<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ni-a2a-ai-agent-security-requirements-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="agent-security-requirements">Security Requirements for AI Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-ni-a2a-ai-agent-security-requirements-00"/>
    <author fullname="Yuan Ni">
      <organization>Huawei</organization>
      <address>
        <email>niyuan1@huawei.com</email>
      </address>
    </author>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <author fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author fullname="Qiangzhou Gao">
      <organization>Huawei</organization>
      <address>
        <email>gaoqiangzhou@huawei.com</email>
      </address>
    </author>
    <author fullname="Zhenbin Robin Li">
      <organization>Huawei</organization>
      <address>
        <email>robinli314@163.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="02"/>
    <area>SEC</area>
    <workgroup>agent2agent</workgroup>
    <keyword>AI Agent</keyword>
    <keyword>Provisioning</keyword>
    <keyword>Authentication</keyword>
    <keyword>Authorization</keyword>
    <abstract>
      <?line 51?>

<t>This document discusses security requirements for  AI agents, covering different stages of security interactions. These include provisioning, registration, cross-domain interconnection, and access control.</t>
    </abstract>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the widespread application of agentic AI technology across various business scenarios, its security issues have become increasingly prominent.</t>
      <t>This document aims to provide an architecture addressing security requirements across different stages of interactions of Agentic AI use cases. These includes provisioning, registration, cross-domain interconnection, and access control. This document establishes a starting point to guide Agentic AI security design, development, and implementation consideration discussions.</t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <artwork><![CDATA[
                 +----------------+                    
                 |  Master Agent  |                    
                 +-^--------------+                    
                 +-+--------------+                    
                 | |  Firewall    |                    
                 +-+--------------+                    
                   |                                   
-------------- (2) | Inter-domain--------------                                
                   |                                   
+------------------+---------------------------------+ 
|                +-+--------------+   Intra-domain   | 
|                | |  Firewall    |                  | 
|                +-+--------------+                  | 
|                +-v--------------+                  | 
|        +-------+  Master Agent  |                  | 
|   (3)  |       +----------------+                  | 
|        |                              (1)          | 
|   +----v-----+    +----------+    +----------+     | 
|   |  Agent   +---->  Agent   +---->  Agent   |     | 
|   +----+-----+    +----------+    +----+-----+     | 
|        |                               |           | 
|     +--v---------+           +---------v---+       | 
|     |    DB      |           |     API     |       | 
|     +------------+           +-------------+       | 
+----------------------------------------------------+ 
]]></artwork>
      <t><em>Figure 1. Architecture of Agent Security Control and Management</em></t>
      <t>The architecture of agent security control and management is illustrated in Figure 1. There are four types of security interactions, in a sequential order:</t>
      <ol spacing="normal" type="1"><li>
          <t>Provisioning and Registration: Creating agent identity, establishing initial trust, provisioning agent secrets and credentials.</t>
        </li>
        <li>
          <t>Cross-domain Interconnection: Enabling secure, authenticated communication between agents across different trust domains.</t>
        </li>
        <li>
          <t>Access Control: The Master Agent validates both intra-domain and inter-domain access tokens, creates internal workflow and manages different credentials for heterogeneous systems.</t>
        </li>
      </ol>
      <t>Therefore, the architecture includes four components:</t>
      <ol spacing="normal" type="1"><li>
          <t>Firewall:  A network security device designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined security rules.</t>
        </li>
        <li>
          <t>Master Agent: The central orchestrating entity that manages multi-agent operations, including cross-domain communication, workflow coordination, credential management, and security policy management.</t>
        </li>
        <li>
          <t>Agents: Autonomous software entities deployed in various domains to perform specific tasks.</t>
        </li>
        <li>
          <t>Heterogeneous systems:  API endpoints, microservices, tools, and databases.</t>
        </li>
      </ol>
    </section>
    <section anchor="provisioning-and-registration">
      <name>Provisioning and Registration</name>
