<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ni-wimse-ai-agent-identity-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="wime-ai-agent">WIMSE Applicability for AI Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-ni-wimse-ai-agent-identity-00"/>
    <author fullname="Yuan Ni">
      <organization>Huawei</organization>
      <address>
        <email>niyuan1@huawei.com</email>
      </address>
    </author>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>SEC</area>
    <workgroup>Workload Identity in Multi System Environments</workgroup>
    <keyword>WIMSE</keyword>
    <keyword>AI Agent</keyword>
    <keyword>Identity</keyword>
    <abstract>
      <?line 46?>

<t>This document discusses WIMSE applicability to Agentic AI, so as to establish independent identities and credential management mechanisms for AI agents.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Workload Identity in Multi System Environments Working Group mailing list (<eref target="mailto:wimse@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/wimse/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/wimse/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>AI agents are autonomous software entities that receive an intent, process contextual information, and execute decisions at machine speed with minimal human intervention. Without appropriate guardrails, they may give rise to significant risks:</t>
      <ol spacing="normal" type="1"><li>
          <t>Blurred Network Boundaries: AI agents may operate across systems and platforms, which expands attack surface and amplifies security risks.</t>
        </li>
        <li>
          <t>Arbitrary and Unpredictable Access Patterns: AI agents may perform unexpected actions or access sensitive resources susceptible to malicious manipulation or logical errors.</t>
        </li>
        <li>
          <t>Lack of Accountability: Tracing an AI agent's actions is inherently difficult, leading to difficulty to detect erroneous behaviors.</t>
        </li>
        <li>
          <t>Context Rot: A gradual degradation of their ability to maintain relevant and coherent call contexts over time.
Therefore, for AI agents, the traditional perimeter-based security model has to transform into the identity-based security model, which is a prequisite to implementing precise access control and ensuring security visibility.</t>
        </li>
      </ol>
      <t>To realize this goal, a mechanism should be designed considering the following requirements:</t>
      <ol spacing="normal" type="1"><li>
          <t>Independent, Trustworthy Identities: AI agents should have independent and trustworthy identities and credentials, distinct from those of devices and users. This allows the AI agent to act either on its own behalf or as a delegation of a user, have its own access tokens and workflows.</t>
        </li>
        <li>
          <t>Automated Credential Management: An automated mechanism is necessary for managing credentials with reduced validity period to minimize security exposure.</t>
        </li>
        <li>
          <t>Minimal Privileged Access Tokens: AI agents should have task-oriented, fine-grained access tokens with short validity periods.</t>
        </li>
        <li>
          <t>Explicit Workflows: AI agents need explicit workflow management in order to avoid random agentic access. The workflow could be long-termed and static, or could be short-termed and task-triggered, but the call context must always be visible and preserved.</t>
        </li>
      </ol>
      <t>This document discusses possibility of using WIMSE architecture to provide AI agent identities and credentials. It accords with the original WIMSE use case in Section 3.3.1 Bootstrapping Workload Identifiers and Credentials of <xref target="I-D.ietf-wimse-arch-06"/>. We also discuss requirements of extending WIMSE architecture to bind workload/AI agent identity to its user identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This document uses terms and concepts defined by WIMSE architecture. For a complete glossary please refer to <xref target="I-D.ietf-wimse-arch-06"/>.</t>
      <ol spacing="normal" type="1"><li>
          <t>Trust Domain: A logical grouping of systems that share a common set of security controls and policies. Agent credentials are issued under the authority of a trust domain.</t>
        </li>
        <li>
          <t>AI Agent: The autonomous software entity that initiates the credential request. This document may refer to it as the "agent", but is is essentially the workload instead of the agent in the WIMSE architecture.</t>
        </li>
        <li>
          <t>Identity Server: A trusted entity issuing agent identity and credentials. For simplicity, this document may refer to this component as the "server".</t>
        </li>
        <li>
          <t>Identity Proxy: An intermediary component that can request, inspect, replace or augment agent identity credentials. It exposes an Agent API locally to agents. For simplicity, this document may refer to this component as the "proxy".</t>
        </li>
      </ol>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <section anchor="bootstrapping-ai-agent-identity-and-credentials">
        <name>Bootstrapping AI Agent Identity and Credentials</name>
        <t>This document presumes that the identity server has already been issued a signing certificate which has set keyCertSign in the key usage extension. The server and the proxy are assumed to have established a secure channel.       A basic workflow is shown in Figure 1.</t>
        <ol spacing="normal" type="1"><li>
            <t>As an intermediary between the server and the agents, the proxy provides an agent API that agents can use to initiate identity credential requests.</t>
          </li>
          <li>
            <t>The proxy forwards these requests,  along with the evidence for verifing the operational status of the agent, to the server for processing.</t>
          </li>
          <li>
            <t>The server validates the evidence received from the proxy, and issues the corresponding identity credentials.</t>
          </li>
          <li>
            <t>Once issued, the proxy forwards the agent identity credentials.</t>
          </li>
        </ol>
        <artwork><![CDATA[
                                                                           
