<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zheng-agent-identity-management-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Agent Identity Managenment</title>
    <seriesInfo name="Internet-Draft" value="draft-zheng-agent-identity-management-00"/>
    <author initials="C." surname="Zheng" fullname="Chong Zheng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhengchong6@huawei.com</email>
      </address>
    </author>
    <author initials="B." surname="Liu" fullname="Bing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>leo.liubing@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="Q." surname="Gao" fullname="Qiangzhou Gao">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gaoqiangzhou@huawei.com</email>
      </address>
    </author>
    <author initials="X." surname="Shang" fullname="Xiaotong Shang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shangxiaotong@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>robinli314@163.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="02"/>
    <area>ART</area>
    <workgroup>artarea</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 72?>

<t>This document specifies agent identity management in the Internet of Agents (IOA) system. It defines the descriptive requirements for agent identities, the agent registration process, the structure and assignment of agent identifiers, and the basic and extended identity management functions performed by the agent gateway based on the agent's descriptive information.</t>
    </abstract>
  </front>
  <middle>
    <?line 76?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>As intelligent agents become increasingly prevalent in distributed and interoperable systems, robust identity management is essential to ensure secure, scalable, and policy-compliant operation. In the Internet of Agents (IOA) system, agents—ranging from simple automation scripts to high-intelligence autonomous entities—must be uniquely identified, authenticated, and governed throughout their lifecycle.</t>
      <t>This document outlines the foundational framework for agent identity management in the IOA system. It specifies the required descriptive attributes of an agent, the registration process with the agent gateway, the format and semantics of agent identifiers, and the basic and extended management capabilities enabled by the agent’s identity metadata. While security mechanisms such as authentication protocols and cryptographic binding are acknowledged as critical, their detailed specification is considered out of scope for this document.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="overview-of-the-agent-identity-management">
      <name>Overview of the Agent Identity Management</name>
      <t>The agent identity management architecture in the IOA system comprises four core functional modules: Agent Description, Agent Identity Registration, Agent Identity Management, and Security Considerations. First, an agent's identity information <bcp14>MUST</bcp14> be represented in a normalized form. The agent then registers this normalized identity description with an Agent Gateway. Upon successful authentication of the registering agent, the Agent Gateway assigns a unique Agent ID to the agent and, using the Agent ID as a key, enforces identity management policies based on the agent's normalized identity description.</t>
      <figure anchor="ref-to-fig1">
        <name>Agent identity management architecture</name>
        <artwork><![CDATA[
                  Agent Gateway
                  +-------------------------------------------+
                  |                                           |
                  | +-------------------------------------+   |
        /---------+-|          Identity Management        |<--+----------\
        |         | +++-----------------------------------+   |          |
        |         |  ||   +--------------------------+        |          |
        |         |  ||-->|Agent ID:Basic Managemnt  |        |          |
        |         |  |    +--------------------------+        |          |
        |         |  |   +---------------------------+        |          |
        |         |  |--->|Agent ID:Basic Managemnt  |        |          |
        |         |       +--------------------------+        |          |
        |         +-------------------------------------------+          |
        |                                                                |
        |<----------------Agent Identity Registion---------------------->|
        |                                                                |
        |        Agent                                                   |
        |         +----------------------------+                         |
        |         | +----------------------+   |                         |
        |         | |      Description     |---+-------------------------/
        |         | +++--------------------+   |
        |         |  ||  +-----------------+   |
        |         |  ||->|Basic Information|   |
        |         |  |   +-----------------+   |
        |         |  |   +------------------+  |
        |         |  |-->|Extend Information|  |
        |         |      +------------------+  |
        |         |                            |
        |         |      +-----------------+   |
        \---------+----->|    Agent ID     |   |
                  |      +-----------------+   |
                  +----------------------------+

]]></artwork>
      </figure>
    </section>
    <section anchor="agent-description-requirements">
      <name>Agent description Requirements</name>
      <t>To enable accurate agent identity management on the agent gateway, it is necessary to define a set of essential information elements for describing an agent.</t>
      <section anchor="basic-information">
        <name>Basic Information</name>
        <t>The agent description <bcp14>MUST</bcp14> include the following base information elements:</t>
        <ul spacing="normal">
          <li>
            <t>Agent name</t>
          </li>
          <li>
            <t>Agent capabilities/skills</t>
          </li>
          <li>
            <t>Agent author</t>
          </li>
          <li>
            <t>Agent version</t>
          </li>
          <li>
            <t>Agent creation time</t>
          </li>
          <li>
            <t>Agent description model version</t>
          </li>
          <li>
            <t>Agent location</t>
          </li>
          <li>
            <t>Agent communication protocol</t>
          </li>
          <li>
            <t>Agent description (human-readable)</t>
          </li>
