<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yao-agent-auth-considerations-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Agent AuthN and AuthZ ">Further considerations on AI Agent Authentication and Authorization Based on OAuth Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-yao-agent-auth-considerations-01"/>
    <author initials="K." surname="Yao" fullname="Kehan Yao">
      <organization>China Mobile</organization>
      <address>
        <email>yaokehan@chinamobile.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <abstract>
      <?line 35?>

<t>Agent Communication Network(ACN) is becoming a promising and fundamental infrastructure for most vertical industries. To construct and build a scalable and trustable ACN, authentication and authorization of AI agents are critical requirements. This document extends the model of OAuth and proposes new workflows for AI agent authentication and authorization.</t>
    </abstract>
  </front>
  <middle>
    <?line 39?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the rapid development of large language models(LLMs) and AI applications, an AI agent is becoming an emerging entity that can help improve working efficiency. There are different types of AI agents, e.g., physical and virtual entities, and many promising use cases of AI agents have been mentioned in <xref target="I-D.rosenberg-aiproto-framework"/>. All of these AI agents will join to build a new Internet infrastructure, which is called as Agent Communication Network(ACN). To build such future networks is not easy, challenges and requirements for new protocols are discussed in <xref target="I-D.rosenberg-aiproto-framework"/>. Key requirements include, the discovery, procedures and mechasims of AI agents to establish message routing and connection management. A fundamental component and of critical importance for any new AI agent protocol is ensuring robust authentication and authorization.</t>
      <t>The complexity of AI agent authentication and authorization exists in that agent may have different roles and capabilities. AI agents may work On-behalf-of(OBO) users, itself, or other AI agents. In different cases, there are different requirements on the authentication and authorization, leading to different workflows. More importantly, agents may communicate with API proxy server, like MCP server to call API and access external resources, this makes the authentication and authorization problems more complex. <xref target="I-D.oauth-ai-agents-on-behalf-of-user"/> considers the case when AI agents work OBO their users, and <xref target="I-D.rosenberg-oauth-aauth"/> defines the extension of OAuth 2.1 for AI agents. This document further considers more cases on AI agents authentication and authorization based on OAuth extensions.</t>
      <t>This document describes an extension to the OAuth to support authentication and authorization among AI agents within ACNs. It defines three operational modes in which agents act on behalf of users, themselves, or other agents, introduces the concept of an AID, and discusses integration with API proxy servers such as the MCP.</t>
    </section>
    <section anchor="definition-of-terms">
      <name>Definition of Terms</name>
      <ul spacing="normal">
        <li>
          <t>AI Agent: an entity with built-in intelligence, which can help or replace humans implement jobs and improve work efficiency.</t>
        </li>
        <li>
          <t>Types of AI Agents:  </t>
          <ul spacing="normal">
            <li>
              <t>Physical AI Agent: a physical entity with embedded intelligence, usually refers to some AI terminals, e.g., AI robot, embodied AI.</t>
            </li>
            <li>
              <t>Virtual AI Agent: a virtual entity that can provide intelligence, usually refers to some softwarized AI assistant, e.g., a chat assistant with a mobile application.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Ownership and Roles of AI Agents:  </t>
          <ul spacing="normal">
            <li>
              <t>OBO User: the agent may require the authorization from users to implement jobs for users.</t>
            </li>
            <li>
              <t>OBO Agent Itself: the agent itself has identification and implements jobs and represents itself.</t>
            </li>
            <li>
              <t>OBO Other Agent(s): the agent may represent other agents to implement some jobs, given that other agents may not have the capabilities to implement the jobs.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Agent Communication Network(ACN): a network infrastructure which supports the interconnection, routing, capabilities announcement, and task collaboration of different types of AI agents.</t>
        </li>
        <li>
          <t>Agent Identifier(AID): An independent identifier of AI agent.</t>
        </li>
        <li>
          <t>API Proxy Server: A middlebox server that helps AI agent to call APIs or access external data resources. A typical example is the Model Context Protocol(MCP) server.</t>
