<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-wimse-identifier-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Workload Identifier">Workload Identifier</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-identifier-00"/>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yaroslavros@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>CyberArk</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <date year="2025" month="November" day="02"/>
    <area/>
    <workgroup>Workload Identity in Multi System Environments</workgroup>
    <keyword>workload</keyword>
    <keyword>identifier</keyword>
    <abstract>
      <?line 46?>

<t>This document defines a canonical identifier for workloads, referred to as the Workload Identifier. A Workload Identifier is a URI that uniquely identifies a workload within the context of a specific trust domain. This identifier can be embedded in digital credentials, including X.509 certificates and security tokens, to support authentication, authorization, and policy enforcement across diverse systems. The Workload Identifier format ensures interoperability, facilitates secure identity federation, and enables consistent identity semantics.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-wimse.github.io/draft-ietf-wimse-identifier/draft-ietf-wimse-identifier.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-wimse-identifier/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Workload Identity in Multi System Environments  mailing list (<eref target="mailto:wimse@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/wimse/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/wimse/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-wimse/draft-ietf-wimse-identifier"/>.</t>
    </note>
  </front>
  <middle>
    <?line 51?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In modern distributed systems, workloads such as services, applications, or containerised tasks require cryptographically verifiable identities to support secure communication, access control, and auditability. As systems scale across trust domains, administrative boundaries, and heterogeneous platforms, the need for a consistent and interoperable identifier format becomes critical.</t>
      <t>This document defines the Workload Identifier, a URI-based <xref target="URI"/> identifier intended to uniquely represent a workload within the context of an issuing authority. The identifier is designed to be stable, globally unique within a given trust domain, and suitable for use in digital credentials such as X.509 certificates , JSON Web Tokens (JWTs, <xref target="JWT"/>), and other security artifacts.</t>
      <t>The Workload Identifier format is simple yet expressive. It enables organisations to define trust boundaries, delegate identity management, and reason about workloads in a uniform way across service meshes, cloud environments, and on-premises infrastructure. This specification is intended to be generic and reusable beyond the context of any single system or architecture, including but not limited to the Workload Identity in Multi-System Environments (WIMSE) architecture <xref target="ARCH"/>.</t>
      <t>The primary goals of this specification are:</t>
      <ul spacing="normal">
        <li>
          <t>To define the syntax and semantics of a Workload Identifier.</t>
        </li>
        <li>
          <t>To establish requirements for issuers and consumers of such identifiers.</t>
        </li>
        <li>
          <t>To promote interoperability across different identity systems and domains.</t>
        </li>
      </ul>
      <t>This document does not prescribe how identifiers are issued or verified. Instead, it focuses on the identifier’s format, uniqueness guarantees, and its relationship to trust domains.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The following terms are used throughout this document:</t>
      <dl>
        <dt>Workload:</dt>
        <dd>
          <t>An independently addressable and executable software entity. This may include microservices, containers, virtual machines, serverless functions, or similar components that initiate or receive network communications.</t>
        </dd>
        <dt>Workload Identifier:</dt>
        <dd>
          <t>A URI-based identifier that uniquely represents a workload within a specific trust domain. It is intended to be included in security credentials and interpreted within the scope of an issuing authority.</t>
        </dd>
        <dt>Trust Domain:</dt>
        <dd>
          <t>A security boundary defined and controlled by a single administrative authority. A trust domain establishes its own rules for identity issuance, validation, and policy enforcement.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity responsible for assigning and validating Workload Identifiers.</t>
        </dd>
        <dt>Consumer:</dt>
        <dd>
          <t>An entity that evaluates, verifies or uses a Workload Identifier, typically as part of authentication or authorisation decisions. This includes relying parties, verifiers, and policy enforcement points.</t>
        </dd>
      </dl>
    </section>
    <section anchor="workload-identifier-specification">
      <name>Workload Identifier Specification</name>
      <t>A Workload Identifier is a URI <xref target="URI"/> that uniquely identifies a workload. It encodes both the trust domain and a workload-specific path, enabling unambiguous identification of workloads across administrative and organisational boundaries.</t>
