<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-novak-rats-twi-attestation-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="RATS for TWI">Remote Attestation for Trustworthy Workload Identity</title>
    <seriesInfo name="Internet-Draft" value="draft-novak-rats-twi-attestation-00"/>
    <author initials="M." surname="Novak" fullname="Mark Novak">
      <organization>J.P. Morgan Chase</organization>
      <address>
        <email>mark.f.novak@jpmchase.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm</organization>
      <address>
        <email>Yogesh.Deshpande@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Franhaufer Inst.</organization>
      <address>
        <email>Henk.Birkholz@ietf.contact</email>
      </address>
    </author>
    <date year="2025" month="November" day="05"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>trustworthy workload identity</keyword>
    <keyword>remote attestation</keyword>
    <keyword>stable workload credentials</keyword>
    <abstract>
      <?line 91?>

<t>Trustworthy Workloads are workloads that operate in environments that provide isolation of data in use.
This document describes how Trustworthy Workloads can acquire credentials containing stable identifiers, upon proving the trust in the environments in which they operate via Remote Attestation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-novak-rats-twi-attestation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RATS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 96?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>As organisations move more workloads into untrusted or shared environments, protection of data in use becomes increasingly important. One way of isolating data in use is Confidential Computing: executing a workload (for example an AI model, database process or financial service) inside a hardware-based, remotely attested Trusted Execution Environment (TEE). Workloads operating in such environments need stable and trustworthy identifiers to communicate over the network to the external world. Often such identifiers are provided to them via Credential Authorities upon ascertaining trust in the environments in which these workloads operate. The standard practice to establish trust in the operating environment is through Remote Attestation.</t>
      <t>This draft specifies how a Workload operating in Confidential Computing Environment can obtain trustworthy, stable, and workload-bound credentials using Remote Attestation.</t>
    </section>
    <section anchor="definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms and concepts defined by the WIMSE and RATS architectures, as well as the terms defined by the Trustworthy Workload Identity Special Interest Group at the Confidential Computing Consortium.
For a complete glossary, see <xref section="4" sectionFormat="of" target="RFC9334"/> , <xref target="I-D.draft-ietf-wimse-arch"/> &amp; <xref target="TWISIGDef"/>.</t>
      <t>The definitions of terms like Trustworthy Workload Identity and Workload Credential match those specified by the TWI SIG Definitions <xref target="TWISIGDef"/>.</t>
      <dl>
        <dt>Workload:</dt>
        <dd>
          <t><xref target="I-D.draft-ietf-wimse-arch"/> defines 'Workload' as "an instance of software executing for a specific purpose". Here we restrict that definition to the portions of the deployed software and its configuration that are subject to Remote Attestation.</t>
        </dd>
        <dt>Workload Identifier:</dt>
        <dd>
          <t>a stable construct around which Relying Parties can form long-lived Workload authorization policies.</t>
        </dd>
        <dt>Workload Identity:</dt>
        <dd>
          <t>the definition of Workload Identity is identical to the definition of the same term by <xref target="I-D.draft-ietf-wimse-arch"/>: "a combination of three basic building blocks: trust domain, Workload Identifier and identity credentials.</t>
        </dd>
        <dt>Workload Credential:</dt>
        <dd>
          <t>an ephemeral identity document containing the Workload Identifier and a number of additional claims, that can be short-lived or long-lived, and that is used to represent and prove Workload Identity to a Relying Party.</t>
        </dd>
        <dt>Stable Workload Identity, Stable Authorization Policy:</dt>
        <dd>
          <t>a Workload Identity or Authorization Policy is considered Stable if it remains constant in the face of software and hardware changes (updates and rollbacks), so long as those updates and rollbacks are authorized, i.e., comply with the policy of what consitutes the allowed version(s) of the software and hardware in question.</t>
        </dd>
        <dt>Credential Authority:</dt>
        <dd>
          <t>an entity trusted to issue Workload Credentials</t>
        </dd>
        <dt>Bound Workload Credential:</dt>
        <dd>
          <t>a Workload Credential is considered Bound if it can only be used in conjunction with a secret Credential Key that only a Workload authorized for the use of that Key can obtain, either by generating and certifying it, or by retrieving it from a secure Key Store.</t>
        </dd>
        <dt>Workload Owner:</dt>
        <dd>
          <t>an entity tasked with specifying policies concerning what Workload composition is considered valid for the purposes of issuing Workload Credentials</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>an entity performing the role of Attestation Verification, as documented in <xref section="4" sectionFormat="of" target="RFC9334"/></t>
        </dd>
      </dl>
    </section>
    <section anchor="available-options">
      <name>Available Options</name>
      <t>When dealing with a client Workload that is running inside a remotely attested Trusted Execution Environment, the goal of having a Relying Party having a Stable authorization policy and utilizing industry-standard mechanisms for authorization can be achieved by issuing Credentials in a relying party-friendly format, such as those specified by <xref target="I-D.draft-ietf-wimse-arch"/>. Such Credentials may take the form of x.509 certificates or Workload Identity Tokens (WITs) defined in Section 3.1 of <xref target="WIMSES2S"/>. A Workload can start using the Credential for authentication and authorization once it has two items in its possession: the public portion - the Workload Credential itself, and the secret Credential Key necessary to utilize this Credential.</t>
      <t>A Stable authorization policy can only be achieved if Workloads can have Stable identities. The decision about what constitutes a trustworthy Workload and a trustworthy configuration is a composition verification, with multiple entities providing Reference Values for the components they vouch for. For the issued Workload Identity to be Stable in addition to Trustworthy, a mapping must be performed between these Reference Values and the issued Identities. In a typical enterprise, Stable authorization policies are expressed in terms of business- rather than technology-oriented concepts, e.g., "Payroll Application", "Located in Germany", "Cleared for handling Personally Identifiable Information", etc. This contrasts with what RATS has historically thought of as Attestation Results, which may relate to the hardware manufacturer, firmware and software versions, etc.</t>
      <t>In some implementations, a Credential is precomputed, and the Credential Key is obtained from a Key Store following successful Remote Attestation. In other implementations, the Workload generates its own Credential Key and uses Remote Attestation to certify it.</t>
      <t>Within the RATS Architecture, either of these options can be accomplished in one of three ways:</t>
      <ol spacing="normal" type="1">
        <li>The Workload supplies Evidence to a Verifier and obtains from it Attestation Results. It then provides these Attestation Results to the Credential Authority in exchange for a Credential.</li>
        <li>The Verifier contacts the Credential Authority on the Workload's behalf, and the Attestation Results obtained from the Verifier are (or contain) the Credentials for that Workload.</li>
        <li>The Credential Authority contacts the Verifier on the Workload's behalf, and the Credential Authority constructs the Credential using the Attestation Results received from the Verifier.</li>
      </ol>
      <t>In either case, the detailed information about the Workload's composition conveyed to the Verifier using RATS "Evidence" is mapped to Stable, technology-agnostic, business-oriented claims about the Workload by invoking a new architectural building block called a Claims Mapper, described below.</t>
      <t>These three options can be visualised at a high level as shown below.</t>
      <t>E: Evidence
AR: Attestation Results
CR: Credential Request
C: Credential</t>
      <section anchor="variant-1">
        <name>Variant 1</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="304" viewBox="0 0 304 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 8,144 L 8,208" fill="none" stroke="black"/>
              <path d="M 8,256 L 8,304" fill="none" stroke="black"/>
              <path d="M 32,96 L 32,144" fill="none" stroke="black"/>
              <path d="M 48,208 L 48,256" fill="none" stroke="black"/>
              <path d="M 72,96 L 72,144" fill="none" stroke="black"/>
              <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
              <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
              <path d="M 96,256 L 96,304" fill="none" stroke="black"/>
              <path d="M 176,176 L 176,208" fill="none" stroke="black"/>
              <path d="M 280,144 L 280,208" fill="none" stroke="black"/>
              <path d="M 8,32 L 96,32" fill="none" stroke="black"/>
              <path d="M 8,96 L 24,96" fill="none" stroke="black"/>
              <path d="M 40,96 L 96,96" fill="none" stroke="black"/>
              <path d="M 8,144 L 64,144" fill="none" stroke="black"/>
              <path d="M 80,144 L 96,144" fill="none" stroke="black"/>
              <path d="M 176,144 L 280,144" fill="none" stroke="black"/>
              <path d="M 96,160 L 176,160" fill="none" stroke="black"/>
              <path d="M 96,192 L 176,192" fill="none" stroke="black"/>
              <path d="M 8,208 L 96,208" fill="none" stroke="black"/>
              <path d="M 176,208 L 280,208" fill="none" stroke="black"/>
              <path d="M 8,256 L 40,256" fill="none" stroke="black"/>
              <path d="M 56,256 L 96,256" fill="none" stroke="black"/>
              <path d="M 8,304 L 96,304" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="184,160 172,154.4 172,165.6 " fill="black" transform="rotate(0,176,160)"/>
              <polygon class="arrowhead" points="104,192 92,186.4 92,197.6 " fill="black" transform="rotate(180,96,192)"/>
              <polygon class="arrowhead" points="80,144 68,138.4 68,149.6 " fill="black" transform="rotate(90,72,144)"/>
              <polygon class="arrowhead" points="56,256 44,250.4 44,261.6 " fill="black" transform="rotate(90,48,256)"/>
              <polygon class="arrowhead" points="40,96 28,90.4 28,101.6 " fill="black" transform="rotate(270,32,96)"/>
              <g class="text">
                <text x="52" y="68">Verifier</text>
                <text x="16" y="132">1:E</text>
                <text x="92" y="132">2:AR</text>
                <text x="132" y="148">3:CR</text>
                <text x="228" y="164">Credential</text>
                <text x="52" y="180">Workload</text>
                <text x="128" y="180">4:C</text>
                <text x="224" y="180">Authority</text>
                <text x="64" y="244">5:C</text>
                <text x="48" y="276">Relying</text>
                <text x="48" y="292">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+----------+                       
|          |                       
