<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-novak-twi-attestation-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RATS for TWI">Remote Attestation for Trustworthy Workload Identity</title>
    <seriesInfo name="Internet-Draft" value="draft-novak-twi-attestation-00"/>
    <author initials="M." surname="Novak" fullname="Mark Novak">
      <organization>J.P. Morgan Chase</organization>
      <address>
        <email>mark.f.novak@jpmchase.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm</organization>
      <address>
        <email>Yogesh.Deshpande@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Franhaufer Inst.</organization>
      <address>
        <email>Henk.Birkholz@ietf.contact</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>trustworthy workload identity</keyword>
    <keyword>remote attestation</keyword>
    <keyword>stable workload credentials</keyword>
    <abstract>
      <?line 91?>

<t>Trustworthy Workloads are workloads that operate in environments that provide isolation of data in use.
This document describes how Trustworthy workloads can acquire credentials containing stable identifiers, upon proving the trust in the environments in which they operate via Remote Attestation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-novak-twi-attestation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RATS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 96?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>As organisations move more workloads into untrusted or shared environments, protection of data in use becomes increasingly important. One way of isolating data in use is Confidential Computing: executing a workload (for example an AI model, database process or financial service) inside a hardware-based, remotely attested Trusted Execution Environment (TEE). Workloads operating in such environments need stable and trustworthy identifiers to communicate over the network to the external world. Often such identifiers are provided to them via Credential Authorities upon ascertaining trust in the environments in which these workloads operate. The standard practice to establish trust in the operating environment is through Remote Attestation.</t>
      <t>This draft specifies how a Workload operating in Confidential Computing Environment can obtain trustworthy, stable, and workload-bound credentials using Remote Attestation.</t>
    </section>
    <section anchor="definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms and concepts defined by the WIMSE and RATS architectures, as well as the terms defined by the Trustworthy Workload Identity Special Interest Group at the Confidential Computing Consortium.
For a complete glossary, see <xref section="4" sectionFormat="of" target="RFC9334"/> , <xref target="I-D.draft-ietf-wimse-arch"/> &amp; <xref target="TWISIGDef"/>.</t>
      <t>The definitions of terms like Trustworthy Workload Identity and Workload Credential match those specified by the TWI SIG Definitions <xref target="TWISIGDef"/>.</t>
      <dl>
        <dt>Workload:</dt>
        <dd>
          <t><xref target="I-D.draft-ietf-wimse-arch"/> defines 'Workload' as "an instance of software executing for a specific purpose". Here we restrict that definition to the portions of the deployed software and its configuration that are subject to Remote Attestation.</t>
        </dd>
        <dt>Workload Identifier:</dt>
        <dd>
          <t>a stable construct around which Relying Parties can form long-lived Workload authorization policies.</t>
        </dd>
        <dt>Workload Identity:</dt>
        <dd>
          <t>the definition of Workload Identity is identical to the definition of the same term by <xref target="I-D.draft-ietf-wimse-arch"/>: "a combination of three basic building blocks: trust domain, Workload Identifier and identity credentials.</t>
        </dd>
        <dt>Workload Credential:</dt>
        <dd>
          <t>an ephemeral identity document containing the Workload Identifier and a number of additional claims, that can be short-lived or long-lived, and that is used to represent and prove Workload Identity to a Relying Party.</t>
        </dd>
        <dt>Stable Workload Identity, Stable Authorization Policy:</dt>
        <dd>
          <t>a Workload Identity or Authorization Policy is considered Stable if it remains constant in the face of software and hardware changes (updates and rollbacks), so long as those updates and rollbacks are authorized, i.e., comply with the policy of what consitutes the allowed version(s) of the software and hardware in question.</t>
        </dd>
        <dt>Credential Authority:</dt>
        <dd>
          <t>an entity trusted to issue Workload Credentials</t>
        </dd>
        <dt>Bound Workload Credential:</dt>
        <dd>
          <t>a Workload Credential is considered Bound if it can only be used in conjunction with a secret Credential Key that only a Workload authorized for the use of that Key can obtain, either by generating and certifying it, or by retrieving it from a secure Key Store.</t>
        </dd>
        <dt>Workload Owner:</dt>
        <dd>
          <t>an entity tasked with specifying policies concerning what Workload composition is considered valid for the purposes of issuing Workload Credentials</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>an entity performing the role of Attestation Verification, as documented in <xref section="4" sectionFormat="of" target="RFC9334"/></t>
        </dd>
      </dl>
    </section>
    <section anchor="available-options">
      <name>Available Options</name>
      <t>When dealing with a client Workload that is running inside a remotely attested Trusted Execution Environment, the goal of having a Relying Party having a stable authorization policy and utilizing industry-standard mechanisms for authorization can be achieved by issuing Credentials in a relying party-friendly format, such as those specified by <xref target="I-D.draft-ietf-wimse-arch"/>. Such Credentials may take the form of x.509 certificates or Workload Identity Tokens (WITs) defined in Section 3.1 of <xref target="WIMSES2S"/>. A Workload can start using the Credential for authentication and authorization once it has two items in its possession: the public portion – the Workload Credential itself, and the secret Credential Key necessary to utilize this Credential.</t>
      <t>A Stable authorization policy can only be achieved if Workloads can have Stable identities. The decision about what constitutes a trustworthy Workload and a trustworthy configuration is a composition verification, with multiple entities providing Reference Values for the components they vouch for. For the issued Workload Identity to be Stable in addition to Trustworthy, a mapping must be performed between these Reference Values and the issued Identities. In a typical enterprise, Stable authorization policies are expressed in terms of business- rather than technology-oriented concepts, e.g., "Payroll Application", "Located in Germany", "Cleared for handling Personally Identifiable Information", etc. This contrasts with what RATS has historically thought of as Attestation Results, which may relate to the hardware manufacturer, firmware and software versions, etc.</t>
      <t>In some implementations, a Credential is precomputed, and the Credential Key is obtained from a Key Store following successful Remote Attestation. In other implementations, the Workload generates its own Credential Key and uses Remote Attestation to certify it.</t>
      <t>Within the RATS Architecture, either of these options can be accomplished in one of two ways:</t>
      <ol spacing="normal" type="1"><li>
          <t>The Attestation Results convey to the attesting Workload both the public Credential and the secret Credential Key.</t>
        </li>
        <li>
          <t>The Attestation Results are encoded in an Entity Attestation Token or EAT <xref target="RFC9711"/>, or a bespoke Verifier-specific format, and can be used by the attesting Workload to obtain a Bound Credential and an associated Credential Key, e.g., by contacting a Credential Authority and/or a Key Store, but without further involving the Verifier.</t>
        </li>
      </ol>
      <t>In either case, the detailed information about the Workload’s composition conveyed to the Verifier using RATS “Evidence” is mapped to Stable, technology-agnostic, business-oriented claims about the Workload.</t>
      <t>These two options can be visualised at a high level as:
<cref anchor="tracked-at">Tracked at:</cref> https://github.com/confidential-computing/twi-rats/issues/5</t>
      <t>From the Workload's perspective, Variant 2 carries with it an extra network roundtrip (the first roundtrip being the workload exchanging “Evidence” for “Attestation Results”). It is the only option available to the Workload for using existing Verifier implementations that make no changes associated with this proposal. This option does however introduce additional latency and reliability costs inherent in an extra roundtrip.</t>
      <t>Variant 1 does not carry with it the extra roundtrip, and thus does not carry the additional performance costs or reliability risks.</t>
      <t>Several distinct options are possible. In all cases, the Credential is generated and signed by a Credential Authority. The difference is in how the Workload obtains these Credentials. The main pivots are:</t>
      <ol spacing="normal" type="1"><li>
          <t>Where the Credential Key is generated (Key Source):
          </t>
          <ol spacing="normal" type="1"><li>
              <t>Inside the Workload Instance</t>
            </li>
            <li>
              <t>Inside a secure Key Store such as a Hardware Security Module (HSM), by the Workload Owner</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Where the Workload gets its Credential from (Credential Source):
          </t>
          <ol spacing="normal" type="1"><li>
              <t>The Verifier</t>
            </li>
            <li>
              <t>The Credential Authority (e.g., a Certificate Authority, a Security Token Service, or similar)</t>
            </li>
            <li>
              <t>The Workload Owner (via the Control Plane)</t>
            </li>
          </ol>
        </li>
      </ol>
      <t>Note that it is safe to receive the Credential from an untrusted source such as the Control Plane, because it is public. The only requirement is that the obtained Credential matches the Credential Key, which <bcp14>MUST</bcp14> always be obtained securely and only by an authorized Workload instance.</t>
      <t>Further, under pivot 2.i, the order of interactions involved in Credential generation might differ:</t>
      <ol spacing="normal" type="1"><li>
          <t>A Workload invokes the Verifier which collaborates with the Credential Authority to compute and return Credentials, returning these Credentials inside the Attestation Results, or</t>
        </li>
        <li>
          <t>A Workload invokes the Verifier, obtains from it the Attestation Results, and forwards these Attestation Results to the Credential Authority inside a Credential Request to get the Credential.</t>
        </li>
      </ol>
      <t>This set of variants results in several distinct Credential Acquisition Mechanisms (CAMs), some of which are listed in the table below:</t>
      <table>
        <thead>
          <tr>
            <th align="center">CAM</th>