        </li>
        <li>
          <t>Domain:  </t>
          <ul spacing="normal">
            <li>
              <t>Task-wise Domain: a temporary domain that is created to target on a specific job, when the job is finished, the domain is destroyed. A typical example is a domain that is created by 5G/6G core network.</t>
            </li>
            <li>
              <t>Application Domain: a durable domain that is created by a specific application, e.g., a web or mobile application offered by cloud service providers.</t>
            </li>
          </ul>
          <t>
The definition of resource server, resource owner, authorization server, and client reuse the definition in <xref target="RFC6749"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="aauth-agent-obo-its-users">
      <name>Aauth: Agent OBO Its User(s)</name>
      <section anchor="example-case">
        <name>Example Case</name>
        <t>A typical use case of AI agent on-behalf-of the user to access public resources can be a virtual agent assistant. For example, a trip planning app assistant helps the user to plan trips. This case is obvious and similar ones have been mentioned in <xref target="I-D.rosenberg-aiproto-framework"/>. In this case, when the trip assistant needs to search for the current balance of the user, it needs the authorization of the user to access his bank account app. While it may also need to search for hotels, and it may require the account of the user under some booking applications. In addition, it may also need to use some of the data stored in the cloud personal gallery, which may require temporary access token. Therefore, AI agent OBO user(s) need different levels of authentication and authorization to access these resources.</t>
      </section>
      <section anchor="model">
        <name>Model</name>
        <t><xref target="agent-obo-user"/> shows the extension of the OAuth 2.0 model proposed in <xref target="RFC6749"/>. There are several updates and new components in this model. The big difference is the introduction of AI agent and API proxy server. If under traditional OAuth 2.0 model, client(AI agent) will directly communicate with resource owners and resource servers. But this is not efficient and scalable in the AI era, since an agent may consult many resource owners at the same time, and different resource owners may require different levels of privileges to access protected resources. To overcome the issue, industries have proposed Model Context Protocol(MCP). It introduces MCP server and protocol to let AI agents only communicate with the MCP server to request for resources. The MCP server will help AI agents to do API calling and specific data resource access. In <xref target="agent-obo-user"/>,  MCP server refers to the API proxy server. In the diagram, API proxy server will communicate with different resource owners and resource servers. The agent may also support communicating directly with the resource owner and resource server. For example, the resource owner is another agent that is interconnected with the agent itself.</t>
        <figure anchor="agent-obo-user">
          <name>AI Agent OBO User Workflow</name>
          <artwork><![CDATA[
 
                                             2          +--------+
                                          +------------->Resource|
                                          |+------------+Owner 1 |
                                          || 3          +--------+
                                          ||      8     +--------+
                                          ||  +-------->|Resource|
                                +------+  ||  |+--------+Server 1|
                                |      +--+|  ||  9     +--------+
                                |      <---+  ||                  
                        +------->  API +------+| 
                        |       | Proxy|       |
                        | +-----|Server<-------+                  
                        | |     |      |                          
                        | |     |      +-----+
                        | |     |      <-+   |   2      +--------+
                        | |     +---^+-+ |   +--------->|Resource|
                    1,7 | |         ||   +--------------+Owner 2 |
                        | |4,10     ||     3            +--------+
                        | |         ||          8       +--------+
                        | |         |+----------------->|Resource|
+----+  0     +-----+   | |         +-------------------+Server 2|
|User+-------->     +---+ |                  9          +--------+
|    <--------+     <-----+
+----+  11    |     |          1             +--------+
              |  AI +----------------------->|Resource|
              |Agent<------------------------+Owner 3 |
              |     |          4             +--------+
              |     +-----------+     7      +--------+   
              |     |           +----------->|Resource| 
              |     <------------------------+Server 3|