| Verifier |                       
|          |                       
+--^----+--+                       
   |    |                          
1:E|    |2:AR                        
+--+----v--+  3:CR   +------------+
|          +---------> Credential |
| Workload |  4:C    | Authority  |
|          <---------+            |
+----+-----+         +------------+
     |                             
     |5:C                            
+----v-----+
| Relying  |
|  Party   |
+----------+
]]></artwork>
        </artset>
      </section>
      <section anchor="variant-2">
        <name>Variant 2</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="400" viewBox="0 0 400 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 8,144 L 8,208" fill="none" stroke="black"/>
              <path d="M 8,256 L 8,304" fill="none" stroke="black"/>
              <path d="M 32,96 L 32,144" fill="none" stroke="black"/>
              <path d="M 56,208 L 56,256" fill="none" stroke="black"/>
              <path d="M 88,96 L 88,144" fill="none" stroke="black"/>
              <path d="M 112,32 L 112,64" fill="none" stroke="black"/>
              <path d="M 112,144 L 112,208" fill="none" stroke="black"/>
              <path d="M 112,256 L 112,304" fill="none" stroke="black"/>
              <path d="M 184,64 L 184,96" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 112,32" fill="none" stroke="black"/>
              <path d="M 184,32 L 288,32" fill="none" stroke="black"/>
              <path d="M 112,48 L 184,48" fill="none" stroke="black"/>
              <path d="M 112,80 L 184,80" fill="none" stroke="black"/>
              <path d="M 8,96 L 24,96" fill="none" stroke="black"/>
              <path d="M 40,96 L 112,96" fill="none" stroke="black"/>
              <path d="M 184,96 L 288,96" fill="none" stroke="black"/>
              <path d="M 8,144 L 80,144" fill="none" stroke="black"/>
              <path d="M 96,144 L 112,144" fill="none" stroke="black"/>
              <path d="M 8,208 L 112,208" fill="none" stroke="black"/>
              <path d="M 8,256 L 48,256" fill="none" stroke="black"/>
              <path d="M 64,256 L 112,256" fill="none" stroke="black"/>
              <path d="M 8,304 L 112,304" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="192,48 180,42.4 180,53.6 " fill="black" transform="rotate(0,184,48)"/>
              <polygon class="arrowhead" points="120,80 108,74.4 108,85.6 " fill="black" transform="rotate(180,112,80)"/>
              <polygon class="arrowhead" points="96,144 84,138.4 84,149.6 " fill="black" transform="rotate(90,88,144)"/>
              <polygon class="arrowhead" points="64,256 52,250.4 52,261.6 " fill="black" transform="rotate(90,56,256)"/>
              <polygon class="arrowhead" points="40,96 28,90.4 28,101.6 " fill="black" transform="rotate(270,32,96)"/>
              <g class="text">
                <text x="148" y="36">2:CR</text>
                <text x="236" y="52">Credential</text>
                <text x="60" y="68">Verifier</text>
                <text x="144" y="68">3:C</text>
                <text x="232" y="68">Authority</text>
                <text x="16" y="132">1:E</text>
                <text x="108" y="132">4:AR</text>
                <text x="156" y="132">(incl.</text>
                <text x="196" y="132">C)</text>
                <text x="60" y="180">Workload</text>
                <text x="72" y="244">5:C</text>
                <text x="56" y="276">Relying</text>
                <text x="56" y="292">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+------------+  2:CR  +------------+
|            +--------> Credential |
|  Verifier  |  3:C   | Authority  |
|            <--------+            |
+--^------+--+        +------------+
   |      |                         
1:E|      |4:AR (incl. C)                        
+--+------v--+                      
|            |                      
|  Workload  |                      
|            |                      
+-----+------+                      
      |                             
      |5:C                             
+-----v------+                      
|  Relying   |                      
|   Party    |                      
+------------+                      
]]></artwork>
        </artset>
      </section>
      <section anchor="variant-3">
        <name>Variant 3</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="328" viewBox="0 0 328 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,128 L 8,192" fill="none" stroke="black"/>
              <path d="M 8,240 L 8,288" fill="none" stroke="black"/>
              <path d="M 56,192 L 56,240" fill="none" stroke="black"/>
              <path d="M 104,128 L 104,160" fill="none" stroke="black"/>
              <path d="M 104,240 L 104,288" fill="none" stroke="black"/>
              <path d="M 184,32 L 184,80" fill="none" stroke="black"/>
              <path d="M 184,160 L 184,192" fill="none" stroke="black"/>
              <path d="M 208,80 L 208,128" fill="none" stroke="black"/>
              <path d="M 256,80 L 256,128" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,80" fill="none" stroke="black"/>
              <path d="M 288,128 L 288,192" fill="none" stroke="black"/>
              <path d="M 184,32 L 288,32" fill="none" stroke="black"/>
              <path d="M 184,80 L 200,80" fill="none" stroke="black"/>
              <path d="M 216,80 L 288,80" fill="none" stroke="black"/>
              <path d="M 8,128 L 104,128" fill="none" stroke="black"/>
              <path d="M 184,128 L 248,128" fill="none" stroke="black"/>
              <path d="M 264,128 L 288,128" fill="none" stroke="black"/>
              <path d="M 104,144 L 184,144" fill="none" stroke="black"/>
              <path d="M 104,176 L 184,176" fill="none" stroke="black"/>
              <path d="M 8,192 L 104,192" fill="none" stroke="black"/>
              <path d="M 184,192 L 288,192" fill="none" stroke="black"/>
              <path d="M 8,240 L 48,240" fill="none" stroke="black"/>
              <path d="M 64,240 L 104,240" fill="none" stroke="black"/>
              <path d="M 8,288 L 104,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="264,128 252,122.4 252,133.6 " fill="black" transform="rotate(90,256,128)"/>
              <polygon class="arrowhead" points="216,80 204,74.4 204,85.6 " fill="black" transform="rotate(270,208,80)"/>
              <polygon class="arrowhead" points="192,144 180,138.4 180,149.6 " fill="black" transform="rotate(0,184,144)"/>
              <polygon class="arrowhead" points="112,176 100,170.4 100,181.6 " fill="black" transform="rotate(180,104,176)"/>
              <polygon class="arrowhead" points="64,240 52,234.4 52,245.6 " fill="black" transform="rotate(90,56,240)"/>
              <g class="text">
                <text x="236" y="52">Verifier</text>
                <text x="192" y="116">2:E</text>
                <text x="276" y="116">3:AR</text>
                <text x="148" y="132">1:CR</text>
                <text x="236" y="148">Credential</text>
                <text x="52" y="164">Workload</text>
                <text x="144" y="164">4:C</text>
                <text x="232" y="164">Authority</text>
                <text x="72" y="228">5:C</text>
                <text x="56" y="260">Relying</text>
                <text x="56" y="276">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                      +------------+
                      |  Verifier  |
                      |            |
                      +--^-----+---+
                         |     |    
                      2:E|     |3:AR    
+-----------+   1:CR  +--+-----v---+
|           +---------> Credential |
| Workload  |   4:C   | Authority  |
|           <---------+            |
+-----+-----+         +------------+
      |                             
      |5:C                             
+-----v-----+                       
|  Relying  |                       
|   Party   |                       
+-----------+                       
]]></artwork>
        </artset>
        <t>From the Workload's perspective, Variant 1 carries with it an extra network roundtrip (the first roundtrip being the workload exchanging "Evidence" for "Attestation Results"). It is the only option available to the Workload for using existing Verifier implementations that make no changes associated with this proposal. This option does however introduce additional latency and reliability costs inherent in an extra roundtrip.</t>
        <t>Variants 2 and 3 do not require the Workload to perform an extra roundtrip, and thus do not carry the additional performance costs or reliability risks.</t>
        <t>Several distinct options are possible. In all cases, the Credential is generated and signed by a Credential Authority. The difference is in how the Workload obtains these Credentials. The main pivots are:</t>
        <ol spacing="normal" type="1">
          <li>
            <t>Where the Credential Key is generated (Key Source):
            </t>
            <ol spacing="normal" type="1">
              <li>Inside the Workload Instance</li>
              <li>Inside a secure Key Store such as a Hardware Security Module (HSM), by the Workload Owner</li>
            </ol>
          </li>
          <li>
            <t>Where the Workload gets its Credential from (Credential Source):
            </t>
            <ol spacing="normal" type="1">
              <li>The Verifier</li>
              <li>The Credential Authority (e.g., a Certificate Authority, a Security Token Service, or similar)</li>
              <li>The Workload Owner (via the Control Plane)</li>
            </ol>
          </li>
        </ol>
        <t>Note that it is safe to receive the Credential from an untrusted source such as the Control Plane, because it is public. The only requirement is that the obtained Credential matches the Credential Key, which <bcp14>MUST</bcp14> always be obtained securely and only by an authorized Workload instance.</t>
        <t>Further, under pivot 2.i, the order of interactions involved in Credential generation might differ:</t>
        <ol spacing="normal" type="1">
          <li>A Workload invokes the Verifier which collaborates with the Credential Authority to compute and return Credentials, returning these Credentials inside the Attestation Results, or</li>
          <li>A Workload invokes the Verifier, obtains from it the Attestation Results, and forwards these Attestation Results to the Credential Authority inside a Credential Request to get the Credential.</li>
        </ol>
      </section>
    </section>
    <section anchor="claims-mapper">
      <name>Claims Mapper</name>
      <t>In order to convert Evidence that the Workload collects about itself into business-centric Claims about the Workload, a new architectural building block is required: a Claims Mapper. The inputs to the Claims Mapper depend on the Credential Issuance Mechanism, several of which are discussed in the following sections. In some cases, the business-centric output claims are generated from the Evidence submitted to the Verifier by the Workload, and in other cases - from the Attestation Results computed by the Verifier upon examining the Evidence. In all cases, the decisions on 1) whether to accept the inputs as valid and 2) which claims to emit based on these inputs are going to be made by the Claims Mapper Policy, which is governed by the Workload Owner.</t>
      <t>Whenever a new version of the Workload is rolled out, the corresponding updated Claims Mapper Policy must be put in place.</t>
    </section>
    <section anchor="credential-acquisition-mechanisms">
      <name>Credential Acquisition Mechanisms</name>
      <t>This set of variants results in several distinct Credential Acquisition Mechanisms (CAMs), some of which are listed in the table below:</t>
      <table>
        <thead>
          <tr>
            <th align="center">CAM</th>
            <th align="left">Key Source</th>
