<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC7515 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7515.xml">
<!ENTITY RFC8037 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8037.xml">
<!ENTITY RFC8032 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8032.xml">
<!ENTITY RFC7517 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7517.xml">
<!ENTITY RFC3986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
<!ENTITY RFC3339 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3339.xml">
<!ENTITY RFC6570 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6570.xml">
<!ENTITY RFC6234 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6234.xml">
<!ENTITY RFC6838 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml">
<!ENTITY RFC6839 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6839.xml">
<!ENTITY RFC8259 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
<!ENTITY RFC6749 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6749.xml">
<!ENTITY RFC9635 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9635.xml">
<!ENTITY RFC9562 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9562.xml">
]>


<rfc ipr="trust200902" docName="draft-kroehl-agentic-trust-aae-00" category="info" submissionType="independent">
  <front>
    <title abbrev="AAE">Agent Authorization Envelope (AAE): A Machine-Evaluable Authorization Structure for Autonomous AI Agents</title>

    <author fullname="Lars Kersten Kroehl">
      <organization>CryptoKRI GmbH</organization>
      <address>
        <postal>
          <city>Zurich</city>
          <country>Switzerland</country>
        </postal>
        <email>lars@moltrust.ch</email>
      </address>
    </author>

    <date year="2026" month="May" day="21"/>

    <area>Applications</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>autonomous agents</keyword> <keyword>AI agents</keyword> <keyword>authorization</keyword> <keyword>decentralized identity</keyword> <keyword>verifiable credentials</keyword> <keyword>W3C DID</keyword>

    <abstract>


<?line 66?>

<t>Autonomous AI agents now operate at production scale across financial,
commercial, and infrastructure domains — executing transactions, invoking
APIs, and taking consequential actions without direct human oversight at
each step. Existing authorization mechanisms (OAuth 2.0, API keys, ACLs)
were designed for human-initiated requests and do not capture the
machine-evaluable semantics required for autonomous agent authorization:
what the agent is mandated to do, what constraints bound its actions, and
for how long the authorization is valid.</t>

<t>This document specifies the Agent Authorization Envelope (AAE), a
structured authorization container for autonomous AI agents. AAE defines
three mandatory blocks — MANDATE, CONSTRAINTS, and VALIDITY — that
together constitute a machine-evaluable, cryptographically verifiable
authorization assertion. AAE is designed to be protocol-agnostic, binding
to W3C Decentralized Identifiers (DIDs) for agent identity and W3C
Verifiable Credentials (VCs) for issuance and signature, and is
independent of any specific AI framework, transport protocol, or
blockchain.</t>



    </abstract>



  </front>

  <middle>


<?line 87?>

<section anchor="introduction"><name>Introduction</name>

<t>The deployment of autonomous AI agents at scale creates an authorization
gap that existing Internet protocols do not address. When a human user
initiates a request, the authorization question is well-understood: who
is the user, what are they permitted to do, and has their session expired?
Protocols such as OAuth 2.0 <xref target="RFC6749"/> answer these questions for
human-delegated access.</t>

<t>When an autonomous agent initiates a request — potentially on behalf of
another agent, under a delegated mandate, with specific constraints on
permissible actions — the question requires a different answer. The agent
may be acting under a mandate issued hours earlier; its actions may be
bounded by value caps, action allowlists, or domain restrictions; and
the authorization may expire on a schedule that the receiving system
must be able to verify without contacting the issuing party.</t>

<t>No current IETF standard addresses this combination of requirements for
autonomous agents. OAuth 2.0 scopes are issuer-defined strings without
machine-evaluable semantics for agent mandates. SPIFFE/SVID addresses
workload identity but not authorization semantics. JWT claims are
flexible but unstructured for agent-specific use cases.</t>

<t>This document specifies the Agent Authorization Envelope (AAE) to fill
this gap. AAE is derived from a production deployment operational since
March 2026 <xref target="ARXIV-AAE"/> and is aligned with regulatory requirements
from Singapore IMDA <xref target="IMDA-MGF"/>, NIST <xref target="NIST-CAISI"/>, and the EU AI
Act (Regulation 2024/1689).</t>

<section anchor="regulatory-convergence"><name>Regulatory Convergence</name>

<t>Independent regulatory work has converged on the same authorization
structure that AAE implements. Two requirements from the Singapore IMDA
Model AI Governance Framework for Agentic AI, Version 1.5
<xref target="IMDA-MGF"/>, published 20 May 2026, are directly relevant.</t>

<t>First, on agent identity (§2.1.2, "Agent identity — Identification"),
the framework states:</t>

<ul empty="true"><li>
  <t>An agent should have its own unique, cryptographically verifiable
identity, such that it can identify itself to the organisation, its
human user, or other agents.</t>
</li></ul>

<t>The framework further recommends that agent identities be catalogued
and centrally managed, issued from and tracked by a centralised system
— the operational model that a DID-based trust registry implements.</t>

<t>Second, on authorization scope (§2.1.2, "Authorisation"), the framework
recommends that authorisations be scoped, time- or session-bound,
non-transferable, and follow the principle of least privilege by
default with explicit escalation paths; that they be bounded by the
authorising human's permissions; and that delegations of authority be
clearly recorded.</t>

<t>This maps directly to the three AAE blocks: MANDATE defines the scope
and action allowlist, CONSTRAINTS implement least-privilege and value
bounds, VALIDITY enforces time-bound non-transferable authorization, and
the delegation chain structure records authority provenance (Section 3).</t>