              +--^-++              9         +--------+          
                 | |                          
                 | |                                            
                 | |  5         +-------+                     
                 | +------------> Auth  |                    
                 +--------------+Servers|                   
                      6         +-------+                      
]]></artwork>
        </figure>
      </section>
      <section anchor="workflow">
        <name>Workflow</name>
        <t>The detailed workflow of <xref target="agent-obo-user"/> is as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Step 0, the user initially asks for AI agent for some tasks via prompts.</t>
          </li>
          <li>
            <t>Step 1, the AI agent interpret the prompts and communicate with the API proxy server to search for specific data resources and implement function calling. Alternatively, the agent will ask the resource server for the grant if they are directly connected.</t>
          </li>
          <li>
            <t>Step 2, the API proxy server asks for multiple resource owners for the grant of access of the protected data resources.</t>
          </li>
          <li>
            <t>Step 3, resource owners reply to the API server what authentication grant(e.g., authorization code) they need for the access to the required resource.</t>
          </li>
          <li>
            <t>Step 4, the API proxy server will gather messages from different resource owners and reply to the AI agent containing multiple authorization grants from different resource owners. Alternatively, resource owner 3 will replies to the agent with the authorization grant directly.</t>
          </li>
          <li>
            <t>Step 5, the AI agent communicates with different authorization servers with multiple authorization grants.</t>
          </li>
          <li>
            <t>Step 6, auth servers reply to the AI agent with the required access tokens.</t>
          </li>
          <li>
            <t>Step 7, AI agent replies to the API server with the required access tokens. Alternatively, it directly sends the access token to the resource server(resource server 3).</t>
          </li>
          <li>
            <t>Step 8, the API proxy server sends different access tokens to different resource servers respectively.</t>
          </li>
          <li>
            <t>Step 9, resource servers send protected data resources to the API proxy server. The resource server 3 directly sends the protected data resources to the AI agent.</t>
          </li>
          <li>
            <t>Step 10, the API proxy server replies to the AI agent with the information that it needs.</t>
          </li>
          <li>
            <t>Step 11, AI agent replies to the user with the answer.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="aauth-agent-obo-itself">
      <name>Aauth: Agent OBO Itself</name>
      <section anchor="example-case-1">
        <name>Example Case</name>
        <t>In addition to virtual AI agents, there is another type, physical AI agent. AI robots, embodied AI, and other AI terminals have differentiated capabilities to implement multiple jobs. For example, in a remote rescue case, an AI search and rescue vehicles, and an robot dog can be dynamically formed into a networked system. The robot dog can scan and transmit the live videos to remote console and control signals to the AI search and rescue vehicle, while the AI search and rescue vehicles can use its robotic arm to move obstacles based on the signals from the robot dog or the remote console. Some other similar cases are mentioned in <xref target="TR22.870"/>.<br/>
Compared to the case in which the agent is OBO its user, the major difference in this case is that agent need identification of itself, that is the agent identification(AID). In previous case, agent can be assigned a Client ID(CID). The scope of its authority is determined by its user, and is less than its users' authority scope. While if agent is OBO itself, it is the user. So it has the same privilege as the user. How to define the AID needs further discussion and is beyond the scope of this document.</t>
      </section>
      <section anchor="model-1">
        <name>Model</name>
        <t>The model of the agent OBO itself can be extended from<xref target="I-D.ietf-oauth-v2-1"/>. As shown in <xref target="agent-obo-itself"/>, the AI agent is the resource owner. When assigned with some specific tasks, it may enable some software functions, and then it will trigger the client within these software functions for authentication and authorization.</t>
        <figure anchor="agent-obo-itself">
          <name>AI Agent OBO Itself Workflow</name>
          <artwork><![CDATA[
 +---------+                               +---------------+
 |         |--(A)- Authorization Request ->|   Resource    |
 |         |                               |     Owner     |
 |         |<-(B)-- Authorization Grant ---|  (AI Agent or |
 |         |                               | Other owners) | 