                                                                           
                                                                           
  ┌────────────────────────────┐                         
  │                            │                         
  │       Identity Server      │                         
  │                            │                         
  └───────────────▲─┬──────────┘                         
                  │ │                                    
      (2)identity │ │(3)identity                         
      credential  │ │ credential                         
      request &   │ │                                    
      evidence    │ │                                    
┌─────────────────┼─┼───────────────────────────────────┐
│                 │ │ Trust Domain                      │
│                 │ │            (1)identity            │
│                 │ │            credential             │
│ ┌──────────────┬┴─▼──────────┐ request      ┌───────┐ │
│ │              │             ◄──────────────┤       │ │
│ │Identity Proxy│  Agent API  ├──────────────► Agent │ │
│ │              │             │ (4)identity  │       │ │
│ └──────────────┴──────▲──────┘ credential   └───────┘ │
│                       │                               │
│              evidence │                               │
│                       │                               │
├───────────────────────┴───────────────────────────────┤
│                                                       │
│          Hosting Operating Systems and Hardware       │
│                                                       │
└───────────────────────────────────────────────────────┘         
                                                                           
                                                                                                                                   
]]></artwork>
        <t><em>Figure 1: Basic Architecture and the Workflow</em></t>
      </section>
      <section anchor="attestation">
        <name>Attestation</name>
        <t>During the request and issuance of identity credentials, the proxy should gather attestation evidence from the operating system and hardware to verify the operational status of the agent. This information is used by a RATS Verifier (could be the server) to decide whether or not to issue the identity credential of an agent, whether it is a bootstrapping or a renewal request.</t>
      </section>
    </section>
    <section anchor="extensions-to-the-wimse-architecture-binding-workloadai-agent-identity-to-its-user-identity">
      <name>Extensions to the WIMSE Architecture-- Binding Workload/AI Agent Identity to Its User Identity</name>
      <t>AI Agent identity has the full complexity of user identity, since agents may act on behalf of human, organization, etc. Therefore, agent should have a credential that both denotes its identity and its human owner identity, which will provide convenience for future access controls. Cryptographic assurances must be provided that the user approves the credential request.</t>
      <t>Figure 2 illustrates the extended architecture, which binds user identity to agent identity. This architecture extends the basic workflow described in Section 2.2.</t>
      <t>The core process remains largely unchanged from steps 1 to 4. However, a critical enhancement is introduced between steps 2 and 3:</t>
      <t>4.1. Upon receiving an identity credential request, the server forwards it to the user on whose behalf the requesting agent acts. This initiates the user confirmation flow.
  4.2. The user validates the received information. Upon approval, the user should provide a cryptographic signature, binding the user's identity to the requested agent credential.</t>
      <t><strong>Open Question</strong>: How can users effectively provide cryptographic signatures for agent credential requests? Is leveraging hardware security features in user devices a viable and practical approach?</t>
      <artwork><![CDATA[
                                                         