<t>A case study in the same framework (§2.3, "Terminal 3 case study")
describes an independent implementation of the same pattern: a
"Verifiable Credential of Intent" issued by a human principal to an
agent before each cycle, defining accessible records, applicable
constraints, and a declared ceiling amount. This is a real-world
deployment of pre-transaction scoped authorization that is structurally
equivalent to AAE.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in
all capitals, as shown here.</t>

<t><strong>Agent:</strong> An autonomous software entity that takes actions on behalf of
a principal, potentially without per-action human approval.</t>

<t><strong>Principal:</strong> The human or organization that deploys and is ultimately
accountable for an agent's actions.</t>

<t><strong>Issuer:</strong> The entity that issues the AAE, typically a trust registry
or the principal directly.</t>

<t><strong>Relying Party:</strong> The system or service that receives a request from an
agent and evaluates the AAE to determine whether to process it.</t>

<t><strong>AAE:</strong> Agent Authorization Envelope — the structured authorization
container defined in this document.</t>

</section>
</section>
<section anchor="the-agent-authorization-envelope"><name>The Agent Authorization Envelope</name>

<t>An AAE is a W3C Verifiable Credential <xref target="W3C-VC"/> whose
<spanx style="verb">credentialSubject</spanx> carries an <spanx style="verb">aae</spanx> object. The <spanx style="verb">aae</spanx> object has three
mandatory members — <spanx style="verb">mandate</spanx>, <spanx style="verb">constraints</spanx>, and <spanx style="verb">validity</spanx> — defined
in the following subsections.</t>

<t>An AAE MUST be secured using JOSE. The Verifiable Credential is the
payload of a JSON Web Signature (JWS) <xref target="RFC7515"/> in compact
serialization, signed by the issuer using the Edwards-curve Digital
Signature Algorithm (EdDSA) with the Ed25519 curve, as specified for
JOSE in <xref target="RFC8037"/> and for the signature algorithm itself in
<xref target="RFC8032"/>. The issuer's signing key is a JSON Web Key (JWK)
<xref target="RFC7517"/> bound to the issuer's W3C DID <xref target="W3C-DID"/>: the JWS
protected-header <spanx style="verb">kid</spanx> parameter MUST be a DID URL that dereferences,
via the issuer DID document, to the corresponding verification method.</t>

<t>This document distinguishes two media types. An <em>unsecured AAE</em> — the
Verifiable Credential before JWS encapsulation — is a JSON object with
media type application/aae+json (Section 8). A <em>secured AAE</em> — the JWS
in compact serialization — is not a JSON document; it is transported
with media type application/jose <xref target="RFC7515"/>, and the media type of
its JWS payload is indicated by the <spanx style="verb">cty</spanx> protected-header parameter,
"aae+json".</t>

<section anchor="structure"><name>Structure</name>

<t>On the wire, a secured AAE is a JWS in compact serialization:</t>

<figure><sourcecode type="text"><![CDATA[
BASE64URL(UTF8(JWS Protected Header)) || '.' ||
BASE64URL(JWS Payload) || '.' ||
BASE64URL(JWS Signature)
]]></sourcecode></figure>

<t>The JWS Protected Header MUST contain:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "alg": "EdDSA",
  "cty": "aae+json",
  "kid": "did:moltrust:registry#key-1"
}
]]></sourcecode></figure>

<t><spanx style="verb">alg</spanx>: REQUIRED. MUST be "EdDSA"; the curve MUST be Ed25519, as
specified for JOSE in <xref target="RFC8037"/>.</t>

<t><spanx style="verb">cty</spanx>: REQUIRED. The media type of the JWS payload; MUST be "aae+json"
(Section 8). The "application/" prefix is omitted as permitted by
<xref target="RFC7515"/>. Per <xref target="RFC7515"/>, <spanx style="verb">cty</spanx> (content type) identifies the
secured payload; the <spanx style="verb">typ</spanx> parameter, if present, identifies the JWS
object itself and MUST NOT carry the payload media type.</t>

<t><spanx style="verb">kid</spanx>: REQUIRED. A DID URL identifying the issuer verification method.
It MUST dereference, via the issuer DID document, to an Ed25519
verification method authorized for the <spanx style="verb">assertionMethod</spanx> proof purpose.</t>

<t>The JWS Payload is the unsecured AAE: a W3C Verifiable Credential whose
media type is application/aae+json (Section 8).</t>

<figure><artwork><![CDATA[
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://moltrust.ch/contexts/aae/v1"
  ],
  "type": ["VerifiableCredential", "AgentAuthorizationEnvelope"],
  "id": "urn:uuid:3f2b8c10-7c2e-4f1a-9b6d-1e2a3c4d5e6f",
  "issuer": "did:moltrust:registry",
  "validFrom": "2026-05-20T10:00:00Z",
  "credentialSubject": {
    "id": "did:example:agent-abc123",
    "aae": {
      "mandate": { ... },
      "constraints": { ... },
      "validity": { ... }
    }
  }
}
]]></artwork></figure>

<t>The Verifiable Credential MUST contain an <spanx style="verb">id</spanx> member whose value is a
URI <xref target="RFC3986"/> that is globally unique across all AAEs issued by the
issuer (for example, a UUID URN <xref target="RFC9562"/>). The Verifiable Credential
MUST NOT contain an embedded <spanx style="verb">proof</spanx> member; integrity and authenticity
are provided solely by the enclosing JWS.</t>

</section>
<section anchor="the-mandate-block"><name>The MANDATE Block</name>

<t>The MANDATE block specifies what the agent is authorized to do. It MUST
contain an <spanx style="verb">actions</spanx> array of permitted action identifiers and SHOULD
contain a <spanx style="verb">purpose</spanx> string describing the authorization context.</t>

