<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ni-wimse-ai-agent-identity-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="wime-ai-agent">WIMSE Applicability for AI Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-ni-wimse-ai-agent-identity-01"/>
    <author fullname="Yuan Ni">
      <organization>Huawei</organization>
      <address>
        <email>niyuan1@huawei.com</email>
      </address>
    </author>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>SEC</area>
    <workgroup>Workload Identity in Multi System Environments</workgroup>
    <keyword>WIMSE</keyword>
    <keyword>AI Agent</keyword>
    <keyword>Identity</keyword>
    <abstract>
      <?line 46?>

<t>This document discusses WIMSE applicability to Agentic AI, so as to establish independent identities and credential management mechanisms for AI agents.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Workload Identity in Multi System Environments Working Group mailing list (<eref target="mailto:wimse@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/wimse/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/wimse/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>AI agents are autonomous software entities that receive an intent, process contextual information, and execute decisions at machine speed with minimal human intervention. Without appropriate guardrails, they may give rise to significant risks:</t>
      <ol spacing="normal" type="1"><li>
          <t>Blurred Network Boundaries: AI agents may operate across systems and platforms, which expands attack surface and amplifies security risks.</t>
        </li>
        <li>
          <t>Arbitrary and Unpredictable Access Patterns: AI agents may perform unexpected actions or access sensitive resources susceptible to malicious manipulation or logical errors.</t>
        </li>
        <li>
          <t>Lack of Accountability: Tracing an AI agent's actions is inherently difficult, leading to difficulty to detect erroneous behaviors.</t>
        </li>
        <li>
          <t>Context Rot: A gradual degradation of their ability to maintain relevant and coherent call contexts over time.
Therefore, for AI agents, the traditional perimeter-based security model has to transform into the identity-based security model, which is a prequisite to implementing precise access control and ensuring security visibility.</t>
        </li>
      </ol>
      <t>To realize this goal, a mechanism should be designed considering the following requirements:</t>
      <ol spacing="normal" type="1"><li>
          <t>Independent, Trustworthy Identities: AI agents should have independent and trustworthy identities and credentials, distinct from those of devices and users. This allows the AI agent to act either on its own behalf or as a delegation of a user, have its own access tokens and workflows.</t>
        </li>
        <li>
          <t>Automated Credential Management: An automated mechanism is necessary for managing credentials with reduced validity period to minimize security exposure.</t>
        </li>
        <li>
          <t>Minimal Privileged Access Tokens: AI agents should have task-oriented, fine-grained access tokens with short validity periods.</t>
        </li>
        <li>
          <t>Explicit Workflows: AI agents need explicit workflow management in order to avoid random agentic access. The workflow could be long-termed and static, or could be short-termed and task-triggered, but the call context must always be visible and preserved.</t>
        </li>
      </ol>
      <t>This document discusses possibility of using WIMSE architecture to provide AI agent identities and credentials. It accords with the original WIMSE use case in Section 3.3.1 Bootstrapping Workload Identifiers and Credentials of <xref target="I-D.ietf-wimse-arch-06"/>. We also discuss requirements of extending WIMSE architecture to bind workload/AI agent identity to its user identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This document uses terms and concepts defined by WIMSE architecture. For a complete glossary please refer to <xref target="I-D.ietf-wimse-arch-06"/>.</t>
      <ol spacing="normal" type="1"><li>
          <t>Trust Domain: A logical grouping of systems that share a common set of security controls and policies. Agent credentials are issued under the authority of a trust domain.</t>
        </li>
        <li>
          <t>AI Agent: The autonomous software entity that initiates the credential request. This document may refer to it as the "agent", but is is essentially the workload instead of the agent in the WIMSE architecture.</t>
        </li>
        <li>
          <t>Identity Server: A trusted entity issuing agent identity and credentials. For simplicity, this document may refer to this component as the "server".</t>
        </li>
        <li>
          <t>Identity Proxy: An intermediary component that can request, inspect, replace or augment agent identity credentials. It exposes an Agent API locally to agents. For simplicity, this document may refer to this component as the "proxy".</t>
        </li>
      </ol>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <section anchor="bootstrapping-ai-agent-identity-and-credentials">
        <name>Bootstrapping AI Agent Identity and Credentials</name>
        <t>This document presumes that the identity server has already been issued a signing certificate which has set keyCertSign in the key usage extension. The server and the proxy are assumed to have established a secure channel.       A basic workflow is shown in Figure 1.</t>
        <ol spacing="normal" type="1"><li>
            <t>As an intermediary between the server and the agents, the proxy provides an agent API that agents can use to initiate identity credential requests.</t>
          </li>
          <li>
            <t>The proxy forwards these requests,  along with the evidence for verifing the operational status of the agent, to the server for processing.</t>
          </li>
          <li>
            <t>The server validates the evidence received from the proxy, and issues the corresponding identity credentials.</t>
          </li>
          <li>
            <t>Once issued, the proxy forwards the agent identity credentials.</t>
          </li>
        </ol>
        <artwork><![CDATA[
 