            <th align="left">Key Source</th>
            <th align="left">Credential Source</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">A</td>
            <td align="left">Workload</td>
            <td align="left">Verifier</td>
            <td align="left">A Proof-of-Possession of the Credential Key is included in the Evidence submitted by the Workload Instance to the Verifier. The Verifier checks the Evidence, then contacts the Credential Authority to compute a Credential based on this Credential Key and returns it to the Workload Instance as part of Attestation Results.</td>
          </tr>
          <tr>
            <td align="center">B</td>
            <td align="left">Workload</td>
            <td align="left">Credential Authority</td>
            <td align="left">A Proof-of-Possession of the Credential Key is included in the Evidence submitted by the Workload Instance to the Verifier, and also in the Attestation Results returned by the Verifier. The Workload Instance sends the Attestation Results obtained from the Verifier to the Credential Authority, which computes and returns to the Workload Instance a Credential based on these Attestation Results.</td>
          </tr>
          <tr>
            <td align="center">C</td>
            <td align="left">Workload</td>
            <td align="left">Credential Authority</td>
            <td align="left">A Proof-of-Possession of the Credential Key is included in a Credential Request submitted by the Workload to the Credential Authority alongside Evidence destined for the Verifier. Credential Authority handles the Credential Request by contacting the Verifier on the Workload's behalf, supplying the Evidence from the Credential Request. The Verifier responds with Attestation Results which the Credential Authority uses to compute a Credential, which it then returns to the Workload.</td>
          </tr>
          <tr>
            <td align="center">N/A</td>
            <td align="left">Workload</td>
            <td align="left">Workload Owner</td>
            <td align="left">This is not a viable option since a Workload that generates its own Credential Key <bcp14>MUST</bcp14> contact either the Verifier or the Credential Authority to build a Credential for this Key.</td>
          </tr>
          <tr>
            <td align="center">D</td>
            <td align="left">Key Store</td>
            <td align="left">Workload Owner</td>
            <td align="left">The Credential is generated and handed to the Workload by the Workload Owner. The Workload Owner stores the Credential Key in the Key Store. The Workload obtains the Credential Key from the Key Store after completing Remote Attestation.</td>
          </tr>
        </tbody>
      </table>
      <t>These options are illustrated below with sequence diagrams.</t>
      <section anchor="mechanism-a">
        <name>Mechanism A</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="688" width="600" viewBox="0 0 600 688" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,624 L 8,656" fill="none" stroke="black"/>
              <path d="M 64,64 L 64,96" fill="none" stroke="black"/>
              <path d="M 64,128 L 64,432" fill="none" stroke="black"/>
              <path d="M 64,512 L 64,528" fill="none" stroke="black"/>
              <path d="M 64,592 L 64,624" fill="none" stroke="black"/>
              <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
              <path d="M 128,624 L 128,656" fill="none" stroke="black"/>
              <path d="M 160,160 L 160,176" fill="none" stroke="black"/>
              <path d="M 168,224 L 168,240" fill="none" stroke="black"/>
              <path d="M 168,288 L 168,304" fill="none" stroke="black"/>
              <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
              <path d="M 200,624 L 200,656" fill="none" stroke="black"/>
              <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
              <path d="M 264,128 L 264,624" fill="none" stroke="black"/>
              <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
              <path d="M 320,624 L 320,656" fill="none" stroke="black"/>
              <path d="M 360,368 L 360,384" fill="none" stroke="black"/>
              <path d="M 360,416 L 360,432" fill="none" stroke="black"/>
              <path d="M 384,512 L 384,528" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
              <path d="M 392,624 L 392,656" fill="none" stroke="black"/>
              <path d="M 496,64 L 496,96" fill="none" stroke="black"/>
              <path d="M 496,128 L 496,624" fill="none" stroke="black"/>
              <path d="M 592,32 L 592,64" fill="none" stroke="black"/>
              <path d="M 592,96 L 592,128" fill="none" stroke="black"/>
              <path d="M 592,624 L 592,656" fill="none" stroke="black"/>
              <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
              <path d="M 200,32 L 320,32" fill="none" stroke="black"/>
              <path d="M 392,32 L 592,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 128,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 320,64" fill="none" stroke="black"/>
              <path d="M 392,64 L 592,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 592,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 592,128" fill="none" stroke="black"/>
              <path d="M 64,160 L 160,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 160,176" fill="none" stroke="black"/>
              <path d="M 64,224 L 168,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 168,240" fill="none" stroke="black"/>
              <path d="M 64,288 L 168,288" fill="none" stroke="black"/>
              <path d="M 72,304 L 168,304" fill="none" stroke="black"/>
              <path d="M 64,336 L 256,336" fill="none" stroke="black"/>
              <path d="M 264,368 L 360,368" fill="none" stroke="black"/>
              <path d="M 272,384 L 360,384" fill="none" stroke="black"/>
              <path d="M 264,416 L 360,416" fill="none" stroke="black"/>
              <path d="M 272,432 L 360,432" fill="none" stroke="black"/>
              <path d="M 264,480 L 488,480" fill="none" stroke="black"/>
              <path d="M 384,512 L 496,512" fill="none" stroke="black"/>
              <path d="M 384,528 L 488,528" fill="none" stroke="black"/>
              <path d="M 272,576 L 496,576" fill="none" stroke="black"/>
              <path d="M 72,608 L 264,608" fill="none" stroke="black"/>
              <path d="M 8,624 L 128,624" fill="none" stroke="black"/>
              <path d="M 200,624 L 320,624" fill="none" stroke="black"/>
              <path d="M 392,624 L 592,624" fill="none" stroke="black"/>
              <path d="M 8,656 L 128,656" fill="none" stroke="black"/>
              <path d="M 200,656 L 320,656" fill="none" stroke="black"/>
              <path d="M 392,656 L 592,656" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="496,528 484,522.4 484,533.6" fill="black" transform="rotate(0,488,528)"/>
              <polygon class="arrowhead" points="496,480 484,474.4 484,485.6" fill="black" transform="rotate(0,488,480)"/>
              <polygon class="arrowhead" points="280,576 268,570.4 268,581.6" fill="black" transform="rotate(180,272,576)"/>
              <polygon class="arrowhead" points="280,432 268,426.4 268,437.6" fill="black" transform="rotate(180,272,432)"/>
              <polygon class="arrowhead" points="280,384 268,378.4 268,389.6" fill="black" transform="rotate(180,272,384)"/>
              <polygon class="arrowhead" points="264,336 252,330.4 252,341.6" fill="black" transform="rotate(0,256,336)"/>
              <polygon class="arrowhead" points="80,608 68,602.4 68,613.6" fill="black" transform="rotate(180,72,608)"/>
              <polygon class="arrowhead" points="80,304 68,298.4 68,309.6" fill="black" transform="rotate(180,72,304)"/>
              <polygon class="arrowhead" points="80,240 68,234.4 68,245.6" fill="black" transform="rotate(180,72,240)"/>
              <polygon class="arrowhead" points="80,176 68,170.4 68,181.6" fill="black" transform="rotate(180,72,176)"/>
              <g class="text">
                <text x="68" y="52">Workload</text>
                <text x="260" y="52">Verifier</text>
                <text x="452" y="52">Credential</text>
                <text x="536" y="52">Authority</text>
                <text x="212" y="116">Credential</text>
                <text x="304" y="116">Acquisition</text>
                <text x="376" y="116">Phase</text>
                <text x="108" y="148">Generate</text>
                <text x="188" y="148">Credential</text>
                <text x="192" y="164">Key</text>
                <text x="100" y="196">Create</text>
                <text x="172" y="196">Credential</text>
                <text x="232" y="196">Req</text>
                <text x="92" y="212">(incl.</text>
                <text x="164" y="212">Credential</text>
                <text x="224" y="212">Key</text>
                <text x="212" y="228">Pop)</text>
                <text x="100" y="260">Create</text>
                <text x="164" y="260">Evidence</text>
                <text x="100" y="276">(incl.</text>
                <text x="172" y="276">Credential</text>
                <text x="236" y="276">Req)</text>
                <text x="104" y="324">Request</text>
                <text x="184" y="324">Attestation</text>
                <text x="124" y="356">(Evidence)</text>
                <text x="308" y="356">Appraise</text>
                <text x="380" y="356">Evidence</text>
                <text x="304" y="404">Compute</text>
                <text x="380" y="404">Credential</text>
                <text x="412" y="420">Attributes</text>
                <text x="64" y="452">│</text>
                <text x="304" y="452">Request</text>
                <text x="380" y="452">Credential</text>
                <text x="64" y="468">│</text>
                <text x="320" y="468">(Credential</text>
                <text x="388" y="468">Req+</text>
                <text x="440" y="468">Attrib)</text>
                <text x="64" y="484">│</text>
                <text x="64" y="500">│</text>
                <text x="316" y="500">Create</text>
                <text x="352" y="500">&amp;</text>
                <text x="380" y="500">Sign</text>
                <text x="444" y="500">Credential</text>
                <text x="64" y="548">│</text>
                <text x="64" y="564">│</text>
                <text x="308" y="564">Return</text>
                <text x="380" y="564">Credential</text>
                <text x="64" y="580">│</text>
                <text x="140" y="580">Return</text>
                <text x="212" y="580">Credential</text>
                <text x="84" y="596">in</text>
                <text x="144" y="596">Attestation</text>
                <text x="224" y="596">Results</text>
                <text x="68" y="644">Workload</text>
                <text x="260" y="644">Verifier</text>
                <text x="452" y="644">Credential</text>
                <text x="536" y="644">Authority</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
    +--------------+        +--------------+        +------------------------+
    |   Workload   |        |   Verifier   |        |  Credential Authority  |
    +------+-------+        +-------+------+        +------------+-----------+
           |                        |                            |
    .------+------------------------+----------------------------+-----------.