            <th align="left">Credential Source</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">A</td>
            <td align="left">Workload</td>
            <td align="left">Verifier</td>
            <td align="left">A Proof-of-Possession of the Credential Key is included in the Evidence submitted by the Workload Instance to the Verifier. The Verifier first appraises the Evidence. It then invokes the Claims Mapper to map this Evidence to Claims about the Workload. Finally, it contacts the Credential Authority to compute a Credential based on this Credential Key, and returns it to the Workload Instance as part of Attestation Results.</td>
          </tr>
          <tr>
            <td align="center">B</td>
            <td align="left">Workload</td>
            <td align="left">Credential Authority</td>
            <td align="left">A Proof-of-Possession of the Credential Key is included in the Evidence submitted by the Workload Instance to the Verifier, and also in the Attestation Results returned by the Verifier. The Workload Instance sends the Attestation Results obtained from the Verifier to the Credential Authority. Credential Authority invokes the Claims Mapper to map the Attestation Results to Claims about the Workload Instance. It then computes and returns to the Workload Instance a Credential based on these Claims.</td>
          </tr>
          <tr>
            <td align="center">C</td>
            <td align="left">Workload</td>
            <td align="left">Credential Authority</td>
            <td align="left">A Proof-of-Possession of the Credential Key is included in a Credential Request submitted by the Workload to the Credential Authority alongside Evidence destined for the Verifier. Credential Authority handles the Credential Request by contacting the Verifier on the Workload's behalf, supplying the Evidence from the Credential Request. The Verifier responds with Attestation Results. The Credential Authority invokes the Claims Mapper to convert the Attestation Results to Claims about the Workload. It then computes and returns to the Workload Instance a Credential based on these Claims.</td>
          </tr>
          <tr>
            <td align="center">D</td>
            <td align="left">Key Store</td>
            <td align="left">Workload Owner</td>
            <td align="left">The Workload Owner uses the Claims Mapper to create the Claims about the Workload and the associated Key Release Policy, specifying the expected Attestation Results needed to obtain the Credential Key. The Workload Owner then interacts with the Key Store to generate the Credential Key, the Credential and set the Key Release Policy. It then makes the Credential available to the Workload. The Workload obtains the Credential Key from the Key Store after completing Remote Attestation.</td>
          </tr>
        </tbody>
      </table>
      <t>These options are illustrated below with sequence diagrams.</t>
      <section anchor="mechanism-a">
        <name>Mechanism A</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="688" width="600" viewBox="0 0 600 688" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,624 L 8,656" fill="none" stroke="black"/>
              <path d="M 64,64 L 64,96" fill="none" stroke="black"/>
              <path d="M 64,128 L 64,432" fill="none" stroke="black"/>
              <path d="M 64,512 L 64,528" fill="none" stroke="black"/>
              <path d="M 64,592 L 64,624" fill="none" stroke="black"/>
              <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
              <path d="M 128,624 L 128,656" fill="none" stroke="black"/>
              <path d="M 160,160 L 160,176" fill="none" stroke="black"/>
              <path d="M 168,224 L 168,240" fill="none" stroke="black"/>
              <path d="M 168,288 L 168,304" fill="none" stroke="black"/>
              <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
              <path d="M 200,624 L 200,656" fill="none" stroke="black"/>
              <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
              <path d="M 264,128 L 264,624" fill="none" stroke="black"/>
              <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
              <path d="M 320,624 L 320,656" fill="none" stroke="black"/>
              <path d="M 360,368 L 360,384" fill="none" stroke="black"/>
              <path d="M 360,416 L 360,432" fill="none" stroke="black"/>
              <path d="M 384,512 L 384,528" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
              <path d="M 392,624 L 392,656" fill="none" stroke="black"/>
              <path d="M 496,64 L 496,96" fill="none" stroke="black"/>
              <path d="M 496,128 L 496,400" fill="none" stroke="black"/>
              <path d="M 496,432 L 496,624" fill="none" stroke="black"/>
              <path d="M 592,32 L 592,64" fill="none" stroke="black"/>
              <path d="M 592,96 L 592,128" fill="none" stroke="black"/>
              <path d="M 592,624 L 592,656" fill="none" stroke="black"/>
              <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
              <path d="M 200,32 L 320,32" fill="none" stroke="black"/>
              <path d="M 392,32 L 592,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 128,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 320,64" fill="none" stroke="black"/>
              <path d="M 392,64 L 592,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 592,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 592,128" fill="none" stroke="black"/>
              <path d="M 64,160 L 160,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 160,176" fill="none" stroke="black"/>
              <path d="M 64,224 L 168,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 168,240" fill="none" stroke="black"/>
              <path d="M 64,288 L 168,288" fill="none" stroke="black"/>
              <path d="M 72,304 L 168,304" fill="none" stroke="black"/>
              <path d="M 64,336 L 256,336" fill="none" stroke="black"/>
              <path d="M 264,368 L 360,368" fill="none" stroke="black"/>
              <path d="M 272,384 L 360,384" fill="none" stroke="black"/>
              <path d="M 264,416 L 360,416" fill="none" stroke="black"/>
              <path d="M 272,432 L 360,432" fill="none" stroke="black"/>
              <path d="M 264,480 L 488,480" fill="none" stroke="black"/>
              <path d="M 384,512 L 496,512" fill="none" stroke="black"/>
              <path d="M 384,528 L 488,528" fill="none" stroke="black"/>
              <path d="M 272,576 L 496,576" fill="none" stroke="black"/>
              <path d="M 72,608 L 264,608" fill="none" stroke="black"/>
              <path d="M 8,624 L 128,624" fill="none" stroke="black"/>
              <path d="M 200,624 L 320,624" fill="none" stroke="black"/>
              <path d="M 392,624 L 592,624" fill="none" stroke="black"/>
              <path d="M 8,656 L 128,656" fill="none" stroke="black"/>
              <path d="M 200,656 L 320,656" fill="none" stroke="black"/>
              <path d="M 392,656 L 592,656" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="496,528 484,522.4 484,533.6 " fill="black" transform="rotate(0,488,528)"/>
              <polygon class="arrowhead" points="496,480 484,474.4 484,485.6 " fill="black" transform="rotate(0,488,480)"/>
              <polygon class="arrowhead" points="280,576 268,570.4 268,581.6 " fill="black" transform="rotate(180,272,576)"/>
              <polygon class="arrowhead" points="280,432 268,426.4 268,437.6 " fill="black" transform="rotate(180,272,432)"/>
              <polygon class="arrowhead" points="280,384 268,378.4 268,389.6 " fill="black" transform="rotate(180,272,384)"/>
              <polygon class="arrowhead" points="264,336 252,330.4 252,341.6 " fill="black" transform="rotate(0,256,336)"/>
              <polygon class="arrowhead" points="80,608 68,602.4 68,613.6 " fill="black" transform="rotate(180,72,608)"/>
              <polygon class="arrowhead" points="80,304 68,298.4 68,309.6 " fill="black" transform="rotate(180,72,304)"/>
              <polygon class="arrowhead" points="80,240 68,234.4 68,245.6 " fill="black" transform="rotate(180,72,240)"/>
              <polygon class="arrowhead" points="80,176 68,170.4 68,181.6 " fill="black" transform="rotate(180,72,176)"/>
              <g class="text">
                <text x="68" y="52">Workload</text>
                <text x="260" y="52">Verifier</text>
                <text x="452" y="52">Credential</text>
                <text x="536" y="52">Authority</text>
                <text x="212" y="116">Credential</text>
                <text x="304" y="116">Acquisition</text>
                <text x="376" y="116">Phase</text>
                <text x="108" y="148">Generate</text>
                <text x="188" y="148">Credential</text>
                <text x="192" y="164">Key</text>
                <text x="100" y="196">Create</text>
                <text x="172" y="196">Credential</text>
                <text x="232" y="196">Req</text>
                <text x="92" y="212">(incl.</text>
                <text x="164" y="212">Credential</text>
                <text x="224" y="212">Key</text>
                <text x="212" y="228">Pop)</text>
                <text x="100" y="260">Create</text>
                <text x="164" y="260">Evidence</text>
                <text x="100" y="276">(incl.</text>
                <text x="172" y="276">Credential</text>
                <text x="236" y="276">Req)</text>
                <text x="104" y="324">Request</text>
                <text x="184" y="324">Attestation</text>
                <text x="124" y="356">(Evidence)</text>
                <text x="308" y="356">Appraise</text>
                <text x="380" y="356">Evidence</text>
                <text x="300" y="404">Invoke</text>
                <text x="356" y="404">Claims</text>
                <text x="412" y="404">Mapper</text>
                <text x="380" y="420">to</text>
                <text x="424" y="420">compute</text>
                <text x="484" y="420">Claims</text>
                <text x="64" y="452">&amp;#9474;</text>
                <text x="304" y="452">Request</text>
                <text x="380" y="452">Credential</text>
                <text x="64" y="468">&amp;#9474;</text>
                <text x="320" y="468">(Credential</text>
                <text x="388" y="468">Req+</text>
                <text x="440" y="468">Claims)</text>
                <text x="64" y="484">&amp;#9474;</text>
                <text x="64" y="500">&amp;#9474;</text>
                <text x="316" y="500">Create</text>
                <text x="352" y="500">&amp;</text>
                <text x="380" y="500">Sign</text>
                <text x="444" y="500">Credential</text>
                <text x="64" y="548">&amp;#9474;</text>
                <text x="64" y="564">&amp;#9474;</text>
                <text x="308" y="564">Return</text>
                <text x="380" y="564">Credential</text>
                <text x="64" y="580">&amp;#9474;</text>
                <text x="140" y="580">Return</text>
                <text x="212" y="580">Credential</text>
                <text x="84" y="596">in</text>
                <text x="144" y="596">Attestation</text>
                <text x="224" y="596">Results</text>
                <text x="68" y="644">Workload</text>
                <text x="260" y="644">Verifier</text>
                <text x="452" y="644">Credential</text>
                <text x="536" y="644">Authority</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
    +--------------+        +--------------+        +------------------------+
    |   Workload   |        |   Verifier   |        |  Credential Authority  |
    +------+-------+        +-------+------+        +------------+-----------+
           |                        |                            |
    .------+------------------------+----------------------------+-----------.