          <li>
            <t>Agent signature</t>
          </li>
        </ul>
        <t>In addition, the following attributes <bcp14>MUST</bcp14> also be included as part of the base information:</t>
        <ul spacing="normal">
          <li>
            <t>Agent validity period</t>
          </li>
          <li>
            <t>Agent form factor</t>
          </li>
          <li>
            <t>Agent intelligence level</t>
          </li>
          <li>
            <t>Agent extended profile URI</t>
          </li>
          <li>
            <t>Agent role</t>
          </li>
          <li>
            <t>Translation enablement indicator</t>
          </li>
        </ul>
        <t>Usecases</t>
        <ul spacing="normal">
          <li>
            <t>Agent validity period: The validity period of an agent on the agent gateway specifies the time interval during which the agent is considered active and authorized for operation. The agent gateway <bcp14>MAY</bcp14> use this field to enforce publication and maintenance policies, automatically deactivating or removing expired or stale ("zombie") agents to reduce operational overhead and minimize the burden of agent lifecycle management.</t>
          </li>
          <li>
            <t>Agent form factor: The form of the agent, such as digital agent or embodied agent. The form field can support the interconnection of heterogeneous forms of agents in future IOA systems. For example, agent gateways may have different requirements for access authentication and policy control for agents of different forms. Communication protocols between agents of different forms may also differ.</t>
          </li>
          <li>
            <t>Agent intelligence level: The intelligence level of an agent can be defined using mainstream AI agent intelligence classification standards in the future. This will help application agents to select the final communication target among a group of candidate agents based on the required intelligence level. For example, when agents have the same capabilities, the one with a higher intelligence level can be chosen.</t>
          </li>
          <li>
            <t>Agent extended profile URI: The address accessible for the extended version of the agent. It helps to continuously and dynamically upgrade and update the agent during its online period on the extended version address.</t>
          </li>
          <li>
            <t>Agent role: The roles of agents include two types: consumer and producer. An agent can also assume both roles. This helps the agent gateway determine whether to establish a short connection or a long connection with the agent. It also assists the gateway in formulating control strategies when publishing agent information on the network, for example, by not publishing information for consumers who do not provide services.</t>
          </li>
          <li>
            <t>Translation enablement indicator: This field describes whether the agent message allows the gateway to perform message translation. It helps the agent gateway to translate heterogeneous protocol communications between agents while respecting the agent's preferences. For example, in scenarios where semantic translation might occur, the agent can use this field to protect its data privacy.</t>
          </li>
        </ul>
      </section>
      <section anchor="extended-information">
        <name>Extended Information</name>
        <t>The agent description <bcp14>SHOULD</bcp14> include the following extended information elements:</t>
        <ul spacing="normal">
          <li>
            <t>Network requirements</t>
          </li>
          <li>
            <t>Trust level</t>
          </li>
          <li>
            <t>Extension</t>
          </li>
        </ul>
        <t>Usecases</t>
        <ul spacing="normal">
          <li>
            <t>Network requirements: The requirements of agents for the network include three aspects: experience, monitoring, and security. These help the agent gateway implement on-demand QoS guarantee strategies (e.g., low latency assurance or high bandwidth assurance), security assurance strategies (e.g., path security, quantum encryption for communication), and agent task monitoring and maintenance strategies (e.g., agent task flow measurements at the stream level, packet level, segment level, and etc.).</t>
          </li>
          <li>
            <t>Trust level: The agent's permission scope defines the boundaries of its authorized operations and data access. This attribute enables the agent gateway to enforce fine-grained access control policies—for example, restricting agent data from leaving a specific administrative domain such as a campus or a country—thereby supporting regulatory compliance and data sovereignty requirements.</t>
          </li>
          <li>
            <t>Extension: An extensible information field is provided as a reserved mechanism to accommodate future dynamic attributes of the agent.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="agent-identity-registration">
      <name>Agent Identity Registration</name>
      <t>The agent <bcp14>MUST</bcp14> register its descriptive information with the agent gateway to enable the gateway to perform identity management based on this description. The specific registration interaction protocol between the agent and the gateway is outside the scope of this draft.</t>
      <t>Upon receiving an agent's registration information, the agent gateway <bcp14>MUST</bcp14> first perform identity authentication. The specific authentication mechanism is outside the scope of this document. Following successful authentication, the gateway proceeds to the next step of agent identity management.</t>
    </section>
    <section anchor="agent-identity-management">
      <name>Agent Identity management</name>
      <t>The agent gateway <bcp14>MUST</bcp14> first assign a unique identifier to the agent. Using this identifier as a key, the gateway can perform both basic and extended identity management functions by correlating it with the agent's descriptive information.</t>
      <section anchor="agent-identifier">
        <name>Agent Identifier</name>
        <t>The agent identifier (agent ID) is used to uniquely represent an agent within the IOA system. Specific approaches for constructing this identifier <bcp14>MAY</bcp14> employ a hierarchical string scheme (e.g., incorporating domain, subdomain, and instance components) or alternatively use a standardized encoding of such a hierarchical string (e.g., via URI, UUID, or other IETF-recognized identifier formats) to ensure global uniqueness, interoperability, and ease of parsing.</t>