                                                         
                                (4.1)identity            
                                 credential              
                                 request &               
  ┌────────────────────────────┐ evidence     ┌──────┐   
  │                            ├──────────────►      │   
  │       Identity Server      ◄──────────────┤ user │   
  │                            │(4.2)user     │      │   
  └───────────────▲─┬──────────┘confirmation &└──────┘   
                  │ │           signature                
      (2)identity │ │(3)identity                         
      credential  │ │ credential                         
      request &   │ │                                    
      evidence    │ │                                    
┌─────────────────┼─┼───────────────────────────────────┐
│                 │ │ Trust Domain                      │
│                 │ │            (1)identity            │
│                 │ │            credential             │
│ ┌──────────────┬┴─▼──────────┐ request      ┌───────┐ │
│ │              │             ◄──────────────┤       │ │
│ │Identity Proxy│  Agent API  ├──────────────► Agent │ │
│ │              │             │ (4)identity  │       │ │
│ └──────────────┴──────▲──────┘ credential   └───────┘ │
│                       │                               │
│              evidence │                               │
│                       │                               │
├───────────────────────┴───────────────────────────────┤
│                                                       │
│          Hosting Operating Systems and Hardware       │
│                                                       │
└───────────────────────────────────────────────────────┘
]]></artwork>
      <t><em>Figure 2: Extended Architecture and the Workflow</em></t>
    </section>
    <section anchor="comparison-with-cheq">
      <name>Comparison with CHEQ</name>
      <t>While both this document and CHEQ <xref target="I-D.draft-rosenberg-cheq-00"/> introduce a human element to enhance security,  their goals and the underlying mechanisms are different.</t>
      <t>CHEQ focuses primarily on controlling the actions of AI agents. It requires user double confirmation when an AI Agent invokes an OAuth access token request, preventing possible deviation from user expectations.</t>
      <t>The purpose of this document is to provide distinct identity and credentials to AI agents, whether or not it is bound to an owner user of device's parent identity. Whether or not the agent inherits access permission privileges from its user is out of scope of this document.</t>
    </section>
    <section anchor="initial-trust-establishment">
      <name>Initial Trust Establishment</name>
      <t>AI agents may operate in cloud or campus. In the cloud, the initial trust establishment between the proxy and the server has already been solved by solutions like SPIRE.  However, in campus scenarios,  the heterogeneity and limited manageability of devices make credential provisioning challenging, complicating initial trust establishment.</t>
      <t>BRSKI <xref target="RFC8995"/> provides a feasible method by introducing a cryptographically signed artifact called “voucher”.</t>
      <t>In the BRSKI flow, the proxy (acting as a BRSKI pledge) discovers the server (acting as a BRSKI registrar), initiates a TLS handshake, and sends a voucher request including its immutable manufacturer credential—the IDevID (Initial Device Identifier). The server uses this IDevID to contact the manufacturer's service (MASA). After validating the request, the MASA issues a signed voucher.</t>
      <t>The proxy then verifies the manufacturer's signature on the voucher, which securely transferring trust from the manufacturer to the local domain. This verified trust is a prerequisite for the server to issue a local domain device certificate (LDevID). This certificate enrollment step essentially follows the standard EST mechanism <xref target="RFC7030"/>.</t>
      <t>However, it should be noted that BRSKI is not necessarily the only way to achieve this secure integration. The core goal is to bridge the initial trust gap. If the proxy is pre-configured with the target server's public key or certificate and can securely locate it, the standard EST protocol alone may be sufficient to establish trust and obtain the LDevID certificate.</t>
      <t><strong>Open Question:</strong> What are the precise conditions and mechanisms for determining the use of various bootstrap methods (including but not limited to BRSKI and EST)?</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-wimse-arch-06">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as a
   running instance of software executing for a specific purpose.  This
   document discusses an architecture for designing and standardizing
   protocols and payloads for conveying workload identity and security
   context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-06"/>
        </reference>
        <reference anchor="I-D.draft-rosenberg-cheq-00">
          <front>
            <title>CHEQ: A Protocol for Confirmation AI Agent Decisions with Human in the Loop (HITL)</title>
            <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
              <organization>Five9</organization>
            </author>
            <author fullname="Pat White" initials="P." surname="White">
              <organization>Bitwave</organization>
            </author>
            <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
              <organization>Cisco</organization>
            </author>
            <date day="24" month="July" year="2025"/>
            <abstract>
              <t>   This document proposes Confirmation with Human in the Loop (HITL)
   Exchange of Quotations (CHEQ).  CHEQ allows humans to confirm
   decisions and actions proposed by AI Agents prior to those decisions
   being acted upon.  It also allows humans to provide information
   required for tool invocation, without disclosing that information to
   the AI agent, protecting their privacy.  CHEQ aims to guarantee that
   AI Agent hallucinations cannot result in unwanted actions by the
   human on whose behalf they are made.  CHEQ can be integrated into
   protocols like the Model Context Protocol (MCP) and the Agent-to-
   Agent (A2A) protocols.  It makes use of a signed object which can be
   carried in those protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rosenberg-cheq-00"/>
        </reference>
      </references>
    </references>
    <?line 217?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