    |                    Credential Acquisition Phase                        |
    +------+------------------------+----------------------------+-----------+
           | Generate Credential    |                            |
           +-----------+  Key       |                            |
           +<----------+            |                            |
           | Create Credential Req  |                            |
           |(incl. Credential Key   |                            |
           +------------+   Pop)    |                            |
           +<-----------+           |                            |
           | Create Evidence        |                            |
           | (incl. Credential Req) |                            |
           +------------+           |                            |
           +<-----------+           |                            |
           | Request Attestation    |                            |
           +----------------------->|                            |
           |  (Evidence)            | Appraise Evidence          |
           |                        +-----------+                |
           |                        |<----------+                |
           |                        | Invoke Claims Mapper       |
           |                        +-----------+ to compute Claims
           |                        +<----------+                |
           │                        | Request Credential         |
           │                        | (Credential Req+ Claims)   |
           │                        +--------------------------->+
           │                        |   Create & Sign Credential |
           |                        |              +-------------+ 
           |                        |              +------------>+
           │                        |                            |
           │                        |  Return Credential         |
           │      Return Credential +<---------------------------+
           | in Attestation Results |                            |
           +<-----------------------+                            |  
    +------+-------+        +-------+------+        +------------+-----------+
    |   Workload   |        |   Verifier   |        |  Credential Authority  |
    +--------------+        +--------------+        +------------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="mechanism-b">
        <name>Mechanism B</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="640" viewBox="0 0 640 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,704 L 8,736" fill="none" stroke="black"/>
              <path d="M 64,64 L 64,96" fill="none" stroke="black"/>
              <path d="M 64,160 L 64,176" fill="none" stroke="black"/>
              <path d="M 64,208 L 64,240" fill="none" stroke="black"/>
              <path d="M 64,304 L 64,320" fill="none" stroke="black"/>
              <path d="M 64,352 L 64,400" fill="none" stroke="black"/>
              <path d="M 64,464 L 64,496" fill="none" stroke="black"/>
              <path d="M 64,528 L 64,544" fill="none" stroke="black"/>
              <path d="M 64,592 L 64,608" fill="none" stroke="black"/>
              <path d="M 64,640 L 64,672" fill="none" stroke="black"/>
              <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
              <path d="M 128,704 L 128,736" fill="none" stroke="black"/>
              <path d="M 168,160 L 168,176" fill="none" stroke="black"/>
              <path d="M 168,224 L 168,240" fill="none" stroke="black"/>
              <path d="M 168,480 L 168,496" fill="none" stroke="black"/>
              <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
              <path d="M 200,704 L 200,736" fill="none" stroke="black"/>
              <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 264,272" fill="none" stroke="black"/>
              <path d="M 264,304 L 264,704" fill="none" stroke="black"/>
              <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
              <path d="M 320,704 L 320,736" fill="none" stroke="black"/>
              <path d="M 368,304 L 368,320" fill="none" stroke="black"/>
              <path d="M 368,368 L 368,384" fill="none" stroke="black"/>
              <path d="M 384,592 L 384,608" fill="none" stroke="black"/>
              <path d="M 384,640 L 384,656" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
              <path d="M 392,704 L 392,736" fill="none" stroke="black"/>
              <path d="M 496,64 L 496,96" fill="none" stroke="black"/>
              <path d="M 496,128 L 496,704" fill="none" stroke="black"/>
              <path d="M 592,32 L 592,64" fill="none" stroke="black"/>
              <path d="M 592,96 L 592,128" fill="none" stroke="black"/>
              <path d="M 592,704 L 592,736" fill="none" stroke="black"/>
              <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
              <path d="M 200,32 L 320,32" fill="none" stroke="black"/>
              <path d="M 392,32 L 592,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 128,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 320,64" fill="none" stroke="black"/>
              <path d="M 392,64 L 592,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 592,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 592,128" fill="none" stroke="black"/>
              <path d="M 64,160 L 168,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 64,224 L 168,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 168,240" fill="none" stroke="black"/>
              <path d="M 64,272 L 256,272" fill="none" stroke="black"/>
              <path d="M 264,304 L 368,304" fill="none" stroke="black"/>
              <path d="M 272,320 L 368,320" fill="none" stroke="black"/>
              <path d="M 264,368 L 368,368" fill="none" stroke="black"/>
              <path d="M 272,384 L 368,384" fill="none" stroke="black"/>
              <path d="M 72,432 L 264,432" fill="none" stroke="black"/>
              <path d="M 64,480 L 168,480" fill="none" stroke="black"/>
              <path d="M 72,496 L 168,496" fill="none" stroke="black"/>
              <path d="M 64,528 L 488,528" fill="none" stroke="black"/>
              <path d="M 384,592 L 496,592" fill="none" stroke="black"/>
              <path d="M 384,608 L 488,608" fill="none" stroke="black"/>
              <path d="M 384,640 L 496,640" fill="none" stroke="black"/>
              <path d="M 384,656 L 488,656" fill="none" stroke="black"/>
              <path d="M 72,688 L 496,688" fill="none" stroke="black"/>
              <path d="M 8,704 L 128,704" fill="none" stroke="black"/>
              <path d="M 200,704 L 320,704" fill="none" stroke="black"/>
              <path d="M 392,704 L 592,704" fill="none" stroke="black"/>
              <path d="M 8,736 L 128,736" fill="none" stroke="black"/>
              <path d="M 200,736 L 320,736" fill="none" stroke="black"/>
              <path d="M 392,736 L 592,736" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="496,656 484,650.4 484,661.6 " fill="black" transform="rotate(0,488,656)"/>
              <polygon class="arrowhead" points="496,608 484,602.4 484,613.6 " fill="black" transform="rotate(0,488,608)"/>
              <polygon class="arrowhead" points="496,528 484,522.4 484,533.6 " fill="black" transform="rotate(0,488,528)"/>
              <polygon class="arrowhead" points="280,384 268,378.4 268,389.6 " fill="black" transform="rotate(180,272,384)"/>
              <polygon class="arrowhead" points="280,320 268,314.4 268,325.6 " fill="black" transform="rotate(180,272,320)"/>
              <polygon class="arrowhead" points="264,272 252,266.4 252,277.6 " fill="black" transform="rotate(0,256,272)"/>
              <polygon class="arrowhead" points="80,688 68,682.4 68,693.6 " fill="black" transform="rotate(180,72,688)"/>
              <polygon class="arrowhead" points="80,496 68,490.4 68,501.6 " fill="black" transform="rotate(180,72,496)"/>
              <polygon class="arrowhead" points="80,432 68,426.4 68,437.6 " fill="black" transform="rotate(180,72,432)"/>
              <polygon class="arrowhead" points="80,240 68,234.4 68,245.6 " fill="black" transform="rotate(180,72,240)"/>
              <polygon class="arrowhead" points="80,176 68,170.4 68,181.6 " fill="black" transform="rotate(180,72,176)"/>
              <g class="text">
                <text x="68" y="52">Workload</text>
                <text x="260" y="52">Verifier</text>
                <text x="452" y="52">Credential</text>
                <text x="536" y="52">Authority</text>
                <text x="212" y="116">Credential</text>
                <text x="304" y="116">Acquisition</text>
                <text x="376" y="116">Phase</text>
                <text x="64" y="148">&amp;#9474;</text>
                <text x="108" y="148">Generate</text>
                <text x="188" y="148">Credential</text>
                <text x="248" y="148">Key</text>
                <text x="64" y="196">&amp;#9474;</text>
                <text x="100" y="196">Create</text>
                <text x="164" y="196">Evidence</text>
                <text x="100" y="212">(incl.</text>
                <text x="172" y="212">Credential</text>
                <text x="232" y="212">Key</text>
                <text x="204" y="228">PoP)</text>
                <text x="64" y="260">&amp;#9474;</text>
                <text x="104" y="260">Request</text>
                <text x="184" y="260">Attestation</text>
                <text x="64" y="292">&amp;#9474;</text>
                <text x="116" y="292">(Evidence)</text>
                <text x="300" y="292">Appraise</text>
                <text x="372" y="292">Evidence</text>
                <text x="64" y="340">&amp;#9474;</text>
                <text x="304" y="340">Compute</text>
                <text x="384" y="340">Attestation</text>
                <text x="304" y="356">Results</text>
                <text x="228" y="404">Return</text>
                <text x="64" y="420">&amp;#9474;</text>
                <text x="144" y="420">Attestation</text>
                <text x="224" y="420">Results</text>
                <text x="64" y="436">+</text>
                <text x="64" y="452">&amp;#9474;</text>
                <text x="100" y="452">Create</text>
                <text x="172" y="452">Credential</text>
                <text x="236" y="452">Req.</text>
                <text x="100" y="468">(incl.</text>
                <text x="172" y="468">Credential</text>
                <text x="232" y="468">Key</text>
                <text x="192" y="484">Pop</text>
                <text x="216" y="484">&amp;</text>
                <text x="240" y="484">AR)</text>
                <text x="64" y="516">&amp;#9474;</text>
                <text x="104" y="516">Request</text>
                <text x="180" y="516">Credential</text>
                <text x="244" y="516">(Cre</text>
                <text x="296" y="516">dential</text>
                <text x="364" y="516">Request)</text>
                <text x="632" y="516">|</text>
                <text x="324" y="548">Invoke</text>
                <text x="380" y="548">Claims</text>
                <text x="436" y="548">Mapper</text>
                <text x="476" y="548">to</text>
                <text x="64" y="564">&amp;#9474;</text>
                <text x="296" y="564">convert</text>
                <text x="376" y="564">Attestation</text>
                <text x="456" y="564">Results</text>
                <text x="64" y="580">&amp;#9474;</text>
                <text x="300" y="580">to</text>
                <text x="356" y="580">Credential</text>
                <text x="444" y="580">Attributes</text>
                <text x="64" y="628">&amp;#9474;</text>
                <text x="316" y="628">Create</text>
                <text x="352" y="628">&amp;</text>
                <text x="380" y="628">Sign</text>
                <text x="444" y="628">Credential</text>
                <text x="372" y="676">Return</text>
                <text x="444" y="676">Credential</text>
                <text x="64" y="692">&amp;#9474;</text>
                <text x="68" y="724">Workload</text>
                <text x="260" y="724">Verifier</text>
                <text x="452" y="724">Credential</text>
                <text x="536" y="724">Authority</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
    +--------------+        +--------------+        +------------------------+
    |   Workload   |        |   Verifier   |        |  Credential Authority  |
    +------+-------+        +-------+------+        +------------+-----------+
           |                        |                            |
    .------+------------------------+----------------------------+-----------.