    |                    Credential Acquisition Phase                        |
    +------+------------------------+----------------------------+-----------+
           | Generate Credential    |                            |
           +-----------+  Key       |                            |
           +<----------+            |                            |
           | Create Credential Req  |                            |
           |(incl. Credential Key   |                            |
           +------------+   Pop)    |                            |
           +<-----------+           |                            |
           | Create Evidence        |                            |
           | (incl. Credential Req) |                            |
           +------------+           |                            |
           +<-----------+           |                            |
           | Request Attestation    |                            |
           +----------------------->|                            |
           |  (Evidence)            | Appraise Evidence          |
           |                        +-----------+                |
           |                        |<----------+                |
           |                        | Compute Credential         |
           |                        +-----------+ Attributes     |
           |                        +<----------+                |
           │                        | Request Credential         |
           │                        | (Credential Req+ Attrib)   |
           │                        +--------------------------->+
           │                        |   Create & Sign Credential |
           |                        |              +-------------+ 
           |                        |              +------------>+
           │                        |                            |
           │                        |  Return Credential         |
           │      Return Credential +<---------------------------+
           | in Attestation Results |                            |
           +<-----------------------+                            |  
    +------+-------+        +-------+------+        +------------+-----------+
    |   Workload   |        |   Verifier   |        |  Credential Authority  |
    +--------------+        +--------------+        +------------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="mechanism-b">
        <name>Mechanism B</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="640" viewBox="0 0 640 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,688 L 8,720" fill="none" stroke="black"/>
              <path d="M 64,64 L 64,96" fill="none" stroke="black"/>
              <path d="M 64,160 L 64,176" fill="none" stroke="black"/>
              <path d="M 64,208 L 64,240" fill="none" stroke="black"/>
              <path d="M 64,304 L 64,320" fill="none" stroke="black"/>
              <path d="M 64,352 L 64,400" fill="none" stroke="black"/>
              <path d="M 64,464 L 64,496" fill="none" stroke="black"/>
              <path d="M 64,576 L 64,592" fill="none" stroke="black"/>
              <path d="M 64,624 L 64,656" fill="none" stroke="black"/>
              <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
              <path d="M 128,688 L 128,720" fill="none" stroke="black"/>
              <path d="M 168,160 L 168,176" fill="none" stroke="black"/>
              <path d="M 168,224 L 168,240" fill="none" stroke="black"/>
              <path d="M 168,480 L 168,496" fill="none" stroke="black"/>
              <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
              <path d="M 200,688 L 200,720" fill="none" stroke="black"/>
              <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
              <path d="M 264,160 L 264,272" fill="none" stroke="black"/>
              <path d="M 264,304 L 264,688" fill="none" stroke="black"/>
              <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
              <path d="M 320,688 L 320,720" fill="none" stroke="black"/>
              <path d="M 368,304 L 368,320" fill="none" stroke="black"/>
              <path d="M 368,368 L 368,384" fill="none" stroke="black"/>
              <path d="M 384,576 L 384,592" fill="none" stroke="black"/>
              <path d="M 384,624 L 384,640" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
              <path d="M 392,688 L 392,720" fill="none" stroke="black"/>
              <path d="M 496,64 L 496,96" fill="none" stroke="black"/>
              <path d="M 496,128 L 496,688" fill="none" stroke="black"/>
              <path d="M 592,32 L 592,64" fill="none" stroke="black"/>
              <path d="M 592,96 L 592,128" fill="none" stroke="black"/>
              <path d="M 592,688 L 592,720" fill="none" stroke="black"/>
              <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
              <path d="M 200,32 L 320,32" fill="none" stroke="black"/>
              <path d="M 392,32 L 592,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 128,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 320,64" fill="none" stroke="black"/>
              <path d="M 392,64 L 592,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 592,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 592,128" fill="none" stroke="black"/>
              <path d="M 64,160 L 168,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 64,224 L 168,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 168,240" fill="none" stroke="black"/>
              <path d="M 64,272 L 256,272" fill="none" stroke="black"/>
              <path d="M 264,304 L 368,304" fill="none" stroke="black"/>
              <path d="M 272,320 L 368,320" fill="none" stroke="black"/>
              <path d="M 264,368 L 368,368" fill="none" stroke="black"/>
              <path d="M 272,384 L 368,384" fill="none" stroke="black"/>
              <path d="M 72,432 L 264,432" fill="none" stroke="black"/>
              <path d="M 64,480 L 168,480" fill="none" stroke="black"/>
              <path d="M 72,496 L 168,496" fill="none" stroke="black"/>
              <path d="M 64,528 L 488,528" fill="none" stroke="black"/>
              <path d="M 384,576 L 496,576" fill="none" stroke="black"/>
              <path d="M 384,592 L 488,592" fill="none" stroke="black"/>
              <path d="M 384,624 L 496,624" fill="none" stroke="black"/>
              <path d="M 384,640 L 488,640" fill="none" stroke="black"/>
              <path d="M 72,672 L 496,672" fill="none" stroke="black"/>
              <path d="M 8,688 L 128,688" fill="none" stroke="black"/>
              <path d="M 200,688 L 320,688" fill="none" stroke="black"/>
              <path d="M 392,688 L 592,688" fill="none" stroke="black"/>
              <path d="M 8,720 L 128,720" fill="none" stroke="black"/>
              <path d="M 200,720 L 320,720" fill="none" stroke="black"/>
              <path d="M 392,720 L 592,720" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="496,640 484,634.4 484,645.6" fill="black" transform="rotate(0,488,640)"/>
              <polygon class="arrowhead" points="496,592 484,586.4 484,597.6" fill="black" transform="rotate(0,488,592)"/>
              <polygon class="arrowhead" points="496,528 484,522.4 484,533.6" fill="black" transform="rotate(0,488,528)"/>
              <polygon class="arrowhead" points="280,384 268,378.4 268,389.6" fill="black" transform="rotate(180,272,384)"/>
              <polygon class="arrowhead" points="280,320 268,314.4 268,325.6" fill="black" transform="rotate(180,272,320)"/>
              <polygon class="arrowhead" points="264,272 252,266.4 252,277.6" fill="black" transform="rotate(0,256,272)"/>
              <polygon class="arrowhead" points="80,672 68,666.4 68,677.6" fill="black" transform="rotate(180,72,672)"/>
              <polygon class="arrowhead" points="80,496 68,490.4 68,501.6" fill="black" transform="rotate(180,72,496)"/>
              <polygon class="arrowhead" points="80,432 68,426.4 68,437.6" fill="black" transform="rotate(180,72,432)"/>
              <polygon class="arrowhead" points="80,240 68,234.4 68,245.6" fill="black" transform="rotate(180,72,240)"/>
              <polygon class="arrowhead" points="80,176 68,170.4 68,181.6" fill="black" transform="rotate(180,72,176)"/>
              <g class="text">
                <text x="68" y="52">Workload</text>
                <text x="260" y="52">Verifier</text>
                <text x="452" y="52">Credential</text>
                <text x="536" y="52">Authority</text>
                <text x="212" y="116">Credential</text>
                <text x="304" y="116">Acquisition</text>
                <text x="376" y="116">Phase</text>
                <text x="64" y="148">│</text>
                <text x="108" y="148">Generate</text>
                <text x="188" y="148">Credential</text>
                <text x="248" y="148">Key</text>
                <text x="64" y="196">│</text>
                <text x="100" y="196">Create</text>
                <text x="164" y="196">Evidence</text>
                <text x="100" y="212">(incl.</text>
                <text x="172" y="212">Credential</text>
                <text x="232" y="212">Key</text>
                <text x="204" y="228">PoP)</text>
                <text x="64" y="260">│</text>
                <text x="104" y="260">Request</text>
                <text x="184" y="260">Attestation</text>
                <text x="64" y="292">│</text>
                <text x="116" y="292">(Evidence)</text>
                <text x="300" y="292">Appraise</text>
                <text x="372" y="292">Evidence</text>
                <text x="64" y="340">│</text>
                <text x="304" y="340">Compute</text>
                <text x="384" y="340">Attestation</text>
                <text x="304" y="356">Results</text>
                <text x="228" y="404">Return</text>
                <text x="64" y="420">│</text>
                <text x="144" y="420">Attestation</text>
                <text x="224" y="420">Results</text>
                <text x="64" y="436">+</text>
                <text x="64" y="452">│</text>
                <text x="100" y="452">Create</text>
                <text x="172" y="452">Credential</text>
                <text x="236" y="452">Req.</text>
                <text x="100" y="468">(incl.</text>
                <text x="172" y="468">Credential</text>
                <text x="232" y="468">Key</text>
                <text x="192" y="484">Pop</text>
                <text x="216" y="484">&amp;</text>
                <text x="240" y="484">AR)</text>
                <text x="64" y="516">│</text>
                <text x="104" y="516">Request</text>
                <text x="180" y="516">Credential</text>
                <text x="244" y="516">(Cre</text>
                <text x="296" y="516">dential</text>
                <text x="364" y="516">Request)</text>
                <text x="632" y="516">|</text>
                <text x="64" y="548">│</text>
                <text x="296" y="548">Convert</text>
                <text x="376" y="548">Attestation</text>
                <text x="456" y="548">Results</text>
                <text x="64" y="564">│</text>
                <text x="300" y="564">to</text>
                <text x="356" y="564">Credential</text>
                <text x="444" y="564">Attributes</text>
                <text x="64" y="612">│</text>
                <text x="316" y="612">Create</text>
                <text x="352" y="612">&amp;</text>
                <text x="380" y="612">Sign</text>
                <text x="444" y="612">Credential</text>
                <text x="372" y="660">Return</text>
                <text x="444" y="660">Credential</text>
                <text x="64" y="676">│</text>
                <text x="68" y="708">Workload</text>
                <text x="260" y="708">Verifier</text>
                <text x="452" y="708">Credential</text>
                <text x="536" y="708">Authority</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
    +--------------+        +--------------+        +------------------------+
    |   Workload   |        |   Verifier   |        |  Credential Authority  |
    +------+-------+        +-------+------+        +------------+-----------+
           |                        |                            |
    .------+------------------------+----------------------------+-----------.