 |         |                               +---------------+
 |         |
 |         |                               +---------------+
 |         |--(C)-- Authorization Grant -->| Authorization |
 | Client  |                               |     Server    |
 |         |<-(D)----- Access Token -------|               |
 |         |                               +---------------+
 |         |
 |         |                               +---------------+
 |         |--(E)----- Access Token ------>|    Resource   |
 |         |                               |     Server    |
 |         |<-(F)--- Protected Resource ---|               |
 +---------+                               +---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="workflow-1">
        <name>Workflow</name>
        <t>Detailed workflow is similar to <xref target="I-D.ietf-oauth-v2-1"/>, and will not be stated in detail.</t>
      </section>
    </section>
    <section anchor="aauth-agent-obo-other-agents">
      <name>Aauth: Agent OBO Other Agent(s)</name>
      <section anchor="example-case-2">
        <name>Example Case</name>
        <t>This case is more complex, but may be required if AI agents have differentiated capabilities and need to collaborate to finish some jobs, whatever the agents are from intra-domain or inter-domain, which has been discussed in <xref target="I-D.rosenberg-aiproto-framework"/>.<br/>
In this case, if one AI agent wants to access some protected data resources of other agents, or of the users of other agents. It needs the authorization from them. This is different compared to the situation that this agent only needs to seek for grant from the user it represents.</t>
      </section>
      <section anchor="model-2">
        <name>Model</name>
        <t><xref target="agent-obo-other-agents"/> shows the model when multiple agents work collaboratively, and there will be a chained authentication and authorization workflow. Before AI Agent A requests AI agent B to help it implement a job, there should be prior knowledge that both agents need mutual trust. If they come from the same domain, whatever it is a task-wise domain created by a console(e.g., 5G/6G core) or a durable domain created by a web application, they need verification from the 5G/6G core or the web application administrator. If they come from different domains, they may need verification from an open platform that organize and issue the AIDs. There are some ongoing work defining AID<xref target="I-D.narajala-ans"/>,<xref target="I-D.narvaneni-agent-uri"/>. With this pre-verification, agents can communicate with each other. But when one agent(AI agent B) needs access of the protected data resource of the user of AI agent A or AI agent C itself, it still need temporary authentication and authorization. In this chained authentication and authorization workflow, the core idea here is to let the agent OBO user or the agent OBO itself always to communicate with the authorization server to get the access token.</t>
        <figure anchor="agent-obo-other-agents">
          <name>AI Agent OBO Other Agents Workflow</name>
          <artwork><![CDATA[
      +------+                                     
      | Auth |                                
      |Server|                              
      +-^-+--+                 +------+    3   +--------+
        | |                    |      +-------->Resource|
        | |                    |      <--------+Owner 1 |       
       7| |8             +----->  API |    4   +--------+
        | |              |     | Proxy|     
       ++-v--+           | +---|Server|   11   +--------+
       | AI  |           | |   |      +-------->Resource|                  
       |Agent|           | |   |      <--------+Server 1|
       |  C  |           | |   |      |    12  +--------+
       +-^-+-+           | |   +------+   
         | |         2,10| |         
         | |             | |5,13     
      6,9| |1,14         | |                  
 +----+  | |   +-----+   | |         
 |User|  | |   |     +---+ |                  
 |    |  | +--->     <-----+
 +-+^-+  +-----+     |          2             +--------+
   ||          |  AI +----------------------->|Resource|
  0||15        |Agent<------------------------+Owner 2 |
 +-v+--+       |  B  |          5             +--------+
 | AI  | 6,14  |     +-----------+     10     +--------+   
 |Agent<-------+     |           +----------->|Resource| 
 |  A  +------->     <------------------------+Server 2|
 |     |  1,9  +-----+              13        +--------+          
 +--^-++          
    | |                                                       
    | |          7               +------+                     
    | +--------------------------> Auth |                    
    +----------------------------+Server|                   
                       8         +------+                    
]]></artwork>
        </figure>
      </section>
      <section anchor="workflow-2">
        <name>Workflow</name>
        <t>The detailed workflow of <xref target="agent-obo-other-agents"/> is as follows:</t>