    |                    Credential Acquisition Phase                        |
    +------+------------------------+----------------------------+-----------+
           │ Generate Credential Key                             |
           +------------+           |                            |
           +<-----------+           |                            |
           │ Create Evidence        |                            |
           | (incl. Credential Key  |                            |
           +------------+  PoP)     |                            |
           +<-----------+           |                            |
           │ Request Attestation    |                            |
           +----------------------->+                            |
           │ (Evidence)              Appraise Evidence           |
           |                        +------------+               |
           |                        +<-----------+               |
           │                        | Compute Attestation        |
           |                        | Results                    |
           |                        +------------+               |
           |                        +<-----------+               |
           |                 Return |                            |
           │    Attestation Results |                            |
           +<-----------------------+                            |
           │ Create Credential Req. |                            |
           | (incl. Credential Key  |                            |
           +------------+ Pop & AR) |                            |
           +<-----------+           |                            |
           │ Request Credential (Cre|dential Request)            |                |
           +------------------------+--------------------------->+
           |                        |    Invoke Claims Mapper to |
           │                        |convert Attestation Results |
           │                        |   to Credential Attributes |
           |                        |              +-------------+
           |                        |              +------------>|
           │                        |   Create & Sign Credential |
           |                        |              +-------------+
           |                        |              +------------>|
           |                        |          Return Credential |
           │<-----------------------+----------------------------+
    +------+-------+        +-------+------+        +------------+-----------+
    |   Workload   |        |   Verifier   |        |  Credential Authority  |
    +------+-------+        +--------------+        +------------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="mechanism-c">
        <name>Mechanism C</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="640" viewBox="0 0 640 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,704 L 8,736" fill="none" stroke="black"/>
              <path d="M 64,64 L 64,96" fill="none" stroke="black"/>
              <path d="M 64,160 L 64,176" fill="none" stroke="black"/>
              <path d="M 64,208 L 64,240" fill="none" stroke="black"/>
              <path d="M 64,272 L 64,320" fill="none" stroke="black"/>
              <path d="M 64,384 L 64,400" fill="none" stroke="black"/>
              <path d="M 64,448 L 64,464" fill="none" stroke="black"/>
              <path d="M 64,496 L 64,512" fill="none" stroke="black"/>
              <path d="M 64,560 L 64,608" fill="none" stroke="black"/>
              <path d="M 64,640 L 64,656" fill="none" stroke="black"/>
              <path d="M 64,688 L 64,704" fill="none" stroke="black"/>
              <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
              <path d="M 128,704 L 128,736" fill="none" stroke="black"/>
              <path d="M 168,160 L 168,176" fill="none" stroke="black"/>
              <path d="M 168,224 L 168,240" fill="none" stroke="black"/>
              <path d="M 168,272 L 168,304" fill="none" stroke="black"/>
              <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
              <path d="M 200,704 L 200,736" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 304,704" fill="none" stroke="black"/>
              <path d="M 400,32 L 400,64" fill="none" stroke="black"/>
              <path d="M 400,704 L 400,736" fill="none" stroke="black"/>
              <path d="M 408,592 L 408,608" fill="none" stroke="black"/>
              <path d="M 408,640 L 408,656" fill="none" stroke="black"/>
              <path d="M 424,448 L 424,464" fill="none" stroke="black"/>
              <path d="M 424,496 L 424,512" fill="none" stroke="black"/>
              <path d="M 472,32 L 472,64" fill="none" stroke="black"/>
              <path d="M 472,704 L 472,736" fill="none" stroke="black"/>
              <path d="M 536,64 L 536,96" fill="none" stroke="black"/>
              <path d="M 536,128 L 536,336" fill="none" stroke="black"/>
              <path d="M 536,368 L 536,704" fill="none" stroke="black"/>
              <path d="M 592,32 L 592,64" fill="none" stroke="black"/>
              <path d="M 592,96 L 592,128" fill="none" stroke="black"/>
              <path d="M 592,704 L 592,736" fill="none" stroke="black"/>
              <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
              <path d="M 200,32 L 400,32" fill="none" stroke="black"/>
              <path d="M 472,32 L 592,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 128,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 400,64" fill="none" stroke="black"/>
              <path d="M 472,64 L 592,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 592,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 592,128" fill="none" stroke="black"/>
              <path d="M 64,160 L 168,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 64,224 L 168,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 168,240" fill="none" stroke="black"/>
              <path d="M 64,272 L 176,272" fill="none" stroke="black"/>
              <path d="M 72,304 L 168,304" fill="none" stroke="black"/>
              <path d="M 64,352 L 296,352" fill="none" stroke="black"/>
              <path d="M 304,416 L 528,416" fill="none" stroke="black"/>
              <path d="M 424,448 L 536,448" fill="none" stroke="black"/>
              <path d="M 424,464 L 528,464" fill="none" stroke="black"/>
              <path d="M 424,496 L 536,496" fill="none" stroke="black"/>
              <path d="M 424,512 L 528,512" fill="none" stroke="black"/>
              <path d="M 312,544 L 536,544" fill="none" stroke="black"/>
              <path d="M 304,592 L 408,592" fill="none" stroke="black"/>
              <path d="M 312,608 L 408,608" fill="none" stroke="black"/>
              <path d="M 304,640 L 408,640" fill="none" stroke="black"/>
              <path d="M 312,656 L 408,656" fill="none" stroke="black"/>
              <path d="M 72,688 L 304,688" fill="none" stroke="black"/>
              <path d="M 8,704 L 128,704" fill="none" stroke="black"/>
              <path d="M 200,704 L 400,704" fill="none" stroke="black"/>
              <path d="M 472,704 L 592,704" fill="none" stroke="black"/>
              <path d="M 8,736 L 128,736" fill="none" stroke="black"/>
              <path d="M 200,736 L 400,736" fill="none" stroke="black"/>
              <path d="M 472,736 L 592,736" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="536,512 524,506.4 524,517.6 " fill="black" transform="rotate(0,528,512)"/>
              <polygon class="arrowhead" points="536,464 524,458.4 524,469.6 " fill="black" transform="rotate(0,528,464)"/>
              <polygon class="arrowhead" points="536,416 524,410.4 524,421.6 " fill="black" transform="rotate(0,528,416)"/>
              <polygon class="arrowhead" points="320,656 308,650.4 308,661.6 " fill="black" transform="rotate(180,312,656)"/>
              <polygon class="arrowhead" points="320,608 308,602.4 308,613.6 " fill="black" transform="rotate(180,312,608)"/>
              <polygon class="arrowhead" points="320,544 308,538.4 308,549.6 " fill="black" transform="rotate(180,312,544)"/>
              <polygon class="arrowhead" points="304,352 292,346.4 292,357.6 " fill="black" transform="rotate(0,296,352)"/>
              <polygon class="arrowhead" points="80,688 68,682.4 68,693.6 " fill="black" transform="rotate(180,72,688)"/>
              <polygon class="arrowhead" points="80,304 68,298.4 68,309.6 " fill="black" transform="rotate(180,72,304)"/>
              <polygon class="arrowhead" points="80,240 68,234.4 68,245.6 " fill="black" transform="rotate(180,72,240)"/>
              <polygon class="arrowhead" points="80,176 68,170.4 68,181.6 " fill="black" transform="rotate(180,72,176)"/>
              <g class="text">
                <text x="68" y="52">Workload</text>
                <text x="268" y="52">Credential</text>
                <text x="352" y="52">Authority</text>
                <text x="532" y="52">Verifier</text>
                <text x="212" y="116">Credential</text>
                <text x="304" y="116">Acquisition</text>
                <text x="376" y="116">Phase</text>
                <text x="64" y="148">&amp;#9474;</text>
                <text x="108" y="148">Generate</text>
                <text x="188" y="148">Credential</text>
                <text x="248" y="148">Key</text>
                <text x="64" y="196">&amp;#9474;</text>
                <text x="100" y="196">Create</text>
                <text x="164" y="196">Evidence</text>
                <text x="100" y="212">(incl.</text>
                <text x="172" y="212">Credential</text>
                <text x="232" y="212">Key</text>
                <text x="204" y="228">PoP)</text>
                <text x="64" y="260">&amp;#9474;</text>
                <text x="100" y="260">Create</text>
                <text x="172" y="260">Credential</text>
                <text x="248" y="260">Request</text>
                <text x="216" y="276">Evidence,</text>
                <text x="212" y="292">Credential</text>
                <text x="184" y="308">Key</text>
                <text x="220" y="308">PoP)</text>
                <text x="64" y="340">&amp;#9474;</text>
                <text x="104" y="340">Request</text>
                <text x="180" y="340">Credential</text>
                <text x="536" y="356">&amp;#9474;</text>
                <text x="64" y="372">&amp;#9474;</text>
                <text x="120" y="372">(Credential</text>
                <text x="204" y="372">Request)</text>
                <text x="344" y="372">Request</text>
                <text x="424" y="372">Attestation</text>
                <text x="352" y="388">(Evidence</text>
                <text x="412" y="388">from</text>
                <text x="364" y="404">Credential</text>
                <text x="444" y="404">Request)</text>
                <text x="64" y="420">&amp;#9474;</text>
                <text x="64" y="436">&amp;#9474;</text>
                <text x="420" y="436">Appraise</text>
                <text x="492" y="436">Evidence</text>
                <text x="64" y="484">&amp;#9474;</text>
                <text x="344" y="484">Compute</text>
                <text x="424" y="484">Attestation</text>
                <text x="504" y="484">Results</text>
                <text x="64" y="532">&amp;#9474;</text>
                <text x="340" y="532">Return</text>
                <text x="416" y="532">Attestation</text>
                <text x="496" y="532">Results</text>
                <text x="64" y="548">&amp;#9474;</text>
                <text x="340" y="564">Invoke</text>
                <text x="396" y="564">Claims</text>
                <text x="452" y="564">Mapper</text>
                <text x="492" y="564">to</text>
                <text x="344" y="580">compute</text>
                <text x="404" y="580">Claims</text>
                <text x="452" y="580">from</text>
                <text x="484" y="580">AR</text>
                <text x="64" y="628">&amp;#9474;</text>
                <text x="340" y="628">Create</text>
                <text x="376" y="628">&amp;</text>
                <text x="404" y="628">Sign</text>
                <text x="468" y="628">Credential</text>
                <text x="64" y="676">&amp;#9474;</text>
                <text x="180" y="676">Return</text>
                <text x="252" y="676">Credential</text>
                <text x="68" y="724">Workload</text>
                <text x="268" y="724">Credential</text>
                <text x="352" y="724">Authority</text>
                <text x="532" y="724">Verifier</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
    +--------------+        +------------------------+        +--------------+     
    |   Workload   |        |   Credential Authority |        |   Verifier   |
    +------+-------+        +------------+-----------+        +-------+------+
           |                             |                            |
    .------+-----------------------------+----------------------------+------.