<figure><sourcecode type="json"><![CDATA[
"mandate": {
  "actions": ["read", "book", "pay"],
  "purpose": "Travel booking on behalf of principal",
  "scope": "travel-vertical",
  "principal_did": "did:example:principal-xyz"
}
]]></sourcecode></figure>

<t><spanx style="verb">actions</spanx>: REQUIRED. Array of strings. Each string is a permitted action
identifier. Relying parties define their own action vocabularies;
interoperability is achieved through shared vertical schemas (see
Section 4).</t>

<t><spanx style="verb">purpose</spanx>: RECOMMENDED. Human-readable description of the authorization
context. Used for audit logs.</t>

<t><spanx style="verb">scope</spanx>: OPTIONAL. Restricts the MANDATE to a specific vertical or
service domain.</t>

<t><spanx style="verb">principal_did</spanx>: RECOMMENDED. The DID of the human or organization
ultimately accountable for the agent's actions.</t>

<t>The MANDATE block MAY also contain a <spanx style="verb">delegation</spanx> object or a
<spanx style="verb">delegation_policy</spanx> object; both are defined in Section 3.</t>

</section>
<section anchor="the-constraints-block"><name>The CONSTRAINTS Block</name>

<t>The CONSTRAINTS block specifies limits that bound the agent's actions
within the MANDATE.</t>

<t>Relying parties MUST enforce all constraints they recognize. A relying
party MUST reject an AAE if any constraint marked <spanx style="verb">required: true</spanx> is
unrecognized or cannot be evaluated. A relying party MAY ignore an
unrecognized constraint only if that constraint is explicitly marked
<spanx style="verb">required: false</spanx>. If the <spanx style="verb">required</spanx> member is absent, the constraint
MUST be treated as <spanx style="verb">required: true</spanx>.</t>

<figure><sourcecode type="json"><![CDATA[
"constraints": {
  "max_transaction_value": {
    "value": 500,
    "currency": "USD",
    "required": true
  },
  "allowed_domains": {
    "value": ["booking.example.com", "flights.example.com"],
    "required": true
  },
  "rate_limit": {
    "value": 10,
    "window": "PT1H",
    "required": false
  }
}
]]></sourcecode></figure>

<t>Constraint keys are extensible. This document defines three RECOMMENDED
constraint types:</t>

<t><list style="symbols">
  <t><spanx style="verb">max_transaction_value</spanx>: Maximum value of any single transaction.
MUST include <spanx style="verb">value</spanx> (number) and <spanx style="verb">currency</spanx> (ISO 4217).</t>
  <t><spanx style="verb">allowed_domains</spanx>: Allowlist of domains the agent may contact.</t>
  <t><spanx style="verb">rate_limit</spanx>: Maximum number of actions per time window.
MUST include <spanx style="verb">value</spanx> (integer) and <spanx style="verb">window</spanx> (an ISO 8601 duration,
e.g., "PT1H").</t>
</list></t>

<t>A relying party that enforces a <spanx style="verb">rate_limit</spanx> constraint marked
<spanx style="verb">required: true</spanx> MUST maintain sufficient state to count accepted
actions within the specified window. A relying party that cannot
maintain such state MUST reject an AAE containing a required
<spanx style="verb">rate_limit</spanx> constraint.</t>

</section>
<section anchor="the-validity-block"><name>The VALIDITY Block</name>

<t>The VALIDITY block specifies the temporal bounds of the authorization.</t>

<figure><sourcecode type="json"><![CDATA[
"validity": {
  "not_before": "2026-05-20T10:00:00Z",
  "not_after": "2026-05-20T18:00:00Z",
  "revocation_check": "https://api.moltrust.ch/aae/revocation/{id}",
  "single_use": false
}
]]></sourcecode></figure>

<t><spanx style="verb">not_before</spanx>: REQUIRED. An RFC 3339 <xref target="RFC3339"/> date-time, expressed in
UTC with the "Z" offset. The AAE MUST NOT be accepted before this time.</t>

<t><spanx style="verb">not_after</spanx>: REQUIRED. An RFC 3339 <xref target="RFC3339"/> date-time, expressed in
UTC with the "Z" offset. The AAE MUST NOT be accepted after this time.
Relying parties MUST reject expired AAEs.</t>

<t><spanx style="verb">revocation_check</spanx>: OPTIONAL. An HTTPS URI Template <xref target="RFC6570"/> for
checking AAE revocation status. The template MUST support the <spanx style="verb">{id}</spanx>
variable, expanding (with URI encoding) to the Verifiable Credential
<spanx style="verb">id</spanx>, and SHOULD support the <spanx style="verb">{did}</spanx> variable, expanding to
<spanx style="verb">credentialSubject.id</spanx>. If <spanx style="verb">revocation_check</spanx> is present, the relying
party MUST query the endpoint over HTTPS; the response MUST be a JSON
object containing at least an <spanx style="verb">id</spanx> member and a boolean <spanx style="verb">revoked</spanx>
member. The relying party MUST reject the AAE if the endpoint indicates
<spanx style="verb">revoked: true</spanx> or if the response cannot be parsed. If revocation
status cannot be determined — for example, on network failure or an
HTTP 5xx response — the relying party MUST reject the AAE. A relying
party MAY apply an explicit, locally configured, auditable fail-open
policy only for AAEs whose risk classification permits such behaviour;
such a policy SHOULD NOT be used for high-risk actions and MUST be
subject to explicit governance and audit logging.</t>

