<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zheng-dispatch-agent-identity-management-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Agent Identity Managenment</title>
    <seriesInfo name="Internet-Draft" value="draft-zheng-dispatch-agent-identity-management-00"/>
    <author initials="C." surname="Zheng" fullname="Chong Zheng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhengchong6@huawei.com</email>
      </address>
    </author>
    <author initials="B." surname="Liu" fullname="Bing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>leo.liubing@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="Q." surname="Gao" fullname="Qiangzhou Gao">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gaoqiangzhou@huawei.com</email>
      </address>
    </author>
    <author initials="X." surname="Shang" fullname="Xiaotong Shang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shangxiaotong@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>robinli314@163.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="03"/>
    <area>ART</area>
    <workgroup>Dispatch</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 73?>

<t>This document specifies agent identity management in the Internet of Agents (IOA) system. It defines the descriptive requirements for agent identities, the agent registration process, the structure and assignment of agent identifiers, and the basic and extended identity management functions performed by the agent gateway based on the agent's descriptive information.</t>
    </abstract>
  </front>
  <middle>
    <?line 77?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>As intelligent agents become increasingly prevalent in distributed and interoperable systems, robust identity management is essential to ensure secure, scalable, and policy-compliant operation. In the Internet of Agents (IOA) system, agents—ranging from simple automation scripts to high-intelligence autonomous entities—must be uniquely identified, authenticated, and governed throughout their lifecycle.</t>
      <t>This document outlines the foundational framework for agent identity management in the IOA system. It specifies the required descriptive attributes of an agent, the registration process with the agent gateway, the format and semantics of agent identifiers, and the basic and extended management capabilities enabled by the agent’s identity metadata. While security mechanisms such as authentication protocols and cryptographic binding are acknowledged as critical, their detailed specification is considered out of scope for this document.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="overview-of-the-agent-identity-management">
      <name>Overview of the Agent Identity Management</name>
      <t>The agent identity management architecture in the IOA system comprises four core functional modules: Agent Description, Agent Identity Registration, Agent Identity Management, and Security Considerations. First, an agent's identity information <bcp14>MUST</bcp14> be represented in a normalized form. The agent then registers this normalized identity description with an Agent Gateway. Upon successful authentication of the registering agent, the Agent Gateway assigns a unique Agent ID to the agent and, using the Agent ID as a key, enforces identity management policies based on the agent's normalized identity description.</t>
      <figure anchor="ref-to-fig1">
        <name>Agent identity management architecture</name>
        <artwork><![CDATA[
                  Agent Gateway
                  +-------------------------------------------+
                  |                                           |
                  | +-------------------------------------+   |
        /---------+-|          Identity Management        |<--+----------\
        |         | +++-----------------------------------+   |          |
        |         |  ||   +--------------------------+        |          |
        |         |  ||-->|Agent ID:Basic Managemnt  |        |          |
        |         |  |    +--------------------------+        |          |
        |         |  |   +---------------------------+        |          |
        |         |  |--->|Agent ID:Basic Managemnt  |        |          |
        |         |       +--------------------------+        |          |
        |         +-------------------------------------------+          |
        |                                                                |
        |<----------------Agent Identity Registion---------------------->|
        |                                                                |
        |        Agent                                                   |
        |         +----------------------------+                         |
        |         | +----------------------+   |                         |
        |         | |      Description     |---+-------------------------/
        |         | +++--------------------+   |
        |         |  ||  +-----------------+   |
        |         |  ||->|Basic Information|   |
        |         |  |   +-----------------+   |
        |         |  |   +------------------+  |
        |         |  |-->|Extend Information|  |
        |         |      +------------------+  |
        |         |                            |
        |         |      +-----------------+   |
        \---------+----->|    Agent ID     |   |
                  |      +-----------------+   |
                  +----------------------------+

]]></artwork>
      </figure>
    </section>
    <section anchor="agent-description-requirements">
      <name>Agent description Requirements</name>
      <t>To enable accurate agent identity management on the agent gateway, it is necessary to define a set of essential information elements for describing an agent.</t>
      <section anchor="basic-information">
        <name>Basic Information</name>
        <t>The agent description <bcp14>MUST</bcp14> include the following base information elements:</t>
        <ul spacing="normal">
          <li>
            <t>Agent name</t>
          </li>
          <li>
            <t>Agent capabilities/skills</t>
          </li>
          <li>
            <t>Agent author</t>
          </li>
          <li>
            <t>Agent version</t>
          </li>
          <li>
            <t>Agent creation time</t>
          </li>
          <li>
            <t>Agent description model version</t>
          </li>
          <li>
            <t>Agent location</t>
          </li>
          <li>
            <t>Agent communication protocol</t>
          </li>
          <li>
            <t>Agent description (human-readable)</t>