    |                    Credential Acquisition Phase                        |
    +------+------------------------+----------------------------+-----------+
           │ Generate Credential Key                             |
           +------------+           |                            |
           +<-----------+           |                            |
           │ Create Evidence        |                            |
           | (incl. Credential Key  |                            |
           +------------+  PoP)     |                            |
           +<-----------+           |                            |
           │ Request Attestation    |                            |
           +----------------------->+                            |
           │ (Evidence)              Appraise Evidence           |
           |                        +------------+               |
           |                        +<-----------+               |
           │                        | Compute Attestation        |
           |                        | Results                    |
           |                        +------------+               |
           |                        +<-----------+               |
           |                 Return |                            |
           │    Attestation Results |                            |
           +<-----------------------+                            |
           │ Create Credential Req. |                            |
           | (incl. Credential Key  |                            |
           +------------+ Pop & AR) |                            |
           +<-----------+           |                            |
           │ Request Credential (Cre|dential Request)            |                |
           +------------------------+--------------------------->+
           │                        |Convert Attestation Results |
           │                        |   to Credential Attributes |
           |                        |              +-------------+
           |                        |              +------------>|
           │                        |   Create & Sign Credential |
           |                        |              +-------------+
           |                        |              +------------>|
           |                        |          Return Credential |
           │<-----------------------+----------------------------+
    +------+-------+        +-------+------+        +------------+-----------+
    |   Workload   |        |   Verifier   |        |  Credential Authority  |
    +------+-------+        +--------------+        +------------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="mechanism-c">
        <name>Mechanism C</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="640" viewBox="0 0 640 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,704 L 8,736" fill="none" stroke="black"/>
              <path d="M 64,64 L 64,96" fill="none" stroke="black"/>
              <path d="M 64,160 L 64,176" fill="none" stroke="black"/>
              <path d="M 64,208 L 64,240" fill="none" stroke="black"/>
              <path d="M 64,272 L 64,320" fill="none" stroke="black"/>
              <path d="M 64,384 L 64,400" fill="none" stroke="black"/>
              <path d="M 64,448 L 64,464" fill="none" stroke="black"/>
              <path d="M 64,496 L 64,512" fill="none" stroke="black"/>
              <path d="M 64,560 L 64,608" fill="none" stroke="black"/>
              <path d="M 64,640 L 64,656" fill="none" stroke="black"/>
              <path d="M 64,688 L 64,704" fill="none" stroke="black"/>
              <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
              <path d="M 128,704 L 128,736" fill="none" stroke="black"/>
              <path d="M 168,160 L 168,176" fill="none" stroke="black"/>
              <path d="M 168,224 L 168,240" fill="none" stroke="black"/>
              <path d="M 168,272 L 168,304" fill="none" stroke="black"/>
              <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
              <path d="M 200,704 L 200,736" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 304,704" fill="none" stroke="black"/>
              <path d="M 400,32 L 400,64" fill="none" stroke="black"/>
              <path d="M 400,704 L 400,736" fill="none" stroke="black"/>
              <path d="M 408,592 L 408,608" fill="none" stroke="black"/>
              <path d="M 408,640 L 408,656" fill="none" stroke="black"/>
              <path d="M 424,448 L 424,464" fill="none" stroke="black"/>
              <path d="M 424,496 L 424,512" fill="none" stroke="black"/>
              <path d="M 472,32 L 472,64" fill="none" stroke="black"/>
              <path d="M 472,704 L 472,736" fill="none" stroke="black"/>
              <path d="M 536,64 L 536,96" fill="none" stroke="black"/>
              <path d="M 536,128 L 536,336" fill="none" stroke="black"/>
              <path d="M 536,368 L 536,704" fill="none" stroke="black"/>
              <path d="M 592,32 L 592,64" fill="none" stroke="black"/>
              <path d="M 592,704 L 592,736" fill="none" stroke="black"/>
              <path d="M 632,96 L 632,128" fill="none" stroke="black"/>
              <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
              <path d="M 200,32 L 400,32" fill="none" stroke="black"/>
              <path d="M 472,32 L 592,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 128,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 400,64" fill="none" stroke="black"/>
              <path d="M 472,64 L 592,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 632,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 632,128" fill="none" stroke="black"/>
              <path d="M 64,160 L 168,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 64,224 L 168,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 168,240" fill="none" stroke="black"/>
              <path d="M 64,272 L 176,272" fill="none" stroke="black"/>
              <path d="M 72,304 L 168,304" fill="none" stroke="black"/>
              <path d="M 64,352 L 296,352" fill="none" stroke="black"/>
              <path d="M 304,416 L 528,416" fill="none" stroke="black"/>
              <path d="M 424,448 L 536,448" fill="none" stroke="black"/>
              <path d="M 424,464 L 528,464" fill="none" stroke="black"/>
              <path d="M 424,496 L 536,496" fill="none" stroke="black"/>
              <path d="M 424,512 L 528,512" fill="none" stroke="black"/>
              <path d="M 312,544 L 536,544" fill="none" stroke="black"/>
              <path d="M 304,592 L 408,592" fill="none" stroke="black"/>
              <path d="M 312,608 L 408,608" fill="none" stroke="black"/>
              <path d="M 304,640 L 408,640" fill="none" stroke="black"/>
              <path d="M 312,656 L 408,656" fill="none" stroke="black"/>
              <path d="M 72,688 L 304,688" fill="none" stroke="black"/>
              <path d="M 8,704 L 128,704" fill="none" stroke="black"/>
              <path d="M 200,704 L 400,704" fill="none" stroke="black"/>
              <path d="M 472,704 L 592,704" fill="none" stroke="black"/>
              <path d="M 8,736 L 128,736" fill="none" stroke="black"/>
              <path d="M 200,736 L 400,736" fill="none" stroke="black"/>
              <path d="M 472,736 L 592,736" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="536,512 524,506.4 524,517.6" fill="black" transform="rotate(0,528,512)"/>
              <polygon class="arrowhead" points="536,464 524,458.4 524,469.6" fill="black" transform="rotate(0,528,464)"/>
              <polygon class="arrowhead" points="536,416 524,410.4 524,421.6" fill="black" transform="rotate(0,528,416)"/>
              <polygon class="arrowhead" points="320,656 308,650.4 308,661.6" fill="black" transform="rotate(180,312,656)"/>
              <polygon class="arrowhead" points="320,608 308,602.4 308,613.6" fill="black" transform="rotate(180,312,608)"/>
              <polygon class="arrowhead" points="320,544 308,538.4 308,549.6" fill="black" transform="rotate(180,312,544)"/>
              <polygon class="arrowhead" points="304,352 292,346.4 292,357.6" fill="black" transform="rotate(0,296,352)"/>
              <polygon class="arrowhead" points="80,688 68,682.4 68,693.6" fill="black" transform="rotate(180,72,688)"/>
              <polygon class="arrowhead" points="80,304 68,298.4 68,309.6" fill="black" transform="rotate(180,72,304)"/>
              <polygon class="arrowhead" points="80,240 68,234.4 68,245.6" fill="black" transform="rotate(180,72,240)"/>
              <polygon class="arrowhead" points="80,176 68,170.4 68,181.6" fill="black" transform="rotate(180,72,176)"/>
              <g class="text">
                <text x="68" y="52">Workload</text>
                <text x="268" y="52">Credential</text>
                <text x="352" y="52">Authority</text>
                <text x="532" y="52">Verifier</text>
                <text x="212" y="116">Credential</text>
                <text x="304" y="116">Acquisition</text>
                <text x="376" y="116">Phase</text>
                <text x="64" y="148">│</text>
                <text x="108" y="148">Generate</text>
                <text x="188" y="148">Credential</text>
                <text x="248" y="148">Key</text>
                <text x="64" y="196">│</text>
                <text x="100" y="196">Create</text>
                <text x="164" y="196">Evidence</text>
                <text x="100" y="212">(incl.</text>
                <text x="172" y="212">Credential</text>
                <text x="232" y="212">Key</text>
                <text x="204" y="228">PoP)</text>
                <text x="64" y="260">│</text>
                <text x="100" y="260">Create</text>
                <text x="172" y="260">Credential</text>
                <text x="248" y="260">Request</text>
                <text x="216" y="276">Evidence,</text>
                <text x="212" y="292">Credential</text>
                <text x="184" y="308">Key</text>
                <text x="220" y="308">PoP)</text>
                <text x="64" y="340">│</text>
                <text x="104" y="340">Request</text>
                <text x="180" y="340">Credential</text>
                <text x="536" y="356">│</text>
                <text x="64" y="372">│</text>
                <text x="120" y="372">(Credential</text>
                <text x="204" y="372">Request)</text>
                <text x="344" y="372">Request</text>