<t><spanx style="verb">single_use</spanx>: OPTIONAL. Boolean. Default: false. If true, the relying
party MUST maintain state keyed by the Verifiable Credential <spanx style="verb">id</spanx>
(Section 2.1) and MUST reject any subsequent presentation of an AAE
bearing the same <spanx style="verb">id</spanx> after the first successful authorization. A
relying party that cannot maintain such state MUST reject any AAE with
<spanx style="verb">single_use: true</spanx>. Where a relying party is deployed across multiple
nodes, the single-use state MUST be shared across all nodes that can
accept the AAE; otherwise the AAE could be replayed against a different
node. In this document, "invalidation" denotes relying-party-local
state; it does not invalidate the AAE globally.</t>

<t>If the Verifiable Credential contains a <spanx style="verb">validFrom</spanx> member, the relying
party MUST NOT accept the AAE before the later of <spanx style="verb">validFrom</spanx> and
<spanx style="verb">validity.not_before</spanx>. Issuers SHOULD set <spanx style="verb">validFrom</spanx> equal to or
earlier than <spanx style="verb">validity.not_before</spanx>.</t>

</section>
</section>
<section anchor="delegation-chains"><name>Delegation Chains</name>

<t>An agent may act under a mandate delegated from another agent. An AAE
issued directly by a principal, and not itself delegated, is a <em>root
AAE</em>: it has no <spanx style="verb">delegation</spanx> member, and its effective delegation depth
is 0. A root AAE that authorizes onward delegation MUST include a
<spanx style="verb">delegation_policy</spanx> object in its MANDATE block with a non-negative
integer <spanx style="verb">max_depth</spanx> member; this value is the parent's effective
maximum depth for the first delegation link.</t>

<figure><sourcecode type="json"><![CDATA[
"mandate": {
  "actions": ["read", "book"],
  "delegation_policy": { "max_depth": 2 }
}
]]></sourcecode></figure>

<t>A <em>delegated AAE</em> carries a <spanx style="verb">delegation</spanx> object in its MANDATE block:</t>

<figure><sourcecode type="json"><![CDATA[
"mandate": {
  "actions": ["read"],
  "delegation": {
    "delegator_did": "did:example:parent-agent",
    "delegator_aae_id": "urn:uuid:parent-aae-123",
    "delegator_aae_uri": "https://aae.example/p/parent-aae-123",
    "delegator_aae_hash": "sha-256:5b7e2c...",
    "depth": 1,
    "max_depth": 2
  }
}
]]></sourcecode></figure>

<t><spanx style="verb">delegator_did</spanx>: REQUIRED in delegation context. The DID of the
delegating agent.</t>

<t><spanx style="verb">delegator_aae_id</spanx>: REQUIRED in delegation context. The <spanx style="verb">id</spanx> of the
parent AAE.</t>

<t><spanx style="verb">delegator_aae_uri</spanx>: REQUIRED in delegation context, unless the parent
AAE is embedded in the request by the transport binding. A URI from
which the relying party can retrieve the parent AAE.</t>

<t><spanx style="verb">delegator_aae_hash</spanx>: OPTIONAL. A hash of the parent secured AAE. If
present, the value MUST have the form <spanx style="verb">sha-256:&lt;base64url-encoded-digest&gt;</spanx>.
The digest input MUST be the exact ASCII octet sequence of the parent
AAE JWS compact serialization as retrieved, without additional
whitespace, decoding, re-encoding, or JSON canonicalization. SHA-256 is
as defined in <xref target="RFC6234"/>. If the computed digest does not match the
value in <spanx style="verb">delegator_aae_hash</spanx>, the relying party MUST reject the
delegated AAE.</t>

<t><spanx style="verb">depth</spanx>: REQUIRED in delegation context. Integer. The delegation depth
of this AAE. It MUST equal the parent AAE's effective delegation depth
plus 1. The effective delegation depth of a root AAE is 0; the
effective delegation depth of a delegated AAE is its <spanx style="verb">delegation.depth</spanx>.</t>

<t><spanx style="verb">max_depth</spanx>: REQUIRED in delegation context. Integer. The maximum
delegation depth permitted for this branch of the chain. It MUST be
less than or equal to the parent AAE's effective maximum depth — the
parent's <spanx style="verb">delegation.max_depth</spanx> if the parent is a delegated AAE, or
the root AAE's <spanx style="verb">mandate.delegation_policy.max_depth</spanx> if the parent is a
root AAE. A relying party MUST reject a delegated AAE whose <spanx style="verb">depth</spanx>
exceeds its <spanx style="verb">max_depth</spanx>, and MUST reject any delegation whose parent is
a root AAE that has no <spanx style="verb">delegation_policy</spanx>.</t>

<t>A relying party MUST be able to retrieve the parent AAE in order to
verify a delegation chain. The parent AAE's <spanx style="verb">credentialSubject.id</spanx> MUST
equal the delegated AAE's <spanx style="verb">delegation.delegator_did</spanx>. Which DID is
permitted to sign a delegated AAE — the signing-authority rule — is
specified in the Verification Algorithm (Section 5).</t>

<t>Delegated AAEs MUST NOT grant actions not present in the parent AAE.
Delegated AAEs MUST be strictly subordinate to their parent AAE. For
the purposes of this document, "equal to or more restrictive" is
defined per element as follows:</t>