      <t>Figure 2 shows the diagram of provisioning and registration, which includes Agent Certificate Authority(ACA) and Agent Registry Service(ARS):</t>
      <ol spacing="normal" type="1"><li>
          <t>ACA (Agent Certificate Authority): A trusted third party that issues and manages credentials for agents.</t>
        </li>
        <li>
          <t>ARS (Agent Registry Service): A system responsible for agent identity registration and discovery-matching.</t>
        </li>
      </ol>
      <artwork><![CDATA[
+-------------------------------------------+
|                                           |
| +-----------------+  +------------------+ |
| |Agent Certificate|  |  Agent Registry  | |
| |Authority(ACA)   |  |  Service(ARS)    | |
| +--------^--------+  +---------^--------+ |
|          |                     |          |
|         ++---------------------++         |
|         ||     +----------+    ||         |
|         |+----->   Agent  +----+|         |
|         |      +----------+     |         |
|         |                       |         |
|         |   device/container    |         |
|         +-----------------------+         |
|                                           |
+-------------------------------------------+
]]></artwork>
      <t><em>Figure 2. Diagram for Provisioning and Registration</em></t>
      <section anchor="identity-provisioning-and-management">
        <name>Identity Provisioning and Management</name>
        <t>Identity provisioning and management are the process of creating and assigning a verifiable digital identity to an agent.</t>
        <ul spacing="normal">
          <li>
            <t>Initial Trust Establishment: Intial trust can be established through one or more of the following trust anchors, including, but are not limited to: a manufacturer-embedded immutable credential like an IDevID certificate; a hardware root of trust like a Trusted Platform Module (TPM) or Hardware Security Module (HSM); identity documents like an AWS Instance Identity Document or an Azure Managed Service Identity token. This step verifies the agent's execution environment (device, container, etc.) as trustworthy, allows the device or container to join the network, thereby enabling secure operations for all subsequent steps.</t>
          </li>
          <li>
            <t>Credential Request: During a credential request, the agent must provide multiple proofs of its legitimacy, such as a Certificate Signing Request or a Proof of Possession by signing with the corresponding private key, as well as remote attestation by collecting and submitting evidence to a RATS (Remote Attestation Procedures) Verifier. Additionally, to define the agent's operational scope, the request should incorporate user identity context, binding the credential to a specific human user or an organizational role.</t>
          </li>
          <li>
            <t>Credential Issuarance: The ACA validates proofs and requests from the above two steps, if passed, it issues an agent-specific credential that may include its owner or requester identity, capabilities, locator, acceptable validation methods for the ARS.</t>
          </li>
          <li>
            <t>Credential Lifecycle Mangement: The ACA not only issues credentials but also defines and enforces revocation policies. These policies are triggered by specific events, such as a detected security compromise, the agent's scheduled decommissioning, or a key rotation.</t>
          </li>
        </ul>
      </section>
      <section anchor="agent-registration">
        <name>Agent Registration</name>
        <t>After receiving a credential from the ACA, the agent then sends it to the ARS to authenticate itself and start the registration process.</t>
        <ul spacing="normal">
          <li>
            <t>Authentication: The ARS must verify the legitimacy of the credential submitted by the agent. It must be signed or otherwise endorsed by the ACA.</t>
          </li>
          <li>
            <t>Registration: The ARS then checks if the information signed by the ACA, such as the agent's capabilities, exactly matches the registration request sent by the agent. Upon successful validation, the ARS assigns the agent a unique identifier and establishes an agent record that links the identifier to its attributes.</t>
          </li>
          <li>
            <t>Record Management: This step automatically removes expired credentials and synchronizes with the ACA to ensure timely revocation of credentials, preventing the use of invalid or compromised credentials.</t>
          </li>
        </ul>
      </section>
      <section anchor="agent-onboarding">
        <name>Agent Onboarding</name>
        <t>Agent onboarding differs between campus and cloud environments. On campus, agents use protocols like EAP-TLS for network access. In the cloud, the process involves injected sidecars, which register agents to the central service mesh registry automatically to enable communication and management.</t>
      </section>
    </section>
    <section anchor="cross-domain-interconnection">
      <name>Cross-Domain Interconnection</name>
      <section anchor="cross-domain-identifier-interoperability">