        <t>Step 0, a user asks its AI agent(AI agent A) for some help.</t>
        <t>Step 1, AI agent A redirects the help to Agent B when A is not capable, and Agent C asks for B's help too.</t>
        <t>Step 2, agent B ask API proxy server to call APIs. Agent may also request resource owner's grant for its protected data resources.</t>
        <t>Step 3, the API proxy server send requests to resource owner 1.</t>
        <t>Step 4, the resource owner 1 send access grant to the API proxy server.</t>
        <t>Step 5, the API proxy server and resource owner 2 send the access grant to AI agent B.</t>
        <t>Step 6, AI agent B redirects the access grants to AI agent A or AI agent C, considering the resource belong to whom.</t>
        <t>Step 7, AI agent A and AI agent C send access grants to authorization servers.</t>
        <t>Step 8, authorization servers replies with authorization tokens.</t>
        <t>Step 9, Agent A and agent C pass the access tokens to agent B.</t>
        <t>Step 10, AI agent B passes the access tokens to API proxy server or resource owner 2, considering what resource agent B wants to access.</t>
        <t>Step 11, the API proxy server passes the access token to resource owner 1.</t>
        <t>Step 12, resource owner 1 gives the protected data resource to the API proxy server.</t>
        <t>Step 13, agent B gathers the data resources from the API proxy server and resource owner 2.</t>
        <t>Step 14, agent B sends back the processing result to agent A or agent C.</t>
        <t>Step 15, agent A processes further and sends back the final result to the user.</t>
      </section>
    </section>
    <section anchor="considerations-on-other-important-factors">
      <name>Considerations on Other Important Factors</name>
      <section anchor="grant-dynamicity">
        <name>Grant Dynamicity</name>
        <t><xref target="RFC7591"/> mentions the mechanism to realize dynamic client registration. Whether and when to grant AI agents with short-lived or long-lived authentication and authorization may need further discussion, considering various use cases that AI agents participant.</t>
      </section>
      <section anchor="specific-identity-for-ai-agent">
        <name>Specific Identity for AI Agent</name>
        <t>As the second and the third case mentions in the previous section, AI agents may have independent identities in ACN. The definition of AIDs is not within the scope of this document, but directly impacts authentication and authorization methods.</t>
      </section>
      <section anchor="can-ai-agents-represent-users-to-consent-requests">
        <name>Can AI Agents Represent Users to Consent Requests?</name>
        <t>In the third case mentioned in this document when agent is OBO other agents. This document assumes that agent can represent its user to request for access tokens, while the choice on whether to consent requests(authorization grant) is still left to the user or the agent(agent C). But it may evolve to the situation that AI agent can represent its user to give permission if there are some pre-validation on the content scope that AI agent can give external grants independently.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>AI Agent authentication and authorization introduce additional risks beyond those covered in <xref target="RFC6749"/> and <xref target="I-D.ietf-oauth-v2-1"/>. This section highlights specific threats and corresponding mitigations applicable to agent-to-agent (A2A) environments and Agent Communication Networks (ACN).</t>
      <t>Attention must be given to agent discovery, agent sandboxing, audit logging, and revocation mechanisms, and interactions should apply appropriate transport-layer security. It is worth noting autonomous agents may act persistently and at machine speed, which creates several additional security challenges.</t>
      <t>Specific aspects of security will be discussed in more detail in this document.</t>
      <section anchor="agent-impersonation-during-discovery">
        <name>Agent Impersonation during Discovery</name>
        <t>An adversary may attempt to impersonate a legitimate AI agent during the discovery phase, registering false endpoints or replaying previously valid credentials to obtain unauthorized access tokens or sensitive data.</t>
        <t>Agents must perform authenticated discovery using DNS or another verifiable directory service and complete a cryptographically signed handshake before establishing trust. Implementations might need to reject interactions with agents that cannot present verifiable handshake proofs.</t>
      </section>
      <section anchor="excessive-attribute-disclosure">
        <name>Excessive Attribute Disclosure</name>
        <t>During discovery and authorization, agents may disclose more identifying information than is necessary, creating privacy risks and enlarging the surface of attack. Privacy-preserving credential mechanisms may be used to reveal only the minimum attributes necessary for the transaction.