<t><list style="symbols">
  <t><strong>Actions</strong>: The delegated <spanx style="verb">mandate.actions</spanx> MUST be a subset of the
parent <spanx style="verb">mandate.actions</spanx>. If the delegated MANDATE contains the
<spanx style="verb">delegate</spanx> action, the parent MANDATE MUST also contain it.</t>
  <t><strong>Numeric upper-bound constraints</strong> (for example,
<spanx style="verb">max_transaction_value</spanx>): The delegated <spanx style="verb">value</spanx> MUST be less than or
equal to the parent <spanx style="verb">value</spanx>.</t>
  <t><strong>Rate-limit constraints</strong> (<spanx style="verb">rate_limit</spanx>): A delegated <spanx style="verb">rate_limit</spanx>
constraint is equal to or more restrictive than the parent only if
the relying party can prove that no execution pattern permitted by
the delegated rate limit would violate the parent rate limit. In the
absence of a profile defining such comparison semantics, the
delegated <spanx style="verb">rate_limit</spanx> MUST use the same <spanx style="verb">window</spanx> value as the parent
constraint, and the delegated <spanx style="verb">value</spanx> MUST be less than or equal to
the parent <spanx style="verb">value</spanx>; if the windows differ and no such profile
applies, the delegated AAE MUST be rejected.</t>
  <t><strong>Allowlist constraints</strong> (for example, <spanx style="verb">allowed_domains</spanx>): The
delegated <spanx style="verb">value</spanx> MUST be a subset of the parent <spanx style="verb">value</spanx>.</t>
  <t><strong>Validity</strong>: The delegated <spanx style="verb">validity.not_before</spanx> MUST be greater than
or equal to the parent <spanx style="verb">validity.not_before</spanx>, and the delegated
<spanx style="verb">validity.not_after</spanx> MUST be less than or equal to the parent
<spanx style="verb">validity.not_after</spanx>.</t>
  <t><strong>Delegation depth</strong>: The delegated <spanx style="verb">delegation.depth</spanx> MUST equal the
parent AAE's effective delegation depth plus 1; the delegated
<spanx style="verb">delegation.max_depth</spanx> MUST be less than or equal to the parent AAE's
effective maximum depth; and <spanx style="verb">delegation.depth</spanx> MUST NOT exceed
<spanx style="verb">delegation.max_depth</spanx>.</t>
</list></t>

<t>Every constraint present in the parent AAE that is marked
<spanx style="verb">required: true</spanx>, or for which the <spanx style="verb">required</spanx> member is absent and is
therefore treated as <spanx style="verb">required: true</spanx> (Section 2.3), MUST also be
present in the delegated AAE and MUST either be marked <spanx style="verb">required: true</spanx>
or omit the <spanx style="verb">required</spanx> member. A delegated AAE MUST NOT omit, downgrade,
or change to <spanx style="verb">required: false</spanx> any parent constraint that is required by
this rule. A delegated AAE MAY introduce additional constraints,
provided they do not contradict the parent constraints. For
currency-valued constraints (for example, <spanx style="verb">max_transaction_value</spanx>), the
delegated constraint MUST use the same currency as the parent
constraint, unless the relying party has an explicitly configured and
auditable currency-conversion policy; if the currencies differ and no
such policy exists, the delegated AAE MUST be rejected.</t>

<t>If a relying party cannot determine whether a delegated element is
equal to or more restrictive than the corresponding parent element,
the delegated AAE MUST be rejected.</t>

</section>
<section anchor="action-vocabulary-schemas"><name>Action Vocabulary Schemas</name>

<t>Interoperability across relying parties requires shared action
vocabularies. This document defines a minimal common vocabulary:</t>

<texttable>
      <ttcol align='left'>Action</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c><spanx style="verb">read</spanx></c>
      <c>Retrieve information without side effects</c>
      <c><spanx style="verb">write</spanx></c>
      <c>Create or modify state</c>
      <c><spanx style="verb">delete</spanx></c>
      <c>Remove state</c>
      <c><spanx style="verb">pay</spanx></c>
      <c>Initiate a payment or financial transfer</c>
      <c><spanx style="verb">invoke</spanx></c>
      <c>Call an external API or service</c>
      <c><spanx style="verb">delegate</spanx></c>
      <c>Issue a delegated AAE to a sub-agent</c>
</texttable>

<t>Vertical-specific vocabularies (travel, finance, healthcare) SHOULD be
published as extensions to this base vocabulary, as stable and
versioned schemas at publicly accessible URIs. This document does not
create an IANA registry for action vocabularies.</t>

</section>
<section anchor="verification-algorithm"><name>Verification Algorithm</name>

<t>A relying party receiving an agent request with an attached AAE MUST
perform the following checks in order:</t>