                <text x="424" y="372">Attestation</text>
                <text x="352" y="388">(Evidence</text>
                <text x="412" y="388">from</text>
                <text x="364" y="404">Credential</text>
                <text x="444" y="404">Request)</text>
                <text x="64" y="420">│</text>
                <text x="64" y="436">│</text>
                <text x="420" y="436">Appraise</text>
                <text x="492" y="436">Evidence</text>
                <text x="64" y="484">│</text>
                <text x="344" y="484">Compute</text>
                <text x="424" y="484">Attestation</text>
                <text x="504" y="484">Results</text>
                <text x="64" y="532">│</text>
                <text x="340" y="532">Return</text>
                <text x="416" y="532">Attestation</text>
                <text x="496" y="532">Results</text>
                <text x="64" y="548">│</text>
                <text x="336" y="580">Compute</text>
                <text x="412" y="580">Credential</text>
                <text x="484" y="580">Attrib</text>
                <text x="440" y="596">(from</text>
                <text x="480" y="596">AR)</text>
                <text x="64" y="628">│</text>
                <text x="340" y="628">Create</text>
                <text x="376" y="628">&amp;</text>
                <text x="404" y="628">Sign</text>
                <text x="468" y="628">Credential</text>
                <text x="64" y="676">│</text>
                <text x="180" y="676">Return</text>
                <text x="252" y="676">Credential</text>
                <text x="68" y="724">Workload</text>
                <text x="268" y="724">Credential</text>
                <text x="352" y="724">Authority</text>
                <text x="532" y="724">Verifier</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
    +--------------+        +------------------------+        +--------------+     
    |   Workload   |        |   Credential Authority |        |   Verifier   |
    +------+-------+        +------------+-----------+        +-------+------+
           |                             |                            |
    .------+-----------------------------+----------------------------+-----------.
    |                    Credential Acquisition Phase                             |
    +------+-----------------------------+----------------------------+-----------+
           │ Generate Credential Key     |                            |
           +------------+                |                            |
           +<-----------+                |                            |
           │ Create Evidence             |                            |
           | (incl. Credential Key       |                            |
           +------------+  PoP)          |                            |
           +<-----------+                |                            |
           │ Create Credential Request   |                            |
           +------------+(Evidence,      |                            |
           |            |Credential      |                            |
           +<-----------+Key PoP)        |                            |
           |                             |                            |
           │ Request Credential          |                            |
           +---------------------------->+                            │
           │ (Credential Request)        | Request Attestation        |
           |                             | (Evidence from             |
           |                             |  Credential Request)       |
           │                             +--------------------------->+
           │                             |          Appraise Evidence |
           |                             |              +-------------+
           |                             |              +------------>+
           │                             | Compute Attestation Results|
           |                             |              +-------------+
           |                             |              +------------>+
           │                             | Return Attestation Results |
           │                             +<---------------------------+
           |                             |                            |
           |                             |Compute Credential Attrib   |
           |                             +------------+ (from AR)     |
           |                             +<-----------+               |
           │                             | Create & Sign Credential   |
           |                             +------------+               |
           |                             +<-----------+               |
           │           Return Credential |                            |
           +<----------------------------+                            |
    +------+-------+        +------------+-----------+        +-------+------+
    |   Workload   |        |   Credential Authority |        |   Verifier   |
    +------+-------+        +------------+-----------+        +-------+------+
]]></artwork>
        </artset>
      </section>
      <section anchor="mechanisms-d">
        <name>Mechanisms D</name>
        <t>Mechanism D consists of a "Credential Provisioning" phase followed by the "Credential Acquisition" phase.</t>
        <section anchor="credential-provisioning-phase">
          <name>Credential Provisioning Phase</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="760" viewBox="0 0 760 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 8,704 L 8,736" fill="none" stroke="black"/>
                <path d="M 16,96 L 16,128" fill="none" stroke="black"/>
                <path d="M 88,64 L 88,96" fill="none" stroke="black"/>
                <path d="M 88,160 L 88,192" fill="none" stroke="black"/>
                <path d="M 88,224 L 88,256" fill="none" stroke="black"/>
                <path d="M 88,288 L 88,304" fill="none" stroke="black"/>
                <path d="M 88,336 L 88,368" fill="none" stroke="black"/>
                <path d="M 88,400 L 88,416" fill="none" stroke="black"/>
                <path d="M 88,496 L 88,512" fill="none" stroke="black"/>
                <path d="M 88,608 L 88,624" fill="none" stroke="black"/>
                <path d="M 88,656 L 88,704" fill="none" stroke="black"/>
                <path d="M 160,32 L 160,64" fill="none" stroke="black"/>
                <path d="M 160,704 L 160,736" fill="none" stroke="black"/>
                <path d="M 192,176 L 192,192" fill="none" stroke="black"/>
                <path d="M 192,240 L 192,256" fill="none" stroke="black"/>
                <path d="M 216,32 L 216,64" fill="none" stroke="black"/>
                <path d="M 216,704 L 216,736" fill="none" stroke="black"/>
                <path d="M 272,64 L 272,96" fill="none" stroke="black"/>
                <path d="M 272,176 L 272,192" fill="none" stroke="black"/>
                <path d="M 272,240 L 272,256" fill="none" stroke="black"/>
                <path d="M 272,336 L 272,368" fill="none" stroke="black"/>
                <path d="M 272,448 L 272,512" fill="none" stroke="black"/>
                <path d="M 272,688 L 272,704" fill="none" stroke="black"/>
                <path d="M 328,32 L 328,64" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,64" fill="none" stroke="black"/>
                <path d="M 384,704 L 384,736" fill="none" stroke="black"/>
                <path d="M 440,64 L 440,96" fill="none" stroke="black"/>
                <path d="M 440,128 L 440,144" fill="none" stroke="black"/>
                <path d="M 440,176 L 440,208" fill="none" stroke="black"/>
                <path d="M 440,240 L 440,304" fill="none" stroke="black"/>
                <path d="M 440,336 L 440,416" fill="none" stroke="black"/>
                <path d="M 440,496 L 440,544" fill="none" stroke="black"/>
                <path d="M 440,608 L 440,704" fill="none" stroke="black"/>
                <path d="M 496,32 L 496,64" fill="none" stroke="black"/>
                <path d="M 496,704 L 496,736" fill="none" stroke="black"/>
                <path d="M 536,608 L 536,624" fill="none" stroke="black"/>
                <path d="M 544,352 L 544,368" fill="none" stroke="black"/>
                <path d="M 544,496 L 544,512" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,64" fill="none" stroke="black"/>
                <path d="M 552,704 L 552,736" fill="none" stroke="black"/>
                <path d="M 648,64 L 648,96" fill="none" stroke="black"/>
                <path d="M 648,128 L 648,272" fill="none" stroke="black"/>
                <path d="M 648,336 L 648,400" fill="none" stroke="black"/>
                <path d="M 648,496 L 648,512" fill="none" stroke="black"/>
                <path d="M 648,576 L 648,656" fill="none" stroke="black"/>
                <path d="M 648,688 L 648,704" fill="none" stroke="black"/>
                <path d="M 744,96 L 744,128" fill="none" stroke="black"/>
                <path d="M 752,32 L 752,64" fill="none" stroke="black"/>
                <path d="M 752,704 L 752,736" fill="none" stroke="black"/>
                <path d="M 8,32 L 160,32" fill="none" stroke="black"/>
                <path d="M 216,32 L 328,32" fill="none" stroke="black"/>
                <path d="M 384,32 L 496,32" fill="none" stroke="black"/>
                <path d="M 552,32 L 752,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 160,64" fill="none" stroke="black"/>
                <path d="M 216,64 L 328,64" fill="none" stroke="black"/>
                <path d="M 384,64 L 496,64" fill="none" stroke="black"/>
                <path d="M 552,64 L 752,64" fill="none" stroke="black"/>
                <path d="M 16,96 L 744,96" fill="none" stroke="black"/>
                <path d="M 16,128 L 744,128" fill="none" stroke="black"/>
                <path d="M 88,176 L 192,176" fill="none" stroke="black"/>
                <path d="M 96,192 L 192,192" fill="none" stroke="black"/>
                <path d="M 88,240 L 192,240" fill="none" stroke="black"/>
                <path d="M 96,256 L 192,256" fill="none" stroke="black"/>
                <path d="M 88,304 L 432,304" fill="none" stroke="black"/>
                <path d="M 440,352 L 544,352" fill="none" stroke="black"/>
                <path d="M 448,368 L 544,368" fill="none" stroke="black"/>
                <path d="M 96,416 L 440,416" fill="none" stroke="black"/>