Authorization servers and relying parties should avoid requesting attributes not strictly required for policy enforcement.</t>
      </section>
      <section anchor="token-replay-and-intermediary-exfiltration">
        <name>Token Replay and Intermediary Exfiltration</name>
        <t>Access tokens exchanged between agents or through API proxy servers (e.g., MCP) may be intercepted or replayed by unauthorized intermediaries, resulting in impersonation or unauthorized resource access.</t>
        <t>A method should be used so that access tokens may be sender-constrained using mechanisms. Furthermore, tokens may be configured to have short lifetimes or be scoped narrowly to the required operation. For sensitive or human-triggered actions, a method to ensure that leaked tokens cannot independently authorize sensitive actions would be required.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7591">
          <front>
            <title>OAuth 2.0 Dynamic Client Registration Protocol</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="M. Machulak" initials="M." surname="Machulak"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This specification defines mechanisms for dynamically registering OAuth 2.0 clients with authorization servers. Registration requests send a set of desired client metadata values to the authorization server. The resulting registration responses return a client identifier to use at the authorization server and the client metadata values registered for the client. The client can then use this registration information to communicate with the authorization server using the OAuth 2.0 protocol. This specification also defines a set of common client metadata fields and values for clients to use during registration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7591"/>
          <seriesInfo name="DOI" value="10.17487/RFC7591"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-oauth-v2-1">
          <front>
            <title>The OAuth 2.1 Authorization Framework</title>
            <author fullname="Dick Hardt" initials="D." surname="Hardt">
              <organization>Hellō</organization>
            </author>
            <author fullname="Aaron Parecki" initials="A." surname="Parecki">
              <organization>Okta</organization>
            </author>
            <author fullname="Torsten Lodderstedt" initials="T." surname="Lodderstedt">
              <organization>SPRIND</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   The OAuth 2.1 authorization framework enables an application to
   obtain limited access to a protected resource, either on behalf of a
   resource owner by orchestrating an approval interaction between the
   resource owner and an authorization service, or by allowing the
   application to obtain access on its own behalf.  This specification
   replaces and obsoletes the OAuth 2.0 Authorization Framework
   described in RFC 6749 and the Bearer Token Usage in RFC 6750.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-v2-1-14"/>
        </reference>
        <reference anchor="I-D.rosenberg-aiproto-framework">
          <front>
            <title>Framework, Use Cases and Requirements for AI Agent Protocols</title>
            <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
              <organization>Five9</organization>
            </author>
            <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
              <organization>Cisco</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   AI Agents are software applications that utilize Large Language
   Models (LLM)s to interact with humans (or other AI Agents) for
   purposes of performing tasks.  AI Agents can make use of resources -
   including APIs and documents - to perform those tasks, and are
   capable of reasoning about which resources to use.  To facilitate AI
   agent operation, AI agents need to communicate with users, and then
   interact with other resources over the Internet, including APIs and
   other AI agents.  This document describes a framework for AI Agent
   communications on the Internet, identifying the various protocols
   that come into play.  It introduces use cases that motivate features
   and functions that need to be present in those protocols.  It also
   provides a brief survey of existing work in standardizing AI agent
   protocols, including the Model Context Protocol (MCP), the Agent to
   Agent Protocol (A2A) and the Agntcy Framework, and describes how
   those works fit into this framework.  The primary objective of this
   document is to set the stage for possible standards activity at the
   IETF in this space.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rosenberg-aiproto-framework-00"/>
        </reference>
        <reference anchor="I-D.oauth-ai-agents-on-behalf-of-user">
          <front>