      <t>The identifier is designed to be stable and suitable for inclusion in digital credentials such as X.509 certificates and security tokens. This section defines the format, structure, and associated requirements for Workload Identifiers.</t>
      <section anchor="uri-requirements">
        <name> URI Requirements</name>
        <t>A Workload Identifier <bcp14>MUST</bcp14> be an absolute URI, as defined in <xref section="4.3" sectionFormat="of" target="URI"/>. In addition the URI <bcp14>MUST</bcp14> include an authority that identifies the trust domain within which the identifier is scoped. The scheme and scheme specific part are not defined by this specification. The URI format allows different schemes (e.g., <tt>spiffe</tt> as defined in <xref target="SPIFFE-ID"/>, <tt>wimse</tt>) depending on deployment requirements.  Example identifiers:</t>
        <artwork><![CDATA[
spiffe://incubation.example.org/ns/experimental/analytics/ingest
wimse://trust.corp.example.com/workload/af3e86cb-7013-4e33-b717-11c4edd25679
]]></artwork>
        <t>(Note that the wimse scheme is used as an example and is not defined in this document).</t>
      </section>
      <section anchor="scheme-specific-portion">
        <name>Scheme Specific Portion</name>
        <t>The format and semantics scheme specific part of the URI that follows the identity is determined by the issuer in the trust domain. What the identity refers to is also determined by the issuer. For example a workload identity may refer to a specific instance of a running piece of software or it may refer just to a specific software version running in a particular environment, or it may refer to the role that the software performs within the system.  The scheme specific part of the URI may just be an opaque unique identifier used to look up the additional identity information in another system. Some examples of these concepts are given below:</t>
        <ul spacing="normal">
          <li>
            <t>Opaque identifier</t>
          </li>
        </ul>
        <artwork><![CDATA[
spiffe://prod.trust.domain/89a6ec51-f877-44c0-9501-b213597f2d1d
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Application role</t>
          </li>
        </ul>
        <artwork><![CDATA[
spiffe://prod.trust.domain/ns/prod-01/sa/foo-service
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Specific instance of application role</t>
          </li>
        </ul>
        <artwork><![CDATA[
spiffe://prod.trust.domain/ns/prod-01/sa/foo-service/iid-
      1f814646-87b5-4e26-bb55-1d13caccdd8d
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Specific code for an application role</t>
          </li>
        </ul>
        <artwork><![CDATA[
spiffe://prod.trust.domaain/foo-servce#@sha256:
      c4dbb1a06030e142cb0ed4be61421967618289a19c0c7760bdd745ac67779ca7
]]></artwork>
        <t>Other concepts may be defined within the trust domain depending on what is important in the system and what information is available when the identity is issued. A trust domain should define the scheme specific portion of the URI to meet their auditing and authorization needs.</t>
      </section>
      <section anchor="trust-domain-association">
        <name>Trust Domain Association</name>
        <t>The authority component of the URI defines the trust domain which is responsible for issuing, validating, and managing Workload Identifiers within its scope.  The trust domain <bcp14>SHOULD</bcp14> be a fully qualified domain name belonging to the organization defining the trust domain to help provide uniqueness for the trust domain identifier. While IP addresses are allowed as host names in the URI encoding rules, they <bcp14>MUST NOT</bcp14> be used to represent trust domains except in the case where they are needed for compatibility with legacy naming schemes.</t>
        <t>Workload Identifiers are interpreted in the context of the trust domain that issued the credential. Identifiers with identical path components but different trust domains represent different workloads.</t>
        <t>Issuers within a trust domain <bcp14>MUST</bcp14> ensure uniqueness of all Workload Identifiers they assign.</t>
      </section>
      <section anchor="stability-and-uniqueness">
        <name>Stability and Uniqueness</name>
        <t>Workload Identifiers are intended to be stable over time. An identifier assigned to a specific workload should not be reassigned to a different workload unless explicitly intended by the policies of the trust domain.</t>
        <t>Workload Identifiers are globally unique when the trust domain is globally unique. This is typically achieved by using a fully qualified domain name (FQDN) under organisational control.</t>
        <t>For example, the following contains identifiers of two distinct globally unique Workload Identifiers</t>
        <artwork><![CDATA[
spiffe://dev.example.com/ns/default/database/backend
spiffe://prod.example.com/ns/default/database/backend
]]></artwork>
      </section>
    </section>
    <section anchor="usage-in-credentials-and-tokens">
      <name>Usage in Credentials and Tokens</name>
      <t>Workload Identifiers are designed to be embedded in cryptographic credentials and security tokens that are used to assert the identity of workloads during authentication, authorisation, and auditing. This section describes how such identifiers may be represented in commonly used formats.</t>
      <section anchor="x509-certificates">
        <name> X.509 Certificates</name>