    |                    Credential Acquisition Phase                        |
    +------+-----------------------------+----------------------------+------+
           │ Generate Credential Key     |                            |
           +------------+                |                            |
           +<-----------+                |                            |
           │ Create Evidence             |                            |
           | (incl. Credential Key       |                            |
           +------------+  PoP)          |                            |
           +<-----------+                |                            |
           │ Create Credential Request   |                            |
           +------------+(Evidence,      |                            |
           |            |Credential      |                            |
           +<-----------+Key PoP)        |                            |
           |                             |                            |
           │ Request Credential          |                            |
           +---------------------------->+                            │
           │ (Credential Request)        | Request Attestation        |
           |                             | (Evidence from             |
           |                             |  Credential Request)       |
           │                             +--------------------------->+
           │                             |          Appraise Evidence |
           |                             |              +-------------+
           |                             |              +------------>+
           │                             | Compute Attestation Results|
           |                             |              +-------------+
           |                             |              +------------>+
           │                             | Return Attestation Results |
           │                             +<---------------------------+
           |                             | Invoke Claims Mapper to    |
           |                             | compute Claims from AR     |
           |                             +------------+               |
           |                             +<-----------+               |
           │                             | Create & Sign Credential   |
           |                             +------------+               |
           |                             +<-----------+               |
           │           Return Credential |                            |
           +<----------------------------+                            |
    +------+-------+        +------------+-----------+        +-------+------+
    |   Workload   |        |   Credential Authority |        |   Verifier   |
    +------+-------+        +------------+-----------+        +-------+------+
]]></artwork>
        </artset>
      </section>
      <section anchor="mechanisms-d">
        <name>Mechanisms D</name>
        <t>Mechanism D consists of a "Credential Provisioning" phase followed by the "Credential Acquisition" phase.</t>
        <section anchor="credential-provisioning-phase">
          <name>Credential Provisioning Phase</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="784" width="760" viewBox="0 0 760 784" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 8,720 L 8,752" fill="none" stroke="black"/>
                <path d="M 16,96 L 16,128" fill="none" stroke="black"/>
                <path d="M 88,64 L 88,96" fill="none" stroke="black"/>
                <path d="M 88,128 L 88,144" fill="none" stroke="black"/>
                <path d="M 88,176 L 88,208" fill="none" stroke="black"/>
                <path d="M 88,240 L 88,272" fill="none" stroke="black"/>
                <path d="M 88,304 L 88,320" fill="none" stroke="black"/>
                <path d="M 88,352 L 88,384" fill="none" stroke="black"/>
                <path d="M 88,416 L 88,432" fill="none" stroke="black"/>
                <path d="M 88,512 L 88,528" fill="none" stroke="black"/>
                <path d="M 88,624 L 88,640" fill="none" stroke="black"/>
                <path d="M 88,672 L 88,720" fill="none" stroke="black"/>
                <path d="M 160,32 L 160,64" fill="none" stroke="black"/>
                <path d="M 160,720 L 160,752" fill="none" stroke="black"/>
                <path d="M 192,192 L 192,208" fill="none" stroke="black"/>
                <path d="M 192,256 L 192,272" fill="none" stroke="black"/>
                <path d="M 216,32 L 216,64" fill="none" stroke="black"/>
                <path d="M 216,720 L 216,752" fill="none" stroke="black"/>
                <path d="M 272,64 L 272,96" fill="none" stroke="black"/>
                <path d="M 272,192 L 272,208" fill="none" stroke="black"/>
                <path d="M 272,256 L 272,272" fill="none" stroke="black"/>
                <path d="M 272,352 L 272,384" fill="none" stroke="black"/>
                <path d="M 272,464 L 272,528" fill="none" stroke="black"/>
                <path d="M 272,704 L 272,720" fill="none" stroke="black"/>
                <path d="M 328,32 L 328,64" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,64" fill="none" stroke="black"/>
                <path d="M 384,720 L 384,752" fill="none" stroke="black"/>
                <path d="M 440,64 L 440,96" fill="none" stroke="black"/>
                <path d="M 440,128 L 440,160" fill="none" stroke="black"/>
                <path d="M 440,192 L 440,224" fill="none" stroke="black"/>
                <path d="M 440,256 L 440,320" fill="none" stroke="black"/>
                <path d="M 440,352 L 440,432" fill="none" stroke="black"/>
                <path d="M 440,512 L 440,560" fill="none" stroke="black"/>
                <path d="M 440,624 L 440,720" fill="none" stroke="black"/>
                <path d="M 496,32 L 496,64" fill="none" stroke="black"/>
                <path d="M 496,720 L 496,752" fill="none" stroke="black"/>
                <path d="M 536,624 L 536,640" fill="none" stroke="black"/>
                <path d="M 544,368 L 544,384" fill="none" stroke="black"/>
                <path d="M 544,512 L 544,528" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,64" fill="none" stroke="black"/>
                <path d="M 552,720 L 552,752" fill="none" stroke="black"/>
                <path d="M 648,64 L 648,96" fill="none" stroke="black"/>
                <path d="M 648,128 L 648,288" fill="none" stroke="black"/>
                <path d="M 648,352 L 648,416" fill="none" stroke="black"/>
                <path d="M 648,512 L 648,528" fill="none" stroke="black"/>
                <path d="M 648,592 L 648,672" fill="none" stroke="black"/>
                <path d="M 648,704 L 648,720" fill="none" stroke="black"/>
                <path d="M 744,96 L 744,128" fill="none" stroke="black"/>
                <path d="M 752,32 L 752,64" fill="none" stroke="black"/>
                <path d="M 752,720 L 752,752" fill="none" stroke="black"/>
                <path d="M 8,32 L 160,32" fill="none" stroke="black"/>
                <path d="M 216,32 L 328,32" fill="none" stroke="black"/>
                <path d="M 384,32 L 496,32" fill="none" stroke="black"/>
                <path d="M 552,32 L 752,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 160,64" fill="none" stroke="black"/>
                <path d="M 216,64 L 328,64" fill="none" stroke="black"/>
                <path d="M 384,64 L 496,64" fill="none" stroke="black"/>
                <path d="M 552,64 L 752,64" fill="none" stroke="black"/>
                <path d="M 16,96 L 744,96" fill="none" stroke="black"/>
                <path d="M 16,128 L 744,128" fill="none" stroke="black"/>
                <path d="M 88,192 L 192,192" fill="none" stroke="black"/>
                <path d="M 96,208 L 192,208" fill="none" stroke="black"/>
                <path d="M 88,256 L 192,256" fill="none" stroke="black"/>
                <path d="M 96,272 L 192,272" fill="none" stroke="black"/>
                <path d="M 88,320 L 432,320" fill="none" stroke="black"/>
                <path d="M 440,368 L 544,368" fill="none" stroke="black"/>
                <path d="M 448,384 L 544,384" fill="none" stroke="black"/>
                <path d="M 96,432 L 440,432" fill="none" stroke="black"/>
                <path d="M 88,464 L 432,464" fill="none" stroke="black"/>
                <path d="M 440,512 L 544,512" fill="none" stroke="black"/>
                <path d="M 448,528 L 544,528" fill="none" stroke="black"/>
                <path d="M 96,560 L 440,560" fill="none" stroke="black"/>
                <path d="M 88,592 L 640,592" fill="none" stroke="black"/>
                <path d="M 536,624 L 648,624" fill="none" stroke="black"/>
                <path d="M 536,640 L 640,640" fill="none" stroke="black"/>
                <path d="M 96,672 L 648,672" fill="none" stroke="black"/>
                <path d="M 88,704 L 264,704" fill="none" stroke="black"/>
                <path d="M 8,720 L 160,720" fill="none" stroke="black"/>
                <path d="M 216,720 L 328,720" fill="none" stroke="black"/>
                <path d="M 384,720 L 496,720" fill="none" stroke="black"/>
                <path d="M 552,720 L 752,720" fill="none" stroke="black"/>
                <path d="M 8,752 L 160,752" fill="none" stroke="black"/>
                <path d="M 216,752 L 328,752" fill="none" stroke="black"/>
                <path d="M 384,752 L 496,752" fill="none" stroke="black"/>
                <path d="M 552,752 L 752,752" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="648,640 636,634.4 636,645.6 " fill="black" transform="rotate(0,640,640)"/>
                <polygon class="arrowhead" points="648,592 636,586.4 636,597.6 " fill="black" transform="rotate(0,640,592)"/>
                <polygon class="arrowhead" points="456,528 444,522.4 444,533.6 " fill="black" transform="rotate(180,448,528)"/>
                <polygon class="arrowhead" points="456,384 444,378.4 444,389.6 " fill="black" transform="rotate(180,448,384)"/>
                <polygon class="arrowhead" points="440,464 428,458.4 428,469.6 " fill="black" transform="rotate(0,432,464)"/>
                <polygon class="arrowhead" points="440,320 428,314.4 428,325.6 " fill="black" transform="rotate(0,432,320)"/>
                <polygon class="arrowhead" points="272,704 260,698.4 260,709.6 " fill="black" transform="rotate(0,264,704)"/>
                <polygon class="arrowhead" points="104,672 92,666.4 92,677.6 " fill="black" transform="rotate(180,96,672)"/>
                <polygon class="arrowhead" points="104,560 92,554.4 92,565.6 " fill="black" transform="rotate(180,96,560)"/>
                <polygon class="arrowhead" points="104,432 92,426.4 92,437.6 " fill="black" transform="rotate(180,96,432)"/>
                <polygon class="arrowhead" points="104,272 92,266.4 92,277.6 " fill="black" transform="rotate(180,96,272)"/>
                <polygon class="arrowhead" points="104,208 92,202.4 92,213.6 " fill="black" transform="rotate(180,96,208)"/>
                <g class="text">
                  <text x="60" y="52">Workload</text>
                  <text x="120" y="52">Owner</text>
                  <text x="268" y="52">Workload</text>
                  <text x="416" y="52">Key</text>
                  <text x="456" y="52">Store</text>
                  <text x="612" y="52">Credential</text>
                  <text x="696" y="52">Authority</text>
                  <text x="316" y="116">Credential</text>
                  <text x="412" y="116">Provisioning</text>
                  <text x="488" y="116">Phase</text>
                  <text x="124" y="148">Invoke</text>
                  <text x="168" y="148">the</text>
                  <text x="212" y="148">Claims</text>
                  <text x="268" y="148">Mapper</text>
                  <text x="308" y="148">to</text>
                  <text x="88" y="164">&amp;#9474;</text>
                  <text x="124" y="164">create</text>
                  <text x="188" y="164">Workload</text>
                  <text x="268" y="164">Identifier</text>
                  <text x="112" y="180">and</text>
                  <text x="172" y="180">Associated</text>
                  <text x="260" y="180">Credential</text>
                  <text x="332" y="180">Claims</text>
                  <text x="440" y="180">&amp;#9474;</text>
                  <text x="88" y="228">&amp;#9474;</text>
                  <text x="124" y="228">Create</text>
                  <text x="196" y="228">Credential</text>
                  <text x="256" y="228">Key</text>
                  <text x="304" y="228">Release</text>
                  <text x="364" y="228">Policy</text>
                  <text x="120" y="244">based</text>
                  <text x="156" y="244">on</text>
                  <text x="216" y="244">anticipated</text>
                  <text x="312" y="244">Attestation</text>
                  <text x="392" y="244">Results</text>
                  <text x="440" y="244">&amp;#9474;</text>
                  <text x="88" y="292">&amp;#9474;</text>
                  <text x="124" y="292">Create</text>
                  <text x="196" y="292">Credential</text>
                  <text x="256" y="292">Key</text>
                  <text x="112" y="308">and</text>
                  <text x="144" y="308">Set</text>
                  <text x="176" y="308">Key</text>
                  <text x="224" y="308">Release</text>
                  <text x="284" y="308">Policy</text>
                  <text x="648" y="308">&amp;#9474;</text>
                  <text x="648" y="324">&amp;#9474;</text>
