<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-ai-agent-auth-new-requirements-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="AI Agent Authentication and Authorization">New requirements for Authentication and Authorization in the AI Agents era</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-ai-agent-auth-new-requirements-00"/>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="06"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 36?>

<t>AI Agents are rapidly evolving from academic concepts into the core engines driving next-generation applications. However, their autonomy, dynamic nature, and complex delegation relationships pose a fundamental challenge to our existing authentication and authorization frameworks, which were designed for human users and traditional software. This document dissects the novel characteristics of AI Agents and outlines the new requirements for authentication and authorization which can manage dynamic behavior rather than verifying static identity.</t>
    </abstract>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Traditional security models are built on a core assumption: the behavior of a protected entity, be it a human or a service, is relatively predictable. We authenticate an "identity" and then grant it a set of fixed "permissions." AI Agents shatter this foundation.</t>
      <t>An AI Agent is not a simple instruction executor; it is a goal achiever. We provide it with a high-level objective (e.g., "optimize supply chain costs"), and it autonomously deconstructs the task, learns from its environment, invokes tools, and may discover innovative operational paths we never anticipated. This shift introduces four disruptive characteristics:</t>
      <t>High Autonomy and Emergent Behavior: An Agent's actions are not pre-coded but are dynamically generated to achieve a goal. Static permission rules can neither foresee nor cover all its possible operations.</t>
      <t>Dynamic, Ephemeral, and Replicable Nature: For efficiency, a primary Agent may spawn thousands of ephemeral sub-agents in an instant to handle parallel tasks. Their identities are transient, massive in scale, and may exist for only milliseconds.</t>
      <t>Complex Delegation and Chains of Responsibility: Agents can form deep, networked call chains. A travel Agent might call a flight Agent, which in turn calls a payment Agent. When an unauthorized action occurs, attributing responsibility and tracing the flow of permissions becomes incredibly complex.</t>
      <t>Continuous Learning and Adaptation: An Agent's decision-making model evolves over time. This means an Agent's "normal behavior" today may differ from yesterday's, making it vulnerable to model drift or malicious manipulation that traditional static credentials cannot detect.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174].</t>
    </section>
    <section anchor="new-authentication-requirementsfrom-who-are-you-to-are-you-still-trustworthy">
      <name>New Authentication Requirements:From "Who Are You?" to "Are You Still Trustworthy?"</name>
      <t>In the face of these characteristics, one-time authentication becomes woefully inadequate. We need a new authentication framework capable of continuously assessing an Agent's trustworthiness.</t>
      <section anchor="new-requirement-1-traceable-identity-and-provenance">
        <name>New Requirement 1: Traceable Identity and Provenance</name>
        <t>Authentication protocols must support a new identity format that is more than just an ID; it's a cryptographic "provenance record." This certificate must contain:</t>
        <t>Genesis Information: The root user or task that initiated the Agent's creation.
Delegation Chain: A cryptographically signed, non-forgeable call path that clearly records every delegation from the genesis to the current instance.</t>
      </section>
      <section anchor="new-requirement-2-continuous-behavioral-attestation">
        <name>New Requirement 2: Continuous Behavioral Attestation</name>
        <t>Authentication cannot be a single event. Protocols must support a lightweight "behavioral heartbeat" mechanism, allowing an Agent to periodically submit a cryptographic digest of its recent actions to a monitoring system. By comparing this digest against an expected behavioral baseline, the system can continuously verify that the Agent is "acting normally," thus detecting hijacking or unexpected drift even if its identity credential remains valid.</t>
      </section>
      <section anchor="new-requirement-3-ultra-low-overhead-identity-management">
        <name>New Requirement 3: Ultra-Low-Overhead Identity Management</name>
        <t>To support massive-scale, ephemeral Agents, protocols must enable near-zero overhead for identity creation and verification. Expensive public-key operations and complex handshakes should be replaced with efficient symmetric-key mechanisms to meet the demands of high-frequency creation, destruction, and continuous attestation.</t>
      </section>
    </section>
    <section anchor="new-authorization-requirements-from-what-permissions-do-you-have-to-what-are-you-allowed-to-do-right-here-right-now">
      <name>New Authorization Requirements: From "What Permissions Do You Have?" to "What Are You Allowed to Do, Right Here, Right Now?"</name>
      <t>Static, Role-Based Access Control (RBAC) is obsolete in the face of autonomous Agents. Authorization decisions must become dynamic, precise, and risk-aware.</t>
      <section anchor="new-requirement-1-intent-driven-just-in-time-jit-permissions">
        <name>New Requirement 1: Intent-Driven, Just-in-Time (JIT) Permissions</name>
        <t>Authorization is no longer about pre-assigning a broad role. Instead, it must be about granting the principle of least privilege required to complete a specific task, at the moment of execution. For example, the system should grant an Agent permission to "execute a payment of amount &lt;= $100 for the purpose of booking a flight" rather than a generic "payment" permission. This permission must expire immediately upon task completion.</t>
      </section>
      <section anchor="new-requirement-2-rich-context-and-risk-awareness">
        <name>New Requirement 2: Rich Context and Risk-Awareness</name>
        <t>Authorization decisions must be based on a rich set of contextual factors, including but not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>The Agent's intent and objective.</t>
          </li>
          <li>
            <t>A risk assessment of the requested operation.</t>
          </li>
          <li>
            <t>Whether its current behavioral patterns are normal.</t>
          </li>
          <li>
            <t>The sensitivity and provenance of the data being accessed.</t>
          </li>
        </ul>
        <t>Protocols must be able to efficiently carry this structured context to the policy engine for real-time evaluation.</t>
      </section>
      <section anchor="new-requirement-3-explainable-and-auditable-authorization">
        <name>New Requirement 3: Explainable and Auditable Authorization</name>
        <t>Given the autonomy of Agents, when something goes wrong, we must be able to answer, "Why was the system authorized to do that?" Therefore, the response from an authorization protocol must be explainable. It should return not just an "Allow" or "Deny" verdict but also the rationale behind the decision, such as the policy IDs that were matched and a snapshot of the critical context evaluated. This is essential for post-mortem audits, accountability, and the iterative refinement of security guardrails.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
    </section>
  </middle>
  <back>
    <?line 108?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