<t><list style="numbers" type="1">
  <t><strong>Signature verification</strong>: Parse the JWS in compact serialization
and read the protected header. The <em>signing DID</em> is the DID portion
of the <spanx style="verb">kid</spanx> parameter. Resolve the signing DID, dereference the
referenced verification method, and confirm that (a) the
verification method is present in that DID document, (b) it is
authorized for the <spanx style="verb">assertionMethod</spanx> proof purpose, (c) it contains
or resolves to a JWK with <spanx style="verb">kty: "OKP"</spanx> and <spanx style="verb">crv: "Ed25519"</spanx>, and
(d) the JWS signature validates under that key. Reject the AAE if
the signing DID cannot be resolved, the verification method is
absent or not authorized for <spanx style="verb">assertionMethod</spanx>, the key is not
Ed25519, the <spanx style="verb">alg</spanx> is not "EdDSA", or the signature is invalid.  <vspace blankLines='1'/>
The relying party MUST then verify signing authority. For a
non-delegated AAE (no <spanx style="verb">mandate.delegation</spanx> member), the signing DID
MUST be identical to the Verifiable Credential <spanx style="verb">issuer</spanx>. For a
delegated AAE, the signing DID MUST satisfy one of the following:
(a) it is identical to <spanx style="verb">mandate.delegation.delegator_did</spanx>, and the
Verifiable Credential <spanx style="verb">issuer</spanx> is also identical to that DID; or
(b) it is explicitly authorized by <spanx style="verb">mandate.delegation.delegator_did</spanx>
to issue delegated AAEs on that delegator's behalf, where the
authorization is represented by a verification method or service
entry in the delegator's DID document. If signing authority cannot
be established under the applicable rule — or, for case (b), the
relying party does not understand the authorization mechanism — the
AAE MUST be rejected.</t>
  <t><strong>Payload and schema validation</strong>: Parse the JWS payload as
UTF-8-encoded JSON. The payload MUST be a W3C Verifiable Credential
containing <spanx style="verb">id</spanx>, <spanx style="verb">issuer</spanx>, <spanx style="verb">credentialSubject.id</spanx>, and
<spanx style="verb">credentialSubject.aae</spanx>. The <spanx style="verb">aae</spanx> object MUST contain <spanx style="verb">mandate</spanx>,
<spanx style="verb">constraints</spanx>, and <spanx style="verb">validity</spanx>. The protected-header <spanx style="verb">cty</spanx> parameter
MUST equal "aae+json". Reject the AAE if any required member is
absent, has the wrong JSON type, or otherwise violates the
structural requirements of this document.</t>
  <t><strong>Temporal validity</strong>: Confirm current time is within
<spanx style="verb">not_before</spanx> and <spanx style="verb">not_after</spanx>. Reject if outside bounds.</t>
  <t><strong>Subject binding</strong>: Confirm the agent presenting the AAE controls
<spanx style="verb">credentialSubject.id</spanx>. The relying party MUST generate a fresh,
unpredictable nonce with at least 128 bits of entropy and send it to
the agent together with a relying-party audience identifier. The
agent MUST return a JWS in compact serialization whose payload is
the UTF-8 encoding of a JSON object with exactly these members:  <vspace blankLines='1'/>
    <figure><sourcecode type="json"><![CDATA[
{
  "nonce":  "<relying-party nonce>",
  "aud":    "<relying-party audience identifier>",
  "iat":    "<RFC 3339 UTC timestamp>",
  "aae_id": "<Verifiable Credential id>"
}
]]></sourcecode></figure>
  <vspace blankLines='1'/>
The challenge-response JWS protected header MUST contain
<spanx style="verb">"alg": "EdDSA"</spanx> and a <spanx style="verb">kid</spanx> DID URL whose DID portion equals
<spanx style="verb">credentialSubject.id</spanx>. The referenced verification method MUST be
authorized under the <spanx style="verb">authentication</spanx> relationship in the resolved
DID document. The relying party MUST reject the AAE unless all of
the following hold: (a) the challenge-response signature is valid
under a key controlled by <spanx style="verb">credentialSubject.id</spanx>; (b) the
verification method is authorized for <spanx style="verb">authentication</spanx>; (c) the
nonce was generated by this relying party and has not been used
before; (d) <spanx style="verb">aud</spanx> identifies this relying party; (e) <spanx style="verb">aae_id</spanx>
equals the Verifiable Credential <spanx style="verb">id</spanx>; and (f) <spanx style="verb">iat</spanx> is within the
relying party's accepted clock-skew window.</t>
  <t><strong>Single-use check</strong>: If <spanx style="verb">validity.single_use</spanx> is true, the relying
party MUST perform an atomic check-and-record operation keyed by the
Verifiable Credential <spanx style="verb">id</spanx>. An <spanx style="verb">id</spanx> that has already been recorded
MUST be rejected. Where the relying party is deployed across
multiple nodes, this state MUST be shared across all nodes;
concurrent presentations of the same <spanx style="verb">id</spanx> MUST NOT both succeed.</t>
  <t><strong>Action check</strong>: Confirm the requested action is present in
<spanx style="verb">mandate.actions</spanx>. Reject if absent.</t>
  <t><strong>Constraint evaluation</strong>: For each constraint in the CONSTRAINTS
block, the relying party MUST enforce every constraint it
recognizes. If a recognized constraint marked <spanx style="verb">required: true</spanx> (or
with <spanx style="verb">required</spanx> absent) cannot be evaluated, the relying party MUST
reject the AAE. If a recognized constraint marked <spanx style="verb">required: false</spanx>
cannot be evaluated, the relying party MAY ignore that constraint.
If a constraint is unrecognized, the relying party MUST reject the
AAE unless that constraint is explicitly marked <spanx style="verb">required: false</spanx>.
The relying party MUST reject the AAE if any enforced constraint is
violated.</t>
  <t><strong>Revocation check</strong> (if applicable): If <spanx style="verb">validity.revocation_check</spanx>
is present, the relying party MUST query the endpoint over HTTPS and
evaluate the result as specified for <spanx style="verb">revocation_check</spanx> in
Section 2.4, including the limited fail-open exception defined there.</t>
  <t><strong>Delegation chain</strong> (if applicable): If the AAE contains a
<spanx style="verb">delegation</spanx> field, the relying party MUST verify every ancestor AAE
in the chain. The signature, payload-and-schema, temporal-validity,
and revocation checks above apply to each ancestor AAE. The
subject-binding and single-use checks MUST NOT be performed for
ancestor AAEs: ancestor agents are not required to be online to
answer a challenge, and single-use state applies only to the
presented AAE. For each delegation link, the relying party MUST
verify that the parent AAE's <spanx style="verb">credentialSubject.id</spanx> equals the
child's <spanx style="verb">delegation.delegator_did</spanx>; that the signing authority of
each AAE in the chain holds as specified in step 1; and that
constraint monotonicity and depth limits hold as defined in
Section 3. To detect cycles, the relying party MUST maintain the set
of AAE <spanx style="verb">id</spanx> values already visited in the current verification path
and MUST reject the chain immediately if any <spanx style="verb">id</spanx> appears more than
once. The relying party MUST enforce an implementation-defined
maximum recursion limit no greater than the smallest <spanx style="verb">max_depth</spanx>
value observed in the chain.</t>
</list></t>