                <path d="M 88,448 L 432,448" fill="none" stroke="black"/>
                <path d="M 440,496 L 544,496" fill="none" stroke="black"/>
                <path d="M 448,512 L 544,512" fill="none" stroke="black"/>
                <path d="M 96,544 L 440,544" fill="none" stroke="black"/>
                <path d="M 88,576 L 640,576" fill="none" stroke="black"/>
                <path d="M 536,608 L 648,608" fill="none" stroke="black"/>
                <path d="M 536,624 L 640,624" fill="none" stroke="black"/>
                <path d="M 96,656 L 648,656" fill="none" stroke="black"/>
                <path d="M 88,688 L 264,688" fill="none" stroke="black"/>
                <path d="M 8,704 L 160,704" fill="none" stroke="black"/>
                <path d="M 216,704 L 328,704" fill="none" stroke="black"/>
                <path d="M 384,704 L 496,704" fill="none" stroke="black"/>
                <path d="M 552,704 L 752,704" fill="none" stroke="black"/>
                <path d="M 8,736 L 160,736" fill="none" stroke="black"/>
                <path d="M 216,736 L 328,736" fill="none" stroke="black"/>
                <path d="M 384,736 L 496,736" fill="none" stroke="black"/>
                <path d="M 552,736 L 752,736" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="648,624 636,618.4 636,629.6" fill="black" transform="rotate(0,640,624)"/>
                <polygon class="arrowhead" points="648,576 636,570.4 636,581.6" fill="black" transform="rotate(0,640,576)"/>
                <polygon class="arrowhead" points="456,512 444,506.4 444,517.6" fill="black" transform="rotate(180,448,512)"/>
                <polygon class="arrowhead" points="456,368 444,362.4 444,373.6" fill="black" transform="rotate(180,448,368)"/>
                <polygon class="arrowhead" points="440,448 428,442.4 428,453.6" fill="black" transform="rotate(0,432,448)"/>
                <polygon class="arrowhead" points="440,304 428,298.4 428,309.6" fill="black" transform="rotate(0,432,304)"/>
                <polygon class="arrowhead" points="272,688 260,682.4 260,693.6" fill="black" transform="rotate(0,264,688)"/>
                <polygon class="arrowhead" points="104,656 92,650.4 92,661.6" fill="black" transform="rotate(180,96,656)"/>
                <polygon class="arrowhead" points="104,544 92,538.4 92,549.6" fill="black" transform="rotate(180,96,544)"/>
                <polygon class="arrowhead" points="104,416 92,410.4 92,421.6" fill="black" transform="rotate(180,96,416)"/>
                <polygon class="arrowhead" points="104,256 92,250.4 92,261.6" fill="black" transform="rotate(180,96,256)"/>
                <polygon class="arrowhead" points="104,192 92,186.4 92,197.6" fill="black" transform="rotate(180,96,192)"/>
                <g class="text">
                  <text x="60" y="52">Workload</text>
                  <text x="120" y="52">Owner</text>
                  <text x="268" y="52">Workload</text>
                  <text x="416" y="52">Key</text>
                  <text x="456" y="52">Store</text>
                  <text x="612" y="52">Credential</text>
                  <text x="696" y="52">Authority</text>
                  <text x="316" y="116">Credential</text>
                  <text x="412" y="116">Provisioning</text>
                  <text x="488" y="116">Phase</text>
                  <text x="88" y="148">│</text>
                  <text x="124" y="148">Create</text>
                  <text x="188" y="148">Workload</text>
                  <text x="268" y="148">Identifier</text>
                  <text x="112" y="164">and</text>
                  <text x="172" y="164">Associated</text>
                  <text x="260" y="164">Credential</text>
                  <text x="348" y="164">Attributes</text>
                  <text x="440" y="164">│</text>
                  <text x="88" y="212">│</text>
                  <text x="124" y="212">Create</text>
                  <text x="196" y="212">Credential</text>
                  <text x="256" y="212">Key</text>
                  <text x="304" y="212">Release</text>
                  <text x="364" y="212">Policy</text>
                  <text x="120" y="228">based</text>
                  <text x="156" y="228">on</text>
                  <text x="204" y="228">Workload</text>
                  <text x="280" y="228">Reference</text>
                  <text x="348" y="228">Values</text>
                  <text x="440" y="228">│</text>
                  <text x="88" y="276">│</text>
                  <text x="124" y="276">Create</text>
                  <text x="196" y="276">Credential</text>
                  <text x="256" y="276">Key</text>
                  <text x="112" y="292">and</text>
                  <text x="144" y="292">Set</text>
                  <text x="176" y="292">Key</text>
                  <text x="224" y="292">Release</text>
                  <text x="284" y="292">Policy</text>
                  <text x="648" y="292">│</text>
                  <text x="648" y="308">│</text>
                  <text x="88" y="324">│</text>
                  <text x="272" y="324">│</text>
                  <text x="440" y="324">│</text>
                  <text x="484" y="324">Generate</text>
                  <text x="536" y="324">and</text>
                  <text x="576" y="324">Store</text>
                  <text x="644" y="324">Credential</text>
                  <text x="704" y="324">Key</text>
                  <text x="464" y="340">and</text>
                  <text x="496" y="340">Key</text>
                  <text x="544" y="340">Release</text>
                  <text x="604" y="340">Policy</text>
                  <text x="88" y="388">│</text>
                  <text x="140" y="388">Return</text>
                  <text x="196" y="388">Public</text>
                  <text x="256" y="388">Portion</text>
                  <text x="300" y="388">of</text>
                  <text x="356" y="388">Credential</text>
                  <text x="416" y="388">Key</text>
                  <text x="212" y="404">or</text>
                  <text x="268" y="404">Credential</text>
                  <text x="328" y="404">Key</text>
                  <text x="388" y="404">Identifier</text>
                  <text x="648" y="420">│</text>
                  <text x="88" y="436">│</text>
                  <text x="124" y="436">Create</text>
                  <text x="196" y="436">Credential</text>
                  <text x="272" y="436">Request</text>
                  <text x="440" y="436">│</text>
                  <text x="648" y="436">│</text>
                  <text x="440" y="452">+</text>
                  <text x="648" y="452">│</text>
                  <text x="88" y="468">│</text>
                  <text x="440" y="468">│</text>
                  <text x="476" y="468">Create</text>
                  <text x="548" y="468">Credential</text>
                  <text x="624" y="468">Request</text>
                  <text x="672" y="468">and</text>
                  <text x="88" y="484">│</text>
                  <text x="440" y="484">│</text>
                  <text x="468" y="484">Sign</text>
                  <text x="508" y="484">with</text>
                  <text x="560" y="484">Private</text>
                  <text x="636" y="484">Credential</text>
                  <text x="696" y="484">Key</text>
                  <text x="88" y="532">│</text>
                  <text x="252" y="532">Return</text>
                  <text x="324" y="532">Credential</text>
                  <text x="400" y="532">Request</text>
                  <text x="648" y="532">│</text>
                  <text x="88" y="548">+</text>
                  <text x="648" y="548">│</text>
                  <text x="88" y="564">│</text>
                  <text x="128" y="564">Request</text>
                  <text x="204" y="564">Credential</text>
                  <text x="296" y="564">(Credential</text>
                  <text x="380" y="564">Request,</text>
                  <text x="452" y="564">Workload</text>
                  <text x="528" y="564">Identity,</text>
                  <text x="612" y="564">Credential</text>
                  <text x="704" y="564">Attributes)</text>
                  <text x="88" y="596">│</text>
                  <text x="272" y="596">│</text>
                  <text x="452" y="596">Create</text>
                  <text x="496" y="596">and</text>
                  <text x="532" y="596">Sign</text>
                  <text x="596" y="596">Credential</text>
                  <text x="272" y="612">│</text>
                  <text x="272" y="628">│</text>
                  <text x="88" y="644">│</text>
                  <text x="272" y="644">│</text>
                  <text x="524" y="644">Return</text>
                  <text x="596" y="644">Credential</text>
                  <text x="128" y="676">Provide</text>
                  <text x="196" y="676">Workload</text>
                  <text x="252" y="676">with</text>
                  <text x="316" y="676">Credential</text>
                  <text x="648" y="676">│</text>
                  <text x="60" y="724">Workload</text>
                  <text x="120" y="724">Owner</text>
                  <text x="268" y="724">Workload</text>
                  <text x="328" y="724">│</text>
                  <text x="416" y="724">Key</text>
                  <text x="456" y="724">Store</text>
                  <text x="612" y="724">Credential</text>
                  <text x="696" y="724">Authority</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
    +------------------+      +-------------+      +-------------+      +------------------------+
    |  Workload Owner  |      |  Workload   |      |  Key Store  |      |  Credential Authority  |
    +---------+--------+      +------+------+      +------+------+      +-----------+------------+
              |                      |                    |                         |
     +--------+----------------------+--------------------+-------------------------+-----------+
     |                                Credential Provisioning Phase                             |
     +--------+----------------------+--------------------+-------------------------+-----------+
              │ Create Workload Identifier                |                         |
              | and Associated Credential Attributes      │                         |
              +------------+         |                    |                         |