  +----------------------------+                         
  |                            |                         
  |       Identity Server      |                         
  |                            |                         
  +-------------- ^ + ---------+                         
                  | |                                    
      (2)identity | |(3)identity                         
      credential  | | credential                         
      request &   | |                                    
      evidence    | |                                    
+-----------------+-+-----------------------------------+
|                 | | Trust Domain                      |
|                 | |            (1)identity            |
|                 | |            credential             |
| +--------------++ v ---------+ request      +-------+ |
| |              |             <--------------+       | |
| |Identity Proxy|  Agent API  +--------------> Agent | |
| |              |             | (4)identity  |       | |
| +--------------+----- ^ -----+ credential   +-------+ |
|                       |                               |
|              evidence |                               |
|                       |                               |
+-----------------------+-------------------------------+
|                                                       |
|          Hosting Operating Systems and Hardware       |
|                                                       |
+-------------------------------------------------------+
                                                                                                                                                                
]]></artwork>
        <t><em>Figure 1: Basic Architecture and the Workflow</em></t>
      </section>
      <section anchor="attestation">
        <name>Attestation</name>
        <t>During the request and issuance of identity credentials, the proxy should gather attestation evidence from the operating system and hardware to verify the operational status of the agent. This information is used by a RATS Verifier (could be the server) to decide whether or not to issue the identity credential of an agent, whether it is a bootstrapping or a renewal request.</t>
      </section>
    </section>
    <section anchor="extensions-to-the-wimse-architecture-binding-workloadai-agent-identity-to-its-user-identity">
      <name>Extensions to the WIMSE Architecture-- Binding Workload/AI Agent Identity to Its User Identity</name>
      <t>AI Agent identity has the full complexity of user identity, since agents may act on behalf of human, organization, etc. Therefore, agent should have a credential that both denotes its identity and its human owner identity, which will provide convenience for future access controls. Cryptographic assurances must be provided that the user approves the credential request.</t>
      <t>Figure 2 illustrates the extended architecture, which binds user identity to agent identity. This architecture extends the basic workflow described in Section 2.2.</t>
      <t>The core process remains largely unchanged from steps 1 to 4. However, a critical enhancement is introduced between steps 2 and 3:</t>
      <t>4.1. Upon receiving an identity credential request, the server forwards it to the user on whose behalf the requesting agent acts. This initiates the user confirmation flow.
  4.2. The user validates the received information. Upon approval, the user should provide a cryptographic signature, binding the user's identity to the requested agent credential.</t>
      <t><strong>Open Question</strong>: How can users effectively provide cryptographic signatures for agent credential requests? Is leveraging hardware security features in user devices a viable and practical approach?</t>
      <artwork><![CDATA[
                                                                                                                 
                                                         
                                 (4.1)identity            
                                 credential              
  +----------------------------+ request      +------+   
  |                            +-------------->      |   
  |       Identity Server      <--------------+ user |   
  |                            |(4.2)user     |      |   
  +-------------- ^ +----------+confirmation &+------+   
                  | |           signature                
      (2)identity | | (3)identity                        
      credential  | |  credential                        
      request &   | |                                    
      evidence    | |                                    
+-----------------+-+-----------------------------------+
|                 | | Trust Domain                      |
|                 | |            (1)identity            |
|                 | |            credential             |
| +--------------++ v ---------+ request      +-------+ |
| |              |             <--------------+       | |
| |Identity Proxy|  Agent API  +--------------> Agent | |
| |              |             | (4)identity  |       | |
| +--------------+----- ^ -----+ credential   +-------+ |
|                       |                               |
|              evidence |                               |
|                       |                               |
+-----------------------+-------------------------------+
|                                                       |
|          Hosting Operating Systems and Hardware       |
|                                                       |
+-------------------------------------------------------+