<t>Steps 1–7 are REQUIRED. Steps 8–9 are conditional on presence of the
relevant fields.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="replay-attacks"><name>Replay Attacks</name>

<t>AAEs with broad temporal validity windows are susceptible to replay
attacks. Implementations SHOULD use short <spanx style="verb">not_after</spanx> windows (minutes
to hours for high-value actions) and SHOULD implement nonce-based
replay protection at the transport layer.</t>

</section>
<section anchor="constraint-bypass"><name>Constraint Bypass</name>

<t>Relying parties that silently ignore unrecognized constraints create
a security gap. Relying parties MUST treat unrecognized constraints
with <spanx style="verb">required: true</spanx> as grounds for rejection.</t>

</section>
<section anchor="key-compromise"><name>Key Compromise</name>

<t>If an issuer's signing key is compromised, all AAEs signed by that key
are potentially invalid. Issuers MUST have an operational key-rotation
procedure and SHOULD publish revocation endpoints. Issuers SHOULD
retain verification material for retired signing keys for at least as
long as AAEs signed by those keys can remain valid, unless a key was
retired because of compromise. Issuers SHOULD provide a mechanism for
real-time revocation signaling to relying parties; continuous access
evaluation profiles defined by other standards bodies are one such
mechanism.</t>

</section>
<section anchor="delegation-amplification"><name>Delegation Amplification</name>

<t>Delegation chains that do not enforce constraint monotonicity allow
sub-agents to acquire permissions exceeding those of their parent.
Implementations MUST enforce that delegated AAEs are strictly
subordinate to their parent AAEs in actions, constraints, and validity.</t>

</section>
<section anchor="delegation-revocation"><name>Delegation Revocation</name>

<t>If a parent AAE or a delegator agent is compromised, the issuer SHOULD
treat all downstream delegated AAEs as revoked. A relying party that
determines that a parent AAE in a delegation chain has been revoked
SHOULD treat all descendant AAEs in that chain as invalid.</t>

</section>
<section anchor="clock-skew-and-time-synchronization"><name>Clock Skew and Time Synchronization</name>

<t>AAE validity depends on relying-party evaluation of <spanx style="verb">not_before</spanx>,
<spanx style="verb">not_after</spanx>, and challenge-response timestamps. Relying parties SHOULD
use authenticated time synchronization and SHOULD define a maximum
accepted clock-skew window. For high-value actions, relying parties
SHOULD keep the accepted skew to the minimum operationally feasible
value. Excessive clock-skew windows can allow premature use of an AAE
or its continued use after expiration.</t>

</section>
<section anchor="on-chain-anchoring"><name>On-Chain Anchoring</name>

<t>When AAEs are anchored to a public ledger for tamper-evident audit
trails, implementations MUST ensure that no personally identifiable
information (PII) is written on-chain. AAE content SHOULD be hashed
before anchoring; the hash, timestamp, and issuer DID are sufficient
for audit purposes.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>AAEs contain the agent's DID and may contain the principal's DID.
Relying parties SHOULD NOT log full AAE payloads unless required for
regulatory audit purposes. Where audit logs are required, implementations
SHOULD apply data minimization: log the AAE identifier, action taken,
timestamp, and outcome — not the full MANDATE or CONSTRAINTS payload.</t>

<t>Even when only hashes of AAEs are anchored on a public ledger,
timestamps, issuer DIDs, subject DIDs, and repeated hash-publication
patterns can leak metadata and enable linkability across an agent's
activity. Implementations SHOULD assess linkability risk before
anchoring AAEs on a public ledger and SHOULD avoid publishing stable
identifiers on-chain unless required.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="media-type-registration"><name>Media Type Registration</name>

<t>IANA is requested to register the following media type in the "Media
Types" registry, following the procedures of <xref target="RFC6838"/> and the
structured syntax suffix rules of <xref target="RFC6839"/>:</t>

<dl>
  <dt>Type name:</dt>
  <dd>
    <t>application</t>
  </dd>
  <dt>Subtype name:</dt>
  <dd>
    <t>aae+json</t>
  </dd>
  <dt>Required parameters:</dt>
  <dd>
    <t>N/A</t>
  </dd>
  <dt>Optional parameters:</dt>
  <dd>
    <t>N/A</t>
  </dd>
  <dt>Encoding considerations:</dt>
  <dd>
    <t>Same as for application/json <xref target="RFC8259"/>; UTF-8.</t>
  </dd>
  <dt>Security considerations:</dt>
  <dd>
    <t>See Section 6 of this document.</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>This media type uses the "+json" structured syntax suffix
<xref target="RFC6839"/>. Processors that do not understand application/aae+json
MAY process it as application/json.</t>
  </dd>
  <dt>Published specification:</dt>
  <dd>
    <t>This document.</t>
  </dd>
  <dt>Applications that use this media type:</dt>
  <dd>
    <t>Autonomous AI agent frameworks, authorization servers, policy
engines, and relying parties that issue or evaluate Agent
Authorization Envelopes.</t>
  </dd>
  <dt>Fragment identifier considerations:</dt>
  <dd>
    <t>As specified for the "+json" structured syntax suffix in
<xref target="RFC6839"/>.</t>
  </dd>
  <dt>Additional information:</dt>
  <dd>
    <t>Deprecated alias names for this type: N/A.
Magic number(s): N/A.
File extension(s): .aae.json.
Macintosh file type code(s): N/A.</t>
  </dd>
  <dt>Person &amp; email address to contact for further information:</dt>
  <dd>
    <t>Lars Kersten Kroehl <eref target="mailto:lars@moltrust.ch">lars@moltrust.ch</eref></t>
  </dd>
  <dt>Intended usage:</dt>
  <dd>
    <t>COMMON</t>
  </dd>
  <dt>Restrictions on usage:</dt>
  <dd>
    <t>N/A</t>
  </dd>
  <dt>Author:</dt>
  <dd>
    <t>Lars Kersten Kroehl</t>
  </dd>
  <dt>Change controller:</dt>
  <dd>
    <t>Lars Kersten Kroehl, CryptoKRI GmbH</t>
  </dd>
</dl>