              +<-----------+         |                    |                         |
              │ Create Credential Key Release Policy      |                         |
              | based on Workload Reference Values        │                         |
              +------------+         |                    |                         |
              +<-----------+         |                    |                         |
              │ Create Credential Key                     |                         |
              | and Set Key Release Policy                |                         │
              +------------------------------------------>+                         │
              │                      │                    │ Generate and Store Credential Key
              |                      |                    | and Key Release Policy  |
              |                      |                    +------------+            |
              |                      |                    +<-----------+            |
              │   Return Public Portion of Credential Key |                         |
              |              or Credential Key Identifier |                         |
              +<------------------------------------------+                         │
              │ Create Credential Request                 │                         │
              +----------------------+------------------->+                         │
              │                      |                    │ Create Credential Request and
              │                      |                    │ Sign with Private Credential Key
              |                      |                    +------------+            |
              |                      |                    +<-----------+            |
              │                 Return Credential Request |                         │
              +<---------------------+--------------------+                         │
              │ Request Credential (Credential Request, Workload Identity, Credential Attributes)
              +----------------------+--------------------------------------------->+
              │                      │                   Create and Sign Credential |
              |                      │                    |           +-------------+
              |                      │                    |           +------------>+
              │                      │                    |       Return Credential |
              +<---------------------+--------------------+-------------------------+
              | Provide Workload with Credential          |                         │
              +--------------------->+                    |                         |
    +---------+--------+      +------+------+      +------+------+      +-----------+------------+
    |  Workload Owner  |      |  Workload   │      |  Key Store  |      |  Credential Authority  |
    +------------------+      +-------------+      +-------------+      +------------------------+
]]></artwork>
          </artset>
        </section>
        <section anchor="credential-acquisition-phase">
          <name>Credential Acquisition Phase</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="720" width="560" viewBox="0 0 560 720" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
                <path d="M 8,656 L 8,688" fill="none" stroke="black"/>
                <path d="M 64,64 L 64,96" fill="none" stroke="black"/>
                <path d="M 64,160 L 64,176" fill="none" stroke="black"/>
                <path d="M 64,208 L 64,224" fill="none" stroke="black"/>
                <path d="M 64,288 L 64,304" fill="none" stroke="black"/>
                <path d="M 64,336 L 64,352" fill="none" stroke="black"/>
                <path d="M 64,384 L 64,416" fill="none" stroke="black"/>
                <path d="M 64,496 L 64,512" fill="none" stroke="black"/>
                <path d="M 64,544 L 64,560" fill="none" stroke="black"/>
                <path d="M 64,624 L 64,656" fill="none" stroke="black"/>
                <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
                <path d="M 128,656 L 128,688" fill="none" stroke="black"/>
                <path d="M 168,160 L 168,176" fill="none" stroke="black"/>
                <path d="M 168,208 L 168,224" fill="none" stroke="black"/>
                <path d="M 168,624 L 168,640" fill="none" stroke="black"/>
                <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
                <path d="M 200,656 L 200,688" fill="none" stroke="black"/>
                <path d="M 264,64 L 264,96" fill="none" stroke="black"/>
                <path d="M 264,160 L 264,304" fill="none" stroke="black"/>
                <path d="M 264,336 L 264,424" fill="none" stroke="black"/>
                <path d="M 264,496 L 264,512" fill="none" stroke="black"/>
                <path d="M 264,544 L 264,560" fill="none" stroke="black"/>
                <path d="M 264,592 L 264,656" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
                <path d="M 320,656 L 320,688" fill="none" stroke="black"/>
                <path d="M 344,496 L 344,512" fill="none" stroke="black"/>
                <path d="M 344,544 L 344,560" fill="none" stroke="black"/>
                <path d="M 368,288 L 368,304" fill="none" stroke="black"/>
                <path d="M 368,336 L 368,352" fill="none" stroke="black"/>
                <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
                <path d="M 392,656 L 392,688" fill="none" stroke="black"/>
                <path d="M 456,64 L 456,96" fill="none" stroke="black"/>
                <path d="M 456,160 L 456,240" fill="none" stroke="black"/>
                <path d="M 456,272 L 456,400" fill="none" stroke="black"/>
                <path d="M 456,432 L 456,560" fill="none" stroke="black"/>
                <path d="M 456,592 L 456,656" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,64" fill="none" stroke="black"/>
                <path d="M 552,96 L 552,128" fill="none" stroke="black"/>
                <path d="M 552,656 L 552,688" fill="none" stroke="black"/>
                <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
                <path d="M 200,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 392,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 128,64" fill="none" stroke="black"/>
                <path d="M 200,64 L 320,64" fill="none" stroke="black"/>
                <path d="M 392,64 L 552,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
                <path d="M 64,160 L 168,160" fill="none" stroke="black"/>
                <path d="M 72,176 L 168,176" fill="none" stroke="black"/>
                <path d="M 64,208 L 168,208" fill="none" stroke="black"/>
                <path d="M 72,224 L 168,224" fill="none" stroke="black"/>
                <path d="M 64,256 L 256,256" fill="none" stroke="black"/>
                <path d="M 264,288 L 368,288" fill="none" stroke="black"/>
                <path d="M 272,304 L 368,304" fill="none" stroke="black"/>
                <path d="M 264,336 L 368,336" fill="none" stroke="black"/>
                <path d="M 272,352 L 368,352" fill="none" stroke="black"/>
                <path d="M 72,416 L 264,416" fill="none" stroke="black"/>
                <path d="M 64,448 L 448,448" fill="none" stroke="black"/>
                <path d="M 344,496 L 456,496" fill="none" stroke="black"/>
                <path d="M 344,512 L 448,512" fill="none" stroke="black"/>
                <path d="M 344,544 L 456,544" fill="none" stroke="black"/>
                <path d="M 344,560 L 448,560" fill="none" stroke="black"/>
                <path d="M 72,592 L 456,592" fill="none" stroke="black"/>
                <path d="M 64,624 L 168,624" fill="none" stroke="black"/>
                <path d="M 72,640 L 168,640" fill="none" stroke="black"/>
                <path d="M 8,656 L 128,656" fill="none" stroke="black"/>
                <path d="M 200,656 L 320,656" fill="none" stroke="black"/>
                <path d="M 392,656 L 552,656" fill="none" stroke="black"/>
                <path d="M 8,688 L 128,688" fill="none" stroke="black"/>
                <path d="M 200,688 L 320,688" fill="none" stroke="black"/>
                <path d="M 392,688 L 552,688" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="456,560 444,554.4 444,565.6" fill="black" transform="rotate(0,448,560)"/>
                <polygon class="arrowhead" points="456,512 444,506.4 444,517.6" fill="black" transform="rotate(0,448,512)"/>
                <polygon class="arrowhead" points="456,448 444,442.4 444,453.6" fill="black" transform="rotate(0,448,448)"/>
                <polygon class="arrowhead" points="280,352 268,346.4 268,357.6" fill="black" transform="rotate(180,272,352)"/>
                <polygon class="arrowhead" points="280,304 268,298.4 268,309.6" fill="black" transform="rotate(180,272,304)"/>
                <polygon class="arrowhead" points="264,256 252,250.4 252,261.6" fill="black" transform="rotate(0,256,256)"/>
                <polygon class="arrowhead" points="80,640 68,634.4 68,645.6" fill="black" transform="rotate(180,72,640)"/>
                <polygon class="arrowhead" points="80,592 68,586.4 68,597.6" fill="black" transform="rotate(180,72,592)"/>
                <polygon class="arrowhead" points="80,416 68,410.4 68,421.6" fill="black" transform="rotate(180,72,416)"/>
                <polygon class="arrowhead" points="80,224 68,218.4 68,229.6" fill="black" transform="rotate(180,72,224)"/>
                <polygon class="arrowhead" points="80,176 68,170.4 68,181.6" fill="black" transform="rotate(180,72,176)"/>
                <g class="text">
                  <text x="68" y="52">Workload</text>
                  <text x="260" y="52">Verifier</text>
                  <text x="440" y="52">Key</text>
                  <text x="480" y="52">Store</text>
                  <text x="212" y="116">Credential</text>
                  <text x="304" y="116">Acquisition</text>
                  <text x="376" y="116">Phase</text>
                  <text x="64" y="148">│</text>
                  <text x="108" y="148">Generate</text>
                  <text x="188" y="148">Asymmetric</text>
                  <text x="276" y="148">Encryption</text>
                  <text x="336" y="148">Key</text>
                  <text x="456" y="148">│</text>