                  <text x="88" y="340">&amp;#9474;</text>
                  <text x="272" y="340">&amp;#9474;</text>
                  <text x="440" y="340">&amp;#9474;</text>
                  <text x="484" y="340">Generate</text>
                  <text x="536" y="340">and</text>
                  <text x="576" y="340">Store</text>
                  <text x="644" y="340">Credential</text>
                  <text x="704" y="340">Key</text>
                  <text x="464" y="356">and</text>
                  <text x="496" y="356">Key</text>
                  <text x="544" y="356">Release</text>
                  <text x="604" y="356">Policy</text>
                  <text x="88" y="404">&amp;#9474;</text>
                  <text x="140" y="404">Return</text>
                  <text x="196" y="404">Public</text>
                  <text x="256" y="404">Portion</text>
                  <text x="300" y="404">of</text>
                  <text x="356" y="404">Credential</text>
                  <text x="416" y="404">Key</text>
                  <text x="212" y="420">or</text>
                  <text x="268" y="420">Credential</text>
                  <text x="328" y="420">Key</text>
                  <text x="388" y="420">Identifier</text>
                  <text x="648" y="436">&amp;#9474;</text>
                  <text x="88" y="452">&amp;#9474;</text>
                  <text x="124" y="452">Create</text>
                  <text x="196" y="452">Credential</text>
                  <text x="272" y="452">Request</text>
                  <text x="440" y="452">&amp;#9474;</text>
                  <text x="648" y="452">&amp;#9474;</text>
                  <text x="440" y="468">+</text>
                  <text x="648" y="468">&amp;#9474;</text>
                  <text x="88" y="484">&amp;#9474;</text>
                  <text x="440" y="484">&amp;#9474;</text>
                  <text x="476" y="484">Create</text>
                  <text x="548" y="484">Credential</text>
                  <text x="624" y="484">Request</text>
                  <text x="672" y="484">and</text>
                  <text x="88" y="500">&amp;#9474;</text>
                  <text x="440" y="500">&amp;#9474;</text>
                  <text x="468" y="500">Sign</text>
                  <text x="508" y="500">with</text>
                  <text x="560" y="500">Private</text>
                  <text x="636" y="500">Credential</text>
                  <text x="696" y="500">Key</text>
                  <text x="88" y="548">&amp;#9474;</text>
                  <text x="252" y="548">Return</text>
                  <text x="324" y="548">Credential</text>
                  <text x="400" y="548">Request</text>
                  <text x="648" y="548">&amp;#9474;</text>
                  <text x="88" y="564">+</text>
                  <text x="648" y="564">&amp;#9474;</text>
                  <text x="88" y="580">&amp;#9474;</text>
                  <text x="128" y="580">Request</text>
                  <text x="204" y="580">Credential</text>
                  <text x="296" y="580">(Credential</text>
                  <text x="380" y="580">Request,</text>
                  <text x="452" y="580">Workload</text>
                  <text x="528" y="580">Identity,</text>
                  <text x="612" y="580">Credential</text>
                  <text x="704" y="580">Attributes)</text>
                  <text x="88" y="612">&amp;#9474;</text>
                  <text x="272" y="612">&amp;#9474;</text>
                  <text x="452" y="612">Create</text>
                  <text x="496" y="612">and</text>
                  <text x="532" y="612">Sign</text>
                  <text x="596" y="612">Credential</text>
                  <text x="272" y="628">&amp;#9474;</text>
                  <text x="272" y="644">&amp;#9474;</text>
                  <text x="88" y="660">&amp;#9474;</text>
                  <text x="272" y="660">&amp;#9474;</text>
                  <text x="524" y="660">Return</text>
                  <text x="596" y="660">Credential</text>
                  <text x="128" y="692">Provide</text>
                  <text x="196" y="692">Workload</text>
                  <text x="252" y="692">with</text>
                  <text x="316" y="692">Credential</text>
                  <text x="648" y="692">&amp;#9474;</text>
                  <text x="60" y="740">Workload</text>
                  <text x="120" y="740">Owner</text>
                  <text x="268" y="740">Workload</text>
                  <text x="328" y="740">&amp;#9474;</text>
                  <text x="416" y="740">Key</text>
                  <text x="456" y="740">Store</text>
                  <text x="612" y="740">Credential</text>
                  <text x="696" y="740">Authority</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
    +------------------+      +-------------+      +-------------+      +------------------------+
    |  Workload Owner  |      |  Workload   |      |  Key Store  |      |  Credential Authority  |
    +---------+--------+      +------+------+      +------+------+      +-----------+------------+
              |                      |                    |                         |
     +--------+----------------------+--------------------+-------------------------+-----------+
     |                                Credential Provisioning Phase                             |
     +--------+----------------------+--------------------+-------------------------+-----------+
              | Invoke the Claims Mapper to               |                         |
              │ create Workload Identifier                |                         |
              | and Associated Credential Claims          │                         |
              +------------+         |                    |                         |
              +<-----------+         |                    |                         |
              │ Create Credential Key Release Policy      |                         |
              | based on anticipated Attestation Results  │                         |
              +------------+         |                    |                         |
              +<-----------+         |                    |                         |
              │ Create Credential Key                     |                         |
              | and Set Key Release Policy                |                         │
              +------------------------------------------>+                         │
              │                      │                    │ Generate and Store Credential Key
              |                      |                    | and Key Release Policy  |
              |                      |                    +------------+            |
              |                      |                    +<-----------+            |
              │   Return Public Portion of Credential Key |                         |
              |              or Credential Key Identifier |                         |
              +<------------------------------------------+                         │
              │ Create Credential Request                 │                         │
              +----------------------+------------------->+                         │
              │                      |                    │ Create Credential Request and
              │                      |                    │ Sign with Private Credential Key
              |                      |                    +------------+            |
              |                      |                    +<-----------+            |
              │                 Return Credential Request |                         │
              +<---------------------+--------------------+                         │
              │ Request Credential (Credential Request, Workload Identity, Credential Attributes)
              +----------------------+--------------------------------------------->+
              │                      │                   Create and Sign Credential |
              |                      │                    |           +-------------+
              |                      │                    |           +------------>+
              │                      │                    |       Return Credential |
              +<---------------------+--------------------+-------------------------+
              | Provide Workload with Credential          |                         │
              +--------------------->+                    |                         |
    +---------+--------+      +------+------+      +------+------+      +-----------+------------+
    |  Workload Owner  |      |  Workload   │      |  Key Store  |      |  Credential Authority  |
    +------------------+      +-------------+      +-------------+      +------------------------+
]]></artwork>
          </artset>
        </section>
        <section anchor="credential-acquisition-phase">
          <name>Credential Acquisition Phase</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="720" width="560" viewBox="0 0 560 720" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
                <path d="M 8,656 L 8,688" fill="none" stroke="black"/>
                <path d="M 64,64 L 64,96" fill="none" stroke="black"/>
                <path d="M 64,160 L 64,176" fill="none" stroke="black"/>
                <path d="M 64,208 L 64,224" fill="none" stroke="black"/>
                <path d="M 64,288 L 64,304" fill="none" stroke="black"/>
                <path d="M 64,336 L 64,352" fill="none" stroke="black"/>
                <path d="M 64,384 L 64,416" fill="none" stroke="black"/>
                <path d="M 64,496 L 64,512" fill="none" stroke="black"/>
                <path d="M 64,544 L 64,560" fill="none" stroke="black"/>
                <path d="M 64,624 L 64,656" fill="none" stroke="black"/>
                <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
                <path d="M 128,656 L 128,688" fill="none" stroke="black"/>
                <path d="M 168,160 L 168,176" fill="none" stroke="black"/>
                <path d="M 168,208 L 168,224" fill="none" stroke="black"/>
                <path d="M 168,624 L 168,640" fill="none" stroke="black"/>
                <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
                <path d="M 200,656 L 200,688" fill="none" stroke="black"/>
                <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
                <path d="M 264,160 L 264,304" fill="none" stroke="black"/>
                <path d="M 264,336 L 264,424" fill="none" stroke="black"/>
                <path d="M 264,496 L 264,512" fill="none" stroke="black"/>
                <path d="M 264,544 L 264,560" fill="none" stroke="black"/>
                <path d="M 264,592 L 264,656" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
                <path d="M 320,656 L 320,688" fill="none" stroke="black"/>
                <path d="M 344,496 L 344,512" fill="none" stroke="black"/>
                <path d="M 344,544 L 344,560" fill="none" stroke="black"/>
                <path d="M 368,288 L 368,304" fill="none" stroke="black"/>
                <path d="M 368,336 L 368,352" fill="none" stroke="black"/>
                <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
                <path d="M 392,656 L 392,688" fill="none" stroke="black"/>
                <path d="M 456,64 L 456,96" fill="none" stroke="black"/>
                <path d="M 456,160 L 456,240" fill="none" stroke="black"/>
                <path d="M 456,272 L 456,400" fill="none" stroke="black"/>
                <path d="M 456,432 L 456,560" fill="none" stroke="black"/>
                <path d="M 456,592 L 456,656" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,64" fill="none" stroke="black"/>
                <path d="M 552,96 L 552,128" fill="none" stroke="black"/>
                <path d="M 552,656 L 552,688" fill="none" stroke="black"/>
                <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
                <path d="M 200,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 392,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 128,64" fill="none" stroke="black"/>
                <path d="M 200,64 L 320,64" fill="none" stroke="black"/>
                <path d="M 392,64 L 552,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
                <path d="M 64,160 L 168,160" fill="none" stroke="black"/>
                <path d="M 72,176 L 168,176" fill="none" stroke="black"/>
                <path d="M 64,208 L 168,208" fill="none" stroke="black"/>
                <path d="M 72,224 L 168,224" fill="none" stroke="black"/>
                <path d="M 64,256 L 256,256" fill="none" stroke="black"/>
                <path d="M 264,288 L 368,288" fill="none" stroke="black"/>
                <path d="M 272,304 L 368,304" fill="none" stroke="black"/>
                <path d="M 264,336 L 368,336" fill="none" stroke="black"/>
                <path d="M 272,352 L 368,352" fill="none" stroke="black"/>
                <path d="M 72,416 L 264,416" fill="none" stroke="black"/>
                <path d="M 64,448 L 448,448" fill="none" stroke="black"/>
                <path d="M 344,496 L 456,496" fill="none" stroke="black"/>
                <path d="M 344,512 L 448,512" fill="none" stroke="black"/>
                <path d="M 344,544 L 456,544" fill="none" stroke="black"/>
                <path d="M 344,560 L 448,560" fill="none" stroke="black"/>
                <path d="M 72,592 L 456,592" fill="none" stroke="black"/>
                <path d="M 64,624 L 168,624" fill="none" stroke="black"/>