<t>This registration applies to the unsecured JSON AAE payload. A secured
AAE in JWS compact serialization is not a JSON document and is
transported using the application/jose media type defined in
<xref target="RFC7515"/>; this document does not register a separate media type for
the secured form.</t>

<t>This document requests no other IANA actions.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="W3C-DID" target="https://www.w3.org/TR/did-core/">
  <front>
    <title>Decentralized Identifiers (DIDs) v1.0</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2022" month="July" day="19"/>
  </front>
</reference>
<reference anchor="W3C-VC" target="https://www.w3.org/TR/vc-data-model-2.0/">
  <front>
    <title>Verifiable Credentials Data Model v2.0</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2024" month="May" day="08"/>
  </front>
</reference>
&RFC2119;
&RFC8174;
&RFC7515;
&RFC8037;
&RFC8032;
&RFC7517;
&RFC3986;
&RFC3339;
&RFC6570;
&RFC6234;
&RFC6838;
&RFC6839;
&RFC8259;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC6749;
&RFC9635;
&RFC9562;
<reference anchor="SPIFFE" target="https://spiffe.io/">
  <front>
    <title>SPIFFE: Secure Production Identity Framework for Everyone</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARXIV-AAE" target="https://arxiv.org/abs/2605.06738">
  <front>
    <title>From Specification to Deployment: Empirical Evidence from a W3C VC + DID Trust Infrastructure for Autonomous Agents</title>
    <author initials="L. K." surname="Kroehl" fullname="Lars Kersten Kroehl">
      <organization></organization>
    </author>
    <date year="2026" month="May"/>
  </front>
</reference>
<reference anchor="IMDA-MGF" target="https://www.imda.gov.sg/-/media/imda/files/about/emerging-tech-and-research/artificial-intelligence/mgf-for-agentic-ai.pdf">
  <front>
    <title>Model AI Governance Framework for Agentic AI, Version 1.5</title>
    <author >
      <organization>Singapore IMDA</organization>
    </author>
    <date year="2026" month="May" day="20"/>
  </front>
</reference>
<reference anchor="NIST-CAISI" >
  <front>
    <title>NIST AI 100-1: Artificial Intelligence Risk Management Framework</title>
    <author >
      <organization>NIST</organization>
    </author>
    <date year="2023" month="January"/>
  </front>
</reference>


    </references>

</references>


<?line 805?>

<section anchor="example-travel-booking-agent"><name>Example: Travel Booking Agent</name>

<t>A travel booking agent operating under an 8-hour mandate with a $500
transaction cap. The example shows the JWS protected header and the
JWS payload (the unsecured Verifiable Credential); on the wire these
are BASE64URL-encoded and concatenated with the signature as a JWS in
compact serialization (Section 2.1).</t>

<t>JWS protected header:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "alg": "EdDSA",
  "cty": "aae+json",
  "kid": "did:moltrust:registry#key-1"
}
]]></sourcecode></figure>

<t>JWS payload:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://moltrust.ch/contexts/aae/v1"
  ],
  "type": ["VerifiableCredential", "AgentAuthorizationEnvelope"],
  "id": "urn:uuid:9b1deb4d-3b7d-4bad-9bdd-2b0d7b3dcb6d",
  "issuer": "did:moltrust:registry",
  "validFrom": "2026-05-20T08:00:00Z",
  "credentialSubject": {
    "id": "did:example:travel-agent-001",
    "aae": {
      "mandate": {
        "actions": ["read", "book", "pay"],
        "purpose": "Business travel booking",
        "scope": "travel-vertical",
        "principal_did": "did:example:enterprise-corp"
      },
      "constraints": {
        "max_transaction_value": {
          "value": 500, "currency": "USD", "required": true
        },
        "allowed_domains": {
          "value": ["flights.example.com", "hotels.example.com"],
          "required": true
        }
      },
      "validity": {
        "not_before": "2026-05-20T08:00:00Z",
        "not_after": "2026-05-20T16:00:00Z",
        "single_use": false
      }
    }
  }
}
]]></sourcecode></figure>

</section>
<section anchor="relationship-to-existing-standards"><name>Relationship to Existing Standards</name>

<t>AAE is designed as a complement to, not a replacement for, existing
authorization standards:</t>

<t><list style="symbols">
  <t><strong>OAuth 2.0 / GNAP</strong> (<xref target="RFC6749"/>, <xref target="RFC9635"/>): Handle
human-delegated access tokens. AAE handles machine-to-machine agent
authorization with richer semantics.</t>
  <t><strong>SPIFFE/SVID</strong> (<xref target="SPIFFE"/>): Handles workload identity in service
meshes. AAE handles authorization semantics layered above identity.</t>
  <t><strong>W3C Verifiable Credentials</strong>: AAE is issued as a VC, leveraging
the existing VC ecosystem for issuance, verification, and revocation.</t>
  <t><strong>W3C DIDs</strong>: AAE subjects and issuers are identified by DIDs,
enabling decentralized, portable agent identity.</t>
</list></t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The AAE specification is derived from the MolTrust production
deployment documented in <xref target="ARXIV-AAE"/>. The author thanks Harald
Rössler (DSNCON GmbH) for infrastructure and security review.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