          </li>
          <li>
            <t>Agent signature</t>
          </li>
        </ul>
        <t>In addition, the following attributes <bcp14>MUST</bcp14> also be included as part of the base information:</t>
        <ul spacing="normal">
          <li>
            <t>Agent validity period</t>
          </li>
          <li>
            <t>Agent form factor</t>
          </li>
          <li>
            <t>Agent intelligence level</t>
          </li>
          <li>
            <t>Agent extended profile URI</t>
          </li>
          <li>
            <t>Agent role</t>
          </li>
          <li>
            <t>Translation enablement indicator</t>
          </li>
        </ul>
        <t>Usecases</t>
        <ul spacing="normal">
          <li>
            <t>Agent validity period: The validity period of an agent on the agent gateway specifies the time interval during which the agent is considered active and authorized for operation. The agent gateway <bcp14>MAY</bcp14> use this field to enforce publication and maintenance policies, automatically deactivating or removing expired or stale ("zombie") agents to reduce operational overhead and minimize the burden of agent lifecycle management.</t>
          </li>
          <li>
            <t>Agent form factor: The form of the agent, such as digital agent or embodied agent. The form field can support the interconnection of heterogeneous forms of agents in future IOA systems. For example, agent gateways may have different requirements for access authentication and policy control for agents of different forms. Communication protocols between agents of different forms may also differ.</t>
          </li>
          <li>
            <t>Agent intelligence level: The intelligence level of an agent can be defined using mainstream AI agent intelligence classification standards in the future. This will help application agents to select the final communication target among a group of candidate agents based on the required intelligence level. For example, when agents have the same capabilities, the one with a higher intelligence level can be chosen.</t>
          </li>
          <li>
            <t>Agent extended profile URI: The address accessible for the extended version of the agent. It helps to continuously and dynamically upgrade and update the agent during its online period on the extended version address.</t>
          </li>
          <li>
            <t>Agent role: The roles of agents include two types: consumer and producer. An agent can also assume both roles. This helps the agent gateway determine whether to establish a short connection or a long connection with the agent. It also assists the gateway in formulating control strategies when publishing agent information on the network, for example, by not publishing information for consumers who do not provide services.</t>
          </li>
          <li>
            <t>Translation enablement indicator: This field describes whether the agent message allows the gateway to perform message translation. It helps the agent gateway to translate heterogeneous protocol communications between agents while respecting the agent's preferences. For example, in scenarios where semantic translation might occur, the agent can use this field to protect its data privacy.</t>
          </li>
        </ul>
      </section>
      <section anchor="extended-information">
        <name>Extended Information</name>
        <t>The agent description <bcp14>SHOULD</bcp14> include the following extended information elements:</t>
        <ul spacing="normal">
          <li>
            <t>Network requirements</t>
          </li>
          <li>
            <t>Trust level</t>
          </li>
          <li>
            <t>Extension</t>
          </li>
        </ul>
        <t>Usecases</t>
        <ul spacing="normal">
          <li>
            <t>Network requirements: The requirements of agents for the network include three aspects: experience, monitoring, and security. These help the agent gateway implement on-demand QoS guarantee strategies (e.g., low latency assurance or high bandwidth assurance), security assurance strategies (e.g., path security, quantum encryption for communication), and agent task monitoring and maintenance strategies (e.g., agent task flow measurements at the stream level, packet level, segment level, and etc.).</t>
          </li>
          <li>
            <t>Trust level: The agent's permission scope defines the boundaries of its authorized operations and data access. This attribute enables the agent gateway to enforce fine-grained access control policies—for example, restricting agent data from leaving a specific administrative domain such as a campus or a country—thereby supporting regulatory compliance and data sovereignty requirements.</t>
          </li>
          <li>
            <t>Extension: An extensible information field is provided as a reserved mechanism to accommodate future dynamic attributes of the agent.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="agent-identity-registration">
      <name>Agent Identity Registration</name>
      <t>The agent <bcp14>MUST</bcp14> register its descriptive information with the agent gateway to enable the gateway to perform identity management based on this description. The specific registration interaction protocol between the agent and the gateway is outside the scope of this draft.</t>
      <t>Upon receiving an agent's registration information, the agent gateway <bcp14>MUST</bcp14> first perform identity authentication. The specific authentication mechanism is outside the scope of this document. Following successful authentication, the gateway proceeds to the next step of agent identity management.</t>
    </section>
    <section anchor="agent-identity-management">
      <name>Agent Identity management</name>
      <t>The agent gateway <bcp14>MUST</bcp14> first assign a unique identifier to the agent. Using this identifier as a key, the gateway can perform both basic and extended identity management functions by correlating it with the agent's descriptive information.</t>
      <section anchor="agent-identifier">
        <name>Agent Identifier</name>
        <t>The agent identifier (agent ID) is used to uniquely represent an agent within the IOA system. Specific approaches for constructing this identifier <bcp14>MAY</bcp14> employ a hierarchical string scheme (e.g., incorporating domain, subdomain, and instance components) or alternatively use a standardized encoding of such a hierarchical string (e.g., via URI, UUID, or other IETF-recognized identifier formats) to ensure global uniqueness, interoperability, and ease of parsing.</t>