                <path d="M 72,640 L 168,640" fill="none" stroke="black"/>
                <path d="M 8,656 L 128,656" fill="none" stroke="black"/>
                <path d="M 200,656 L 320,656" fill="none" stroke="black"/>
                <path d="M 392,656 L 552,656" fill="none" stroke="black"/>
                <path d="M 8,688 L 128,688" fill="none" stroke="black"/>
                <path d="M 200,688 L 320,688" fill="none" stroke="black"/>
                <path d="M 392,688 L 552,688" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="456,560 444,554.4 444,565.6 " fill="black" transform="rotate(0,448,560)"/>
                <polygon class="arrowhead" points="456,512 444,506.4 444,517.6 " fill="black" transform="rotate(0,448,512)"/>
                <polygon class="arrowhead" points="456,448 444,442.4 444,453.6 " fill="black" transform="rotate(0,448,448)"/>
                <polygon class="arrowhead" points="280,352 268,346.4 268,357.6 " fill="black" transform="rotate(180,272,352)"/>
                <polygon class="arrowhead" points="280,304 268,298.4 268,309.6 " fill="black" transform="rotate(180,272,304)"/>
                <polygon class="arrowhead" points="264,256 252,250.4 252,261.6 " fill="black" transform="rotate(0,256,256)"/>
                <polygon class="arrowhead" points="80,640 68,634.4 68,645.6 " fill="black" transform="rotate(180,72,640)"/>
                <polygon class="arrowhead" points="80,592 68,586.4 68,597.6 " fill="black" transform="rotate(180,72,592)"/>
                <polygon class="arrowhead" points="80,416 68,410.4 68,421.6 " fill="black" transform="rotate(180,72,416)"/>
                <polygon class="arrowhead" points="80,224 68,218.4 68,229.6 " fill="black" transform="rotate(180,72,224)"/>
                <polygon class="arrowhead" points="80,176 68,170.4 68,181.6 " fill="black" transform="rotate(180,72,176)"/>
                <g class="text">
                  <text x="68" y="52">Workload</text>
                  <text x="260" y="52">Verifier</text>
                  <text x="440" y="52">Key</text>
                  <text x="480" y="52">Store</text>
                  <text x="212" y="116">Credential</text>
                  <text x="304" y="116">Acquisition</text>
                  <text x="376" y="116">Phase</text>
                  <text x="64" y="148">&amp;#9474;</text>
                  <text x="108" y="148">Generate</text>
                  <text x="188" y="148">Asymmetric</text>
                  <text x="276" y="148">Encryption</text>
                  <text x="336" y="148">Key</text>
                  <text x="456" y="148">&amp;#9474;</text>
                  <text x="64" y="196">&amp;#9474;</text>
                  <text x="108" y="196">Generate</text>
                  <text x="180" y="196">Evidence</text>
                  <text x="240" y="196">(incl</text>
                  <text x="272" y="196">.</text>
                  <text x="308" y="196">Public</text>
                  <text x="380" y="196">Encryption</text>
                  <text x="356" y="212">Key)</text>
                  <text x="64" y="244">&amp;#9474;</text>
                  <text x="104" y="244">Request</text>
                  <text x="184" y="244">Attestation</text>
                  <text x="456" y="260">&amp;#9474;</text>
                  <text x="64" y="276">&amp;#9474;</text>
                  <text x="132" y="276">(Evidence)</text>
                  <text x="308" y="276">Appraise</text>
                  <text x="380" y="276">Evidence</text>
                  <text x="64" y="324">&amp;#9474;</text>
                  <text x="264" y="324">&amp;#9474;</text>
                  <text x="304" y="324">Compute</text>
                  <text x="384" y="324">Attestation</text>
                  <text x="408" y="340">Results</text>
                  <text x="64" y="372">&amp;#9474;</text>
                  <text x="228" y="372">Return</text>
                  <text x="144" y="388">Attestation</text>
                  <text x="224" y="388">Results</text>
                  <text x="100" y="404">(incl.</text>
                  <text x="172" y="404">Encryption</text>
                  <text x="236" y="404">Key)</text>
                  <text x="456" y="420">&amp;#9474;</text>
                  <text x="64" y="436">&amp;#9474;</text>
                  <text x="104" y="436">Request</text>
                  <text x="180" y="436">Credential</text>
                  <text x="240" y="436">Key</text>
                  <text x="308" y="436">(Attestation</text>
                  <text x="396" y="436">Results)</text>
                  <text x="64" y="468">&amp;#9474;</text>
                  <text x="252" y="468">Validate</text>
                  <text x="336" y="468">Attestation</text>
                  <text x="416" y="468">Results</text>
                  <text x="64" y="484">&amp;#9474;</text>
                  <text x="176" y="484">against</text>
                  <text x="252" y="484">Credential</text>
                  <text x="312" y="484">Key</text>
                  <text x="360" y="484">Release</text>
                  <text x="420" y="484">Policy</text>
                  <text x="64" y="532">&amp;#9474;</text>
                  <text x="152" y="532">Encrypt</text>
                  <text x="228" y="532">Credential</text>
                  <text x="288" y="532">Key</text>
                  <text x="316" y="532">to</text>
                  <text x="372" y="532">Encryption</text>
                  <text x="432" y="532">Key</text>
                  <text x="64" y="580">&amp;#9474;</text>
                  <text x="220" y="580">Return</text>
                  <text x="288" y="580">Encrypted</text>
                  <text x="372" y="580">Credential</text>
                  <text x="432" y="580">Key</text>
                  <text x="456" y="580">&amp;#9474;</text>
                  <text x="64" y="596">+</text>
                  <text x="64" y="612">&amp;#9474;</text>
                  <text x="104" y="612">Decrypt</text>
                  <text x="180" y="612">Credential</text>
                  <text x="240" y="612">Key</text>
                  <text x="68" y="676">Workload</text>
                  <text x="260" y="676">Verifier</text>
                  <text x="440" y="676">Key</text>
                  <text x="480" y="676">Store</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
    +--------------+        +--------------+        +-------------------+
    |   Workload   |        |   Verifier   |        |    Key Store      |
    +------+-------+        +-------+------+        +-------+-----------+
           |                        |                       |
    .------+------------------------+-----------------------+-----------.
    |                    Credential Acquisition Phase                   |
    +------+------------------------+-----------------------+-----------+
           │ Generate Asymmetric Encryption Key             │
           +------------+           |                       |
           +<-----------+           |                       |
           │ Generate Evidence (incl+. Public Encryption    |
           +------------+           |         Key)          |
           |<-----------+           |                       |
           │ Request Attestation    |                       |
           +----------------------->+                       │
           │   (Evidence)           | Appraise Evidence     |
           |                        +------------+          |
           |                        +<-----------+          |
           │                        │ Compute Attestation   |
           |                        +------------+ Results  |
           |                        +<-----------+          |
           │                 Return |                       |
           |    Attestation Results |                       |
           | (incl. Encryption Key) |                       |
           +<-----------------------+                       │
           │ Request Credential Key (Attestation Results)   |
           +----------------------------------------------->+
           │                   Validate Attestation Results |
           │          against Credential Key Release Policy |
           |                        |         +-------------+
           |                        |         +------------>+
           │       Encrypt Credential Key to Encryption Key |
           |                        |         +-------------+
           |                        |         +------------>+
           │                Return Encrypted Credential Key │
           +<-----------------------+-----------------------+
           │ Decrypt Credential Key |                       |
           +------------+           |                       |
           +<-----------+           |                       |
    +------+-------+        +-------+------+        +-------+-----------+
    |   Workload   |        |   Verifier   |        |    Key Store      |
    +------+-------+        +-------+------+        +-------+-----------+
]]></artwork>
          </artset>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>All communications between entities (Workload to Credential Authority, Workload to Verifier etc) <bcp14>MUST</bcp14> be secured using mutually authenticated, confidential, and integrity-protected channels (e.g., TLS).</t>
      <t>In addition to the considerations herein, Verifier, which is a central point of anchor for Trustworthy Workload Identifer <bcp14>MUST</bcp14> follow the security guidance detailed in the "Security and Privacy considerations" as detailed in the RATS Architecture Section <xref target="RFC9334" section="11" sectionFormat="bare"/> and Section <xref target="RFC9334" section="12" sectionFormat="bare"/> of <xref target="RFC9334"/>.</t>
      <t>The credential key <bcp14>MUST</bcp14> always be stored securely at all time, for example in a secure element of the underlying platform running the Workload.</t>
      <t>There is a risk that a live Workload Migration may render some of the claims about the Workload invalid (e.g., live-migrating a Workload between Germany and France may incorrectly preserve the "Country=Germany" claim, but correctly preserve the "Region=Europe" claim).</t>
    </section>
    <section anchor="pivacy-considerations">
      <name>Pivacy Considerations</name>
      <t>Remote Attestation of a Workload requires exchange of attestation related messages, for example, Evidence and Attestation Results. This can potentially leak sensitive information about the Workload.</t>
      <t>Confidentiality: Encryption could be used to prevent unauthorised parties from accessing sensitive information from Evidence or Attestation Results.
This is crucial in multi-tenant environments.
The Credential Key to be released to a Workload <bcp14>MUST</bcp14> always be encrypted to avoid potential leakage to unauthorised actors.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9711"/>
            <seriesInfo name="RFC" value="9711"/>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-wimse-arch">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-06"/>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as a
   running instance of software executing for a specific purpose.  This
   document discusses an architecture for designing and standardizing
   protocols and payloads for conveying workload identity and security
   context information.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="TWISIGCharter" target="https://github.com/confidential-computing/governance/blob/main/SIGs/TWI/TWI_Charter.md">
          <front>
            <title>Trustworthy Workload Identity (TWI) Special Interest Group -- Charter</title>
            <author>
              <organization>Confidential Computing Consortium Trustworthy Workload Identity SIG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TWISIGReq" target="https://github.com/confidential-computing/twi/blob/main/TWI_Requirements.md">
          <front>
            <title>Trustworthy Workload Identity (TWI) Special Interest Group -- Requirements</title>
            <author>
              <organization>Confidential Computing Consortium Trustworthy Workload Identity SIG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TWISIGDef" target="https://github.com/confidential-computing/twi/blob/main/TWI_Definitions.md">
          <front>
            <title>Trustworthy Workload Identity (TWI) Special Interest Group -- Definitions</title>
            <author>
              <organization>Confidential Computing Consortium Trustworthy Workload Identity SIG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WIMSES2S" target="https://datatracker.ietf.org/doc/draft-ietf-wimse-s2s-protocol/">
          <front>
            <title>WIMSE Service-to-Service Protocol</title>
            <author>
              <organization>IETF</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 565?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The following persons, in no specific order, contributed to the work directly, participated in design team meetings, or provided valuable comments during the review of this document.</t>
      <t>Pieter Kasselman (SPIRL), Arieal Feldman (Google), Mateusz Bronk (Intel), Manu Fontaine (Hushmesh Inc.), Benedict Lau (EQTY Lab), Zvonko Kaiser (NVIDIA), David Quigley (Intel), Sal Kimmich (GadflyAI), Alex Dalton (Shielded Technologies), Eric Wolfe (Mainsail Industries), Nicolae Paladi(Canary Bit), Mark Gentry (JPMorgan Chase), Jag Raman (Oracle), Brian Hugenbruch (IBM), Jens Alberts (Fr0ntierX), Mira Spina (MITRE) and John Suykerbuyk.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