        <name>Cross-Domain Identifier Interoperability</name>
        <t>Different domains may use distinct identifier schemas. Possible methods include:</t>
        <ul spacing="normal">
          <li>
            <t>pre-configured schema translation</t>
          </li>
          <li>
            <t>cross-domain identifier synchronization</t>
          </li>
          <li>
            <t>a universal parsing framework or system</t>
          </li>
        </ul>
      </section>
      <section anchor="secure-cross-domain-transmission">
        <name>Secure Cross-Domain Transmission</name>
        <t>Mutual TLS (mTLS) connection starts from the external requesting agent to the master agent. The master agent terminates the mTLS connection and parses the application layer requests. In this case, the master agent functions as an OAuth resource server, and manages internal task orchestration.</t>
      </section>
      <section anchor="authenticating-external-calls">
        <name>Authenticating External Calls</name>
        <t>The master agent then verifies the identity of the requesting agent, and whether or not it has permission to the requested service or agent. Different authentication methods might be possible:</t>
        <ul spacing="normal">
          <li>
            <t>API keys</t>
          </li>
          <li>
            <t>Username-password</t>
          </li>
          <li>
            <t>Pre-shared secrets</t>
          </li>
          <li>
            <t>Assertions (for example, JWT Authorization Grant<xref target="I-D.draft-ietf-oauth-identity-chaining-06"/>)</t>
          </li>
        </ul>
        <t>which can even be combined with AND/OR logic. During this process, the master agent might be able to identify the caller endpoint type:</t>
        <ul spacing="normal">
          <li>
            <t>human user via browser or app</t>
          </li>
          <li>
            <t>human user via API</t>
          </li>
          <li>
            <t>AI agents</t>
          </li>
          <li>
            <t>Hardware or equipment via an IoT API</t>
          </li>
        </ul>
      </section>
      <section anchor="iam-integration">
        <name>IAM Integration</name>
        <t>Since the agent may inherit its access rights from its owner or user, when authenticating requests, the validation might require integration of IAM systems for redirected verification.</t>
      </section>
    </section>
    <section anchor="access-control">
      <name>Access Control</name>
      <section anchor="authorization-handling">
        <name>Authorization Handling</name>
        <t>The master agent acts as the role of OAuth 2.1 resource server. It must validate access tokens as described in OAuth 2.1 Section 5.2. If validation fails, it must respond according to OAuth 2.1 Section 5.3 error handling requirements.</t>
      </section>
      <section anchor="authorization-chaining-across-domains">
        <name>Authorization Chaining Across Domains</name>
        <t>In an agentic AI use case, a request may traverse multiple resource servers in multiple trust domains before completing. It will be common that the requesting agent from domain A needs to access the resource server (master agent) of domain B. During this process, the following information should be preserved:</t>
        <ul spacing="normal">
          <li>
            <t>Original requesting agent identity</t>
          </li>
          <li>
            <t>Authorization context
            </t>
            <ul spacing="normal">
              <li>
                <t>Scope</t>
              </li>
              <li>
                <t>Resource</t>
              </li>
              <li>
                <t>Audience</t>
              </li>
              <li>
                <t>Grant type</t>
              </li>
              <li>
                <t>Assertion</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The current best practice is <xref target="I-D.draft-ietf-oauth-identity-chaining-06"/>.</t>
      </section>
      <section anchor="converting-to-internal-workflow">
        <name>Converting to Internal Workflow</name>
        <ul spacing="normal">
          <li>
            <t>Workflow Generation: Complex tasks often require multi-agent collaboration. The master agent receives, parses, and extracts the original job request from the external requesting agent, then create sequential workflows or parallel calls. This requires the master agent to have information of all callable internal API assets, agent capabilities, etc.</t>
          </li>
          <li>
            <t>Downscoping: If the master agent intends to use a workflow, it extracts the original caller's identity and authorization context, and initiates a new internal workflow. It should follow the current least privilege best practice of downscoping-Transaction Tokens as specified in <xref target="I-D.draft-tulshibagwale-oauth-transaction-tokens-05"/>. The access rights to each downstream workload decrease.</t>
          </li>
        </ul>
      </section>
      <section anchor="interoperability-for-heterogeneous-systems">
        <name>Interoperability for Heterogeneous Systems</name>