]]></artwork>
      <t><em>Figure 2: Extended Architecture and the Workflow</em></t>
    </section>
    <section anchor="comparison-with-cheq">
      <name>Comparison with CHEQ</name>
      <t>While both this document and CHEQ <xref target="I-D.draft-rosenberg-cheq-00"/> introduce a human element to enhance security,  their goals and the underlying mechanisms are different.</t>
      <t>CHEQ focuses primarily on controlling the actions of AI agents. It requires user double confirmation when an AI Agent invokes an OAuth access token request, preventing possible deviation from user expectations.</t>
      <t>The purpose of this document is to provide distinct identity and credentials to AI agents, whether or not it is bound to an owner user of device's parent identity. Whether or not the agent inherits access permission privileges from its user is out of scope of this document.</t>
    </section>
    <section anchor="initial-trust-establishment">
      <name>Initial Trust Establishment</name>
      <t>AI agents may operate in cloud or campus. In the cloud, the initial trust establishment between the proxy and the server has already been solved by solutions like SPIRE.  However, in campus scenarios,  the heterogeneity and limited manageability of devices make credential provisioning challenging, complicating initial trust establishment.</t>
      <t>BRSKI <xref target="RFC8995"/> provides a feasible method by introducing a cryptographically signed artifact called “voucher”.</t>
      <t>In the BRSKI flow, the proxy (acting as a BRSKI pledge) discovers the server (acting as a BRSKI registrar), initiates a TLS handshake, and sends a voucher request including its immutable manufacturer credential—the IDevID (Initial Device Identifier). The server uses this IDevID to contact the manufacturer's service (MASA). After validating the request, the MASA issues a signed voucher.</t>
      <t>The proxy then verifies the manufacturer's signature on the voucher, which securely transferring trust from the manufacturer to the local domain. This verified trust is a prerequisite for the server to issue a local domain device certificate (LDevID). This certificate enrollment step essentially follows the standard EST mechanism <xref target="RFC7030"/>.</t>
      <t>However, it should be noted that BRSKI is not necessarily the only way to achieve this secure integration. The core goal is to bridge the initial trust gap. If the proxy is pre-configured with the target server's public key or certificate and can securely locate it, the standard EST protocol alone may be sufficient to establish trust and obtain the LDevID certificate.</t>
      <t><strong>Open Question:</strong> What are the precise conditions and mechanisms for determining the use of various bootstrap methods (including but not limited to BRSKI and EST)?</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-wimse-arch-06">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as a
   running instance of software executing for a specific purpose.  This
   document discusses an architecture for designing and standardizing
   protocols and payloads for conveying workload identity and security
   context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-06"/>
        </reference>
        <reference anchor="I-D.draft-rosenberg-cheq-00">
          <front>
            <title>CHEQ: A Protocol for Confirmation AI Agent Decisions with Human in the Loop (HITL)</title>
            <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
              <organization>Five9</organization>
            </author>
            <author fullname="Pat White" initials="P." surname="White">
              <organization>Bitwave</organization>
            </author>
            <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
              <organization>Cisco</organization>
            </author>
            <date day="24" month="July" year="2025"/>
            <abstract>
              <t>   This document proposes Confirmation with Human in the Loop (HITL)
   Exchange of Quotations (CHEQ).  CHEQ allows humans to confirm
   decisions and actions proposed by AI Agents prior to those decisions
   being acted upon.  It also allows humans to provide information
   required for tool invocation, without disclosing that information to
   the AI agent, protecting their privacy.  CHEQ aims to guarantee that
   AI Agent hallucinations cannot result in unwanted actions by the
   human on whose behalf they are made.  CHEQ can be integrated into
   protocols like the Model Context Protocol (MCP) and the Agent-to-
   Agent (A2A) protocols.  It makes use of a signed object which can be
   carried in those protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rosenberg-cheq-00"/>
        </reference>
      </references>
    </references>
    <?line 214?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