                  <text x="64" y="196">│</text>
                  <text x="108" y="196">Generate</text>
                  <text x="180" y="196">Evidence</text>
                  <text x="240" y="196">(incl</text>
                  <text x="272" y="196">.</text>
                  <text x="308" y="196">Public</text>
                  <text x="380" y="196">Encryption</text>
                  <text x="356" y="212">Key)</text>
                  <text x="64" y="244">│</text>
                  <text x="104" y="244">Request</text>
                  <text x="184" y="244">Attestation</text>
                  <text x="456" y="260">│</text>
                  <text x="64" y="276">│</text>
                  <text x="132" y="276">(Evidence)</text>
                  <text x="308" y="276">Appraise</text>
                  <text x="380" y="276">Evidence</text>
                  <text x="64" y="324">│</text>
                  <text x="264" y="324">│</text>
                  <text x="304" y="324">Compute</text>
                  <text x="384" y="324">Attestation</text>
                  <text x="408" y="340">Results</text>
                  <text x="64" y="372">│</text>
                  <text x="228" y="372">Return</text>
                  <text x="144" y="388">Attestation</text>
                  <text x="224" y="388">Results</text>
                  <text x="100" y="404">(incl.</text>
                  <text x="172" y="404">Encryption</text>
                  <text x="236" y="404">Key)</text>
                  <text x="456" y="420">│</text>
                  <text x="64" y="436">│</text>
                  <text x="104" y="436">Request</text>
                  <text x="180" y="436">Credential</text>
                  <text x="240" y="436">Key</text>
                  <text x="308" y="436">(Attestation</text>
                  <text x="396" y="436">Results)</text>
                  <text x="64" y="468">│</text>
                  <text x="252" y="468">Validate</text>
                  <text x="336" y="468">Attestation</text>
                  <text x="416" y="468">Results</text>
                  <text x="64" y="484">│</text>
                  <text x="176" y="484">against</text>
                  <text x="252" y="484">Credential</text>
                  <text x="312" y="484">Key</text>
                  <text x="360" y="484">Release</text>
                  <text x="420" y="484">Policy</text>
                  <text x="64" y="532">│</text>
                  <text x="152" y="532">Encrypt</text>
                  <text x="228" y="532">Credential</text>
                  <text x="288" y="532">Key</text>
                  <text x="316" y="532">to</text>
                  <text x="372" y="532">Encryption</text>
                  <text x="432" y="532">Key</text>
                  <text x="64" y="580">│</text>
                  <text x="220" y="580">Return</text>
                  <text x="288" y="580">Encrypted</text>
                  <text x="372" y="580">Credential</text>
                  <text x="432" y="580">Key</text>
                  <text x="456" y="580">│</text>
                  <text x="64" y="596">+</text>
                  <text x="64" y="612">│</text>
                  <text x="104" y="612">Decrypt</text>
                  <text x="180" y="612">Credential</text>
                  <text x="240" y="612">Key</text>
                  <text x="68" y="676">Workload</text>
                  <text x="260" y="676">Verifier</text>
                  <text x="440" y="676">Key</text>
                  <text x="480" y="676">Store</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
    +--------------+        +--------------+        +-------------------+
    |   Workload   |        |   Verifier   |        |    Key Store      |
    +------+-------+        +-------+------+        +-------+-----------+
           |                        |                       |
    .------+------------------------+-----------------------+-----------.
    |                    Credential Acquisition Phase                   |
    +------+------------------------+-----------------------+-----------+
           │ Generate Asymmetric Encryption Key             │
           +------------+           |                       |
           +<-----------+           |                       |
           │ Generate Evidence (incl+. Public Encryption    |
           +------------+           |         Key)          |
           |<-----------+           |                       |
           │ Request Attestation    |                       |
           +----------------------->+                       │
           │   (Evidence)           | Appraise Evidence     |
           |                        +------------+          |
           |                        +<-----------+          |
           │                        │ Compute Attestation   |
           |                        +------------+ Results  |
           |                        +<-----------+          |
           │                 Return |                       |
           |    Attestation Results |                       |
           | (incl. Encryption Key) |                       |
           +<-----------------------+                       │
           │ Request Credential Key (Attestation Results)   |
           +----------------------------------------------->+
           │                   Validate Attestation Results |
           │          against Credential Key Release Policy |
           |                        |         +-------------+
           |                        |         +------------>+
           │       Encrypt Credential Key to Encryption Key |
           |                        |         +-------------+
           |                        |         +------------>+
           │                Return Encrypted Credential Key │
           +<-----------------------+-----------------------+
           │ Decrypt Credential Key |                       |
           +------------+           |                       |
           +<-----------+           |                       |
    +------+-------+        +-------+------+        +-------+-----------+
    |   Workload   |        |   Verifier   |        |    Key Store      |
    +------+-------+        +-------+------+        +-------+-----------+
]]></artwork>
          </artset>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>All communications between entities (Workload to Credential Authority, Workload to Verifier etc) <bcp14>MUST</bcp14> be secured using mutually authenticated, confidential, and integrity-protected channels (e.g., TLS).</t>
      <t>In addition to the considerations herein, Verifier, which is a central point of anchor for Trustworthy Workload Identifer <bcp14>MUST</bcp14> follow the security guidance detailed in the "Security and Privacy considerations" as detailed in the RATS Architecture Section <xref target="RFC9334" section="11" sectionFormat="bare"/> and Section <xref target="RFC9334" section="12" sectionFormat="bare"/> of <xref target="RFC9334"/>.</t>
      <t>The credential key <bcp14>MUST</bcp14> always be stored securely at all time, for example in a secure element within the workload.</t>
    </section>
    <section anchor="pivacy-considerations">
      <name>Pivacy Considerations</name>
      <t>Remote Attestation of a Workload requires exchange of attestation related messages, for example, Evidence and Attestation Results. This can potentially leak sensitive information about the Workload.</t>
      <t>Confidentiality: Encryption could be used to prevent unauthorised parties from accessing sensitive information from Evidence or Attestation Results.
This is crucial in multi-tenant environments.
The Credential Key to be released to a Workload <bcp14>MUST</bcp14> always be encrypted to avoid potential leakage to unauthorised actors.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="I-D.draft-ietf-wimse-arch">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as a
   running instance of software executing for a specific purpose.  This
   document discusses an architecture for designing and standardizing
   protocols and payloads for conveying workload identity and security
   context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-06"/>
        </reference>
        <reference anchor="TWISIGCharter" target="https://github.com/confidential-computing/governance/blob/main/SIGs/TWI/TWI_Charter.md">
          <front>
            <title>Trustworthy Workload Identity (TWI) Special Interest Group — Charter</title>
            <author>
              <organization>Confidential Computing Consortium Trustworthy Workload Identity SIG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TWISIGReq" target="https://github.com/confidential-computing/twi/blob/main/TWI_Requirements.md">
          <front>
            <title>Trustworthy Workload Identity (TWI) Special Interest Group — Requirements</title>
            <author>
              <organization>Confidential Computing Consortium Trustworthy Workload Identity SIG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TWISIGDef" target="https://github.com/confidential-computing/twi/blob/main/TWI_Definitions.md">
          <front>
            <title>Trustworthy Workload Identity (TWI) Special Interest Group — Definitions</title>
            <author>
              <organization>Confidential Computing Consortium Trustworthy Workload Identity SIG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WIMSES2S" target="https://datatracker.ietf.org/doc/draft-ietf-wimse-s2s-protocol/">
          <front>
            <title>WIMSE Service-to-Service Protocol</title>
            <author>
              <organization>IETF</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 484?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The following persons, in no specific order, contributed to the work directly, participated in design team meetings, or provided valuable comments during the review of this document.</t>
      <t>Pieter Kasselman (SPIRL), Arieal Feldman (Google), Mateusz Bronk (Intel), Manu Fontaine (Hushmesh Inc.), Benedict Lau (EQTY Lab), Zvonko Kaiser (NVIDIA), David Quigley (Intel), Sal Kimmich (GadflyAI), Alex Dalton (Shielded Technologies), Eric Wolfe (Mainsail Industries), Nicolae Paladi(Canary Bit), Mark Gentry (JPMorgan Chase), Jag Raman (Oracle), Brian Hugenbruch (IBM), Jens Alberts (Fr0ntierX), Mira Spina (MITRE) and John Suykerbuyk.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