        <t>Within a domain, there might exist different types of heterogeneous systems or legacy systems that require different authentication methods. They could be API endpoints, microservices, tools or databases. The exact authentication methods are determined by the service itself, for example,</t>
        <ul spacing="normal">
          <li>
            <t>bearer tokens</t>
          </li>
          <li>
            <t>API keys</t>
          </li>
          <li>
            <t>pre-shared secrets</t>
          </li>
          <li>
            <t>username-passwords</t>
          </li>
          <li>
            <t>X.509 certificates, etc.</t>
          </li>
        </ul>
        <t>As a result, the master agent also works as an intermediary credential manager that converts the formats, scopes, identity of the credential, bridging the gap between heterogeneous systems and platforms.</t>
        <t>Examples include:</t>
        <ul spacing="normal">
          <li>
            <t>Static secrets (API keys) to be exchanged to short-lived, on demand credentials (bearer tokens)</t>
          </li>
        </ul>
      </section>
      <section anchor="zero-trust-analysis">
        <name>Zero Trust Analysis</name>
        <t>The above information can be used as rich context that allow zero trust access control. Remote attestation results of the requesting agent could also be part of access policy decision point's inputs. Remote attestation results of the requesting agent could include the following information:</t>
        <ul spacing="normal">
          <li>
            <t>RoT and trust anchors</t>
          </li>
          <li>
            <t>Identifiers</t>
          </li>
          <li>
            <t>Affiliations</t>
          </li>
          <li>
            <t>Posture assessment results</t>
          </li>
          <li>
            <t>Capabilities</t>
          </li>
        </ul>
        <t>The overall information will be used as input of Policy Engine (PE) and Policy Decision Point (PDP).</t>
      </section>
      <section anchor="microsegmentation">
        <name>Microsegmentation</name>
        <t>Microsegmentation may be enforced to prevent lateral movement of security risks. Possible granularity of microsegmentation includes:</t>
        <ul spacing="normal">
          <li>
            <t>per IP segment/subnet</t>
          </li>
          <li>
            <t>per each workload</t>
          </li>
          <li>
            <t>per tags and attributes (of workload), etc.</t>
          </li>
        </ul>
        <t>There should be policy enforcement points (PEP) at the perimeter of each segment. Each PEP can receive software-defined security policies issued by PE/PDP.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-oauth-identity-chaining-06">
          <front>
            <title>OAuth Identity and Authorization Chaining Across Domains</title>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>SPIRL</organization>
            </author>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>SPIRL</organization>
            </author>
            <author fullname="Kelley Burgin" initials="K." surname="Burgin">
              <organization>MITRE</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>NSA-CCSS</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="12" month="September" year="2025"/>
            <abstract>
              <t>   This specification defines a mechanism to preserve identity and
   authorization information across trust domains that use the OAuth 2.0
   Framework.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Web Authorization
   Protocol Working Group mailing list (oauth@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/oauth/.

   Source for this draft and an issue tracker can be found at
   https://github.com/oauth-wg/oauth-identity-chaining.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-identity-chaining-06"/>
        </reference>
        <reference anchor="I-D.draft-tulshibagwale-oauth-transaction-tokens-05">
          <front>
            <title>Transaction Tokens</title>
            <author fullname="Atul Tulshibagwale" initials="A." surname="Tulshibagwale">
              <organization>SGNL</organization>
            </author>
            <author fullname="George Fletcher" initials="G." surname="Fletcher">
              <organization>Capital One</organization>
            </author>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>Microsoft</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   Transaction Tokens (Txn-Tokens) enable workloads in a trusted domain
   to ensure that user identity and authorization context of an external
   programmatic request, such as an API invocation, are preserved and
   available to all workloads that are invoked as part of processing
   such a request.  Txn-Tokens also enable workloads within the trusted
   domain to optionally immutably assert to downstream workloads that
   they were invoked in the call chain of the request.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tulshibagwale-oauth-transaction-tokens-05"/>
        </reference>
      </references>
    </references>
    <?line 265?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