        <t>Workload Identifier included in an X.509 are encoded in the subject alternative name extension as a URI using the uniformResourceIdentifier field, as defined in <xref section="4.2.1.6" sectionFormat="of" target="X509-PROFILE"/>.</t>
        <t>For example,</t>
        <artwork><![CDATA[
X509v3 extensions:
    X509v3 Subject Alternative Name:
        URI:spiffe://example.org/ns/default/analytics/ingest
]]></artwork>
        <t>Consumers <bcp14>MUST NOT</bcp14> attempt to interpret or derive workload identity from other certificate fields such as the Common Name.</t>
      </section>
      <section anchor="json-web-tokens-jwt">
        <name>JSON Web Tokens (JWT)</name>
        <t>When a Workload Identifier is included in a JWT, it <bcp14>MUST</bcp14> appear in the "sub" (Subject) claim, as defined in <xref section="4.1.2" sectionFormat="of" target="JWT"/>.</t>
      </section>
      <section anchor="interpretation-by-consumers">
        <name>Interpretation by Consumers</name>
        <t>Consumers of credentials and tokens <bcp14>MUST</bcp14> validate that the Workload Identifier is consistent with the expected trust domain and issuing authority. Consumers <bcp14>SHOULD NOT</bcp14> make assumptions about internal structure or semantics of the identifier beyond the URI format defined in this specification.</t>
        <t>For authorisation decisions, consumers may map Workload Identifiers to policies or roles. However, such mappings are out of scope for this specification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Workload Identifier is intended to be used as a stable, verifiable identity for workloads. Its use in cryptographic credentials means it must be protected against spoofing, ambiguity, and misinterpretation. This section outlines security considerations for issuers, consumers, and system designers.</t>
      <section anchor="identifier-authenticity">
        <name>Identifier Authenticity</name>
        <t>Workload Identifiers <bcp14>MUST</bcp14> only be considered valid when presented in a credential or token that has been cryptographically verified. An identifier received outside such a context, such as a plaintext string in a request, <bcp14>MUST NOT</bcp14> be treated as authenticated.</t>
        <t>Consumers <bcp14>MUST</bcp14> verify the signature, issuer, and validity of the credential or token before considering Workload Identifier as authenticated.</t>
      </section>
      <section anchor="trust-domain-validation">
        <name>Trust Domain Validation</name>
        <t>Consumers <bcp14>MUST</bcp14> validate that the trust domain in the Workload Identifier matches an expected or explicitly trusted domain. Failure to do so may allow identifiers from unauthorised domains to be accepted as legitimate.</t>
        <t>Where appropriate, consumers should maintain an allowlist of trusted domains or trusted issuing authorities.</t>
      </section>
      <section anchor="identifier-reuse-and-collision">
        <name>Identifier Reuse and Collision</name>
        <t>Issuers <bcp14>SHOULD</bcp14> ensure that Workload Identifiers are not reused across different workloads unless such reuse is intentional and well-scoped. Reassignment of identifiers to unrelated entities can result in privilege escalation or confusion in audit trails.</t>
        <t>Consumers <bcp14>SHOULD</bcp14> assume that identifiers are permanent within their domain of interpretation and treat unexpected reuse with suspicion.</t>
      </section>
      <section anchor="information-disclosure">
        <name>Information Disclosure</name>
        <t>Because Workload Identifiers may encode topological or semantic information, they may inadvertently reveal deployment details. Issuers and system designers should take care not to expose sensitive naming conventions in externally visible identifiers.</t>
        <t>Where possible, identifier paths <bcp14>SHOULD</bcp14> be minimally descriptive and avoid exposing internal implementation details unless necessary for interoperation.</t>
      </section>
      <section anchor="wildcard-and-prefix-matching">
        <name>Wildcard and Prefix Matching</name>
        <t>Consumers <bcp14>SHOULD NOT</bcp14> interpret Workload Identifiers using wildcard or prefix matching unless explicitly specified by policy. For example, treating all identifiers under prefix of <tt>spiffe://example.org/ns/db/</tt> as equivalent may lead to incorrect authorisation.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="URI">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SPIFFE-ID" target="https://github.com/spiffe/spiffe/blob/main/standards/SPIFFE-ID.md">
          <front>
            <title>The SPIFFE Identity and Verifiable Identity Document</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="JWT">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="ARCH">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as a
   running instance of software executing for a specific purpose.  This
   document discusses an architecture for designing and standardizing
   protocols and payloads for conveying workload identity and security
   context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-06"/>
        </reference>
        <reference anchor="X509-PROFILE">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 251?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Authors would like to thank Evan Gilman for his review of the initial text of this document and his guidance.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