        <t>Below is an example definition of an agent identifier in the form of a hierarchical string:</t>
        <artwork><![CDATA[
orgtype:org/internal enterprise namespace/client-id
]]></artwork>
        <!-- {: #ref-to-fig2 title="Example definition of agent ID"} -->

<t>Where:</t>
        <ul spacing="normal">
          <li>
            <t><tt>orgtype</tt> indicates the standardized type or schema that the org field conforms to. This enables consistent interpretation and validation of the organizational context associated with the agent, such as whether the organization is identified according to a public registry (e.g., PENs for orgnizations [RFC9371]), or another recognized naming authority.</t>
          </li>
          <li>
            <t><tt>org</tt> field identifies the enterprise or organization to which the agent belongs, in accordance with the standard specified by the orgtype field.This ensures that the organizational identifier is interpreted consistently and unambiguously according to the referenced naming scheme or registry.</t>
          </li>
          <li>
            <t><tt>internal enterprise namespace</tt> is defined and managed autonomously by the enterprise itself. It provides a private, organization-specific naming scheme for identifying agents, organizational units, or other entities within the enterprise’s administrative domain, without reliance on external registries or global standards.</t>
          </li>
          <li>
            <t><tt>client-id</tt> serves as a locally unique identifier for the agent within its administrative or operational domain. It <bcp14>MAY</bcp14> be assigned by the agent gateway upon registration, or alternatively issued by a Certificate Authority (CA) during the agent identity signing process, ensuring uniqueness and cryptographic binding to the agent’s identity credentials.</t>
          </li>
        </ul>
      </section>
      <section anchor="agent-identity-basic-managenment">
        <name>Agent Identity Basic Managenment</name>
        <t>Based on the base information contained in the agent description, the agent gateway can perform fundamental identity management functions using the agent ID as the primary key.</t>
        <artwork><![CDATA[
Agent ID : Basic Management functions
]]></artwork>
        <t>These functions include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>Identity verification management: validating the authenticity and integrity of the agent using attributes such as name, signature, and author.</t>
          </li>
          <li>
            <t>Capability classification management: categorizing agents according to their declared skills/capabilities for policy-based routing or service matching.</t>
          </li>
          <li>
            <t>Communication protocol management: enforcing or negotiating supported communication protocols to ensure interoperability.</t>
          </li>
          <li>
            <t>Lifecycle management: tracking and controlling the agent’s operational state (e.g., creation, activation, expiration, revocation) based on attributes such as creation time and validity period.</t>
          </li>
          <li>
            <t>Form factor classification management: grouping agents by their form (e.g., embedded, digital) for resource allocation or policy application.</t>
          </li>
          <li>
            <t>Intelligence level management: applying differentiated handling policies based on the agent’s declared intelligence level.For example, the agent gateway <bcp14>MAY</bcp14> apply behavior monitoring policies of varying intensity based on the agent's declared intelligence level, thereby preventing high-intelligence agents from performing unauthorized or out-of-scope actions.</t>
          </li>
          <li>
            <t>Extended profile management: referencing and validating the agent’s extended profile URI for dynamic or context-specific attributes.</t>
          </li>
          <li>
            <t>Role-based classification management: assigning or enforcing permissions and behaviors according to the agent’s declared role.</t>
          </li>
          <li>
            <t>Communication translation management: enabling or disabling protocol or semantic translation based on the translation enablement indicator.</t>
          </li>
        </ul>
        <t>These management functions collectively support scalable, secure, and policy-compliant operation of agents within the IOA system.</t>
      </section>
      <section anchor="agent-identity-extended-management">
        <name>Agent Identity Extended Management</name>
        <t>By leveraging the extensible information included in the agent description, the agent gateway can perform enhanced identity management functions beyond the base set.</t>
        <artwork><![CDATA[
Agent ID : Extended Management functions
]]></artwork>
        <t>These extended management functions include:</t>
        <ul spacing="normal">
          <li>
            <t>Agent network service management: dynamically provisioning, monitoring, or orchestrating network services associated with the agent (e.g., QoS requirements, connectivity policies, security assurance, and etc.).</t>
          </li>
          <li>
            <t>Agent permission management: enforcing fine-grained, context-aware access control policies based on extended permission scopes, such as data residency constraints (e.g., "data must not leave the campus or country").</t>
          </li>
          <li>
            <t>Future extensible identity management functions: supporting additional identity-related features that may be defined in future specifications, such as behavioral attestation, perfermence scoring, or integration with decentralized identity frameworks.</t>
          </li>
        </ul>
        <t>The extensible information field is designed to be forward-compatible, enabling the agent gateway to adapt to evolving operational, regulatory, or architectural requirements without requiring changes to the core agent description model.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Security is a critical consideration in agent identity management. This includes authenticating and validating the agent’s identity during registration, ensuring the integrity and non-repudiation of the agent identifier (e.g., to prevent tampering or spoofing), and enforcing access control policies for agent onboarding and interaction. However, the specific security mechanisms and detailed considerations related to these aspects are outside the scope of this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 282?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
