These are design choices, not defects. Deployments with reliable connectivity to a central registry, existing DID infrastructure, and a requirement for mid-chain revocation may prefer IPP. Deployments that prioritize offline operability, self-sovereignty, and minimal infrastructure may prefer HDP.¶
OAuth 2.0 Token Exchange [RFC8693] defines a mechanism for exchanging one security token for another, including delegation and impersonation use cases. HDP and RFC 8693 are complementary rather than competing: RFC 8693 governs access token issuance and delegation in an OAuth 2.0 authorization server context, while HDP governs the provenance record that travels with an agentic task regardless of the authentication mechanism used.¶
HDP tokens do not replace OAuth access tokens. An agent framework MAY use OAuth 2.0 for resource authorization and HDP for delegation provenance simultaneously.¶
JSON Web Token [RFC7519] provides a general-purpose signed claims format. HDP differs from JWT in three respects:¶
chain) that has no equivalent in the
JWT standard claims set.¶
UCAN defines a capability-based authorization token system using JWT with chained delegation. HDP and UCAN share the concept of delegation chains but differ significantly in scope: UCAN is a general capability authorization system, while HDP is specifically a provenance record for human-authorized agentic tasks. HDP makes no claims about capability enforcement; UCAN tokens carry executable capabilities that are enforced by receiving systems.¶
The following is a complete HDP token with a two-hop delegation chain, for illustrative purposes. Signature values are truncated.¶
{
"hdp": "0.1",
"header": {
"token_id" : "550e8400-e29b-41d4-a716-446655440000",
"issued_at" : 1711483200000,
"expires_at" : 1711569600000,
"session_id" : "sess-20260326-abc123",
"version" : "0.1"
},
"principal": {
"id" : "usr_alice_opaque",
"id_type" : "opaque",
"display_name" : "Alice Chen"
},
"scope": {
"intent" : "Analyze Q1 sales data and produce a report.",
"authorized_tools" : ["database_read", "file_write"],
"data_classification" : "confidential",
"network_egress" : false,
"persistence" : true,
"max_hops" : 3
},
"chain": [
{
"seq" : 1,
"agent_id" : "orchestrator-v2",
"agent_type" : "orchestrator",
"timestamp" : 1711483260000,
"action_summary" : "Decompose analysis task; delegate to sub-agents.",
"parent_hop" : 0,
"hop_signature" : "base64url-sig-1..."
},
{
"seq" : 2,
"agent_id" : "sql-agent-v1",
"agent_type" : "sub-agent",
"timestamp" : 1711483320000,
"action_summary" : "Execute read query against sales database.",
"parent_hop" : 1,
"hop_signature" : "base64url-sig-2..."
}
],
"signature": {
"kid" : "alice-signing-key-v1",
"alg" : "Ed25519",
"value" : "base64url-root-sig..."
}
}
¶
This section will be removed before publication as an RFC.¶