        <t>Below is an example definition of an agent identifier in the form of a hierarchical string:</t>
        <artwork><![CDATA[
orgtype:org/internal enterprise namespace/client-id
]]></artwork>
        <!-- {: #ref-to-fig2 title="Example definition of agent ID"} -->

<t>Where:</t>
        <ul spacing="normal">
          <li>
            <t><tt>orgtype</tt> indicates the standardized type or schema that the org field conforms to. This enables consistent interpretation and validation of the organizational context associated with the agent, such as whether the organization is identified according to a public registry (e.g., PENs for orgnizations [RFC9371]), or another recognized naming authority.</t>
          </li>
          <li>
            <t><tt>org</tt> field identifies the enterprise or organization to which the agent belongs, in accordance with the standard specified by the orgtype field.This ensures that the organizational identifier is interpreted consistently and unambiguously according to the referenced naming scheme or registry.</t>
          </li>
          <li>
            <t><tt>internal enterprise namespace</tt> is defined and managed autonomously by the enterprise itself. It provides a private, organization-specific naming scheme for identifying agents, organizational units, or other entities within the enterprise’s administrative domain, without reliance on external registries or global standards.</t>
          </li>
          <li>
            <t><tt>client-id</tt> serves as a locally unique identifier for the agent within its administrative or operational domain. It <bcp14>MAY</bcp14> be assigned by the agent gateway upon registration, or alternatively issued by a Certificate Authority (CA) during the agent identity signing process, ensuring uniqueness and cryptographic binding to the agent’s identity credentials.</t>
          </li>
        </ul>
      </section>
      <section anchor="agent-identity-basic-managenment">
        <name>Agent Identity Basic Managenment</name>
        <t>Based on the base information contained in the agent description, the agent gateway can perform fundamental identity management functions using the agent ID as the primary key.</t>
        <artwork><![CDATA[
Agent ID : Basic Management functions
]]></artwork>
        <t>These functions include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>Identity verification management: validating the authenticity and integrity of the agent using attributes such as name, signature, and author.</t>
          </li>
          <li>
            <t>Capability classification management: categorizing agents according to their declared skills/capabilities for policy-based routing or service matching.</t>
          </li>
          <li>
            <t>Communication protocol management: enforcing or negotiating supported communication protocols to ensure interoperability.</t>
          </li>
          <li>
            <t>Lifecycle management: tracking and controlling the agent’s operational state (e.g., creation, activation, expiration, revocation) based on attributes such as creation time and validity period.</t>
          </li>
          <li>
            <t>Form factor classification management: grouping agents by their form (e.g., embedded, digital) for resource allocation or policy application.</t>
          </li>
          <li>
            <t>Intelligence level management: applying differentiated handling policies based on the agent’s declared intelligence level.For example, the agent gateway <bcp14>MAY</bcp14> apply behavior monitoring policies of varying intensity based on the agent's declared intelligence level, thereby preventing high-intelligence agents from performing unauthorized or out-of-scope actions.</t>
          </li>
          <li>
            <t>Extended profile management: referencing and validating the agent’s extended profile URI for dynamic or context-specific attributes.</t>
          </li>
          <li>
            <t>Role-based classification management: assigning or enforcing permissions and behaviors according to the agent’s declared role.</t>
          </li>
          <li>
            <t>Communication translation management: enabling or disabling protocol or semantic translation based on the translation enablement indicator.</t>
          </li>
        </ul>
        <t>These management functions collectively support scalable, secure, and policy-compliant operation of agents within the IOA system.</t>
      </section>
      <section anchor="agent-identity-extended-management">
        <name>Agent Identity Extended Management</name>
        <t>By leveraging the extensible information included in the agent description, the agent gateway can perform enhanced identity management functions beyond the base set.</t>
        <artwork><![CDATA[
Agent ID : Extended Management functions
]]></artwork>
        <t>These extended management functions include:</t>
        <ul spacing="normal">
          <li>
            <t>Agent network service management: dynamically provisioning, monitoring, or orchestrating network services associated with the agent (e.g., QoS requirements, connectivity policies, security assurance, and etc.).</t>
          </li>
          <li>
            <t>Agent permission management: enforcing fine-grained, context-aware access control policies based on extended permission scopes, such as data residency constraints (e.g., "data must not leave the campus or country").</t>
          </li>
          <li>
            <t>Future extensible identity management functions: supporting additional identity-related features that may be defined in future specifications, such as behavioral attestation, perfermence scoring, or integration with decentralized identity frameworks.</t>
          </li>
        </ul>
        <t>The extensible information field is designed to be forward-compatible, enabling the agent gateway to adapt to evolving operational, regulatory, or architectural requirements without requiring changes to the core agent description model.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Security is a critical consideration in agent identity management. This includes authenticating and validating the agent’s identity during registration, ensuring the integrity and non-repudiation of the agent identifier (e.g., to prevent tampering or spoofing), and enforcing access control policies for agent onboarding and interaction. However, the specific security mechanisms and detailed considerations related to these aspects are outside the scope of this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 283?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