            <title>OAuth 2.0 Extension: On-Behalf-Of User Authorization for AI Agents</title>
            <author fullname="Thilina" initials="T." surname="Thilina">
              <organization>WSO2</organization>
            </author>
            <author fullname="Ayesha Dissanayaka" initials="A." surname="Dissanayaka">
              <organization>WSO2</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   This specification extends the OAuth 2.0 Authorization Framework
   [RFC6749] to enable AI agents to securely obtain access tokens for
   acting on behalf of users.  It introduces the *requested_actor*
   parameter in authorization requests to identify the specific agent
   requiring delegation and the *actor_token* parameter in token
   requests to authenticate the agent during the exchange of an
   authorization code for an access token.  The flow can be initiated by
   a resource server challenge, ensuring that user consent is obtained
   dynamically when access is attempted.  This extension ensures secure
   delegation with explicit user consent, streamlines the authorization
   flow, and enhances auditability through access token claims that
   document the delegation chain from the user to the agent via a client
   application.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-oauth-ai-agents-on-behalf-of-user-02"/>
        </reference>
        <reference anchor="I-D.rosenberg-oauth-aauth">
          <front>
            <title>AAuth - Agentic Authorization OAuth 2.1 Extension</title>
            <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
              <organization>Five9</organization>
            </author>
            <author fullname="Pat White" initials="P." surname="White">
              <organization>Bitwave</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   This document defines the Agent Authorization Grant, an OAuth 2.1
   extension allowing a class of Internet applications - called AI
   Agents - to obtain access tokens in order to invoke web-based APIs on
   behalf of their users.  In the use cases envisaged here, users
   interact with AI Agents through communication channels - the Public
   Switched Telephone Network (PSTN) or texting - which do not permit
   traditional OAuth grant flows.  Instead, AI agents collect Personally
   Identifying Information (PII) through natural language conversation,
   and then use that collected information to obtain an access token
   with appropriately constrained scopes.  A primary considering is
   ensuring that the Large Language Model (LLM) powering the AI Agent
   cannot, through hallucination, result in impersonation attacks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rosenberg-oauth-aauth-01"/>
        </reference>
        <reference anchor="I-D.narajala-ans">
          <front>
            <title>Agent Name Service (ANS): A Universal Directory for Secure AI Agent Discovery and Interoperability</title>
            <author fullname="Ken Huang" initials="K." surname="Huang">
              <organization>DistributedApps.ai</organization>
            </author>
            <author fullname="Vineeth Sai Narajala" initials="V. S." surname="Narajala">
              <organization>Amazon Web Services</organization>
            </author>
            <author fullname="Idan Habler" initials="I." surname="Habler">
              <organization>Intuit</organization>
            </author>
            <author fullname="Akram Sheriff" initials="A." surname="Sheriff">
              <organization>Cisco Systems</organization>
            </author>
            <date day="16" month="May" year="2025"/>
            <abstract>
              <t>   The proliferation of AI agents requires robust mechanisms for secure
   discovery.  This document introduces the Agent Name Service (ANS), a
   novel architecture based on DNS addressing the lack of a public agent
   discovery framework.  ANS provides a protocol-agnostic registry
   mechanism that leverages Public Key Infrastructure (PKI) certificates
   for verifiable agent identity and trust.  The architecture features
   several key innovations: a formalized agent registration and renewal
   mechanism for lifecycle management; DNS-inspired naming conventions
   with capability-aware resolution; a modular Protocol Adapter Layer
   supporting diverse communication standards (A2A, MCP, ACP, etc.); and
   precisely defined algorithms for secure resolution.  This
   specification describes structured communication using JSON Schema
   and includes a comprehensive threat analysis.  The result is a
   foundational agent directory service protocol addressing the core
   challenges of secure discovery and interaction in multi-agent
   systems, paving the way for future interoperable, trustworthy, and
   scalable agent ecosystems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narajala-ans-00"/>
        </reference>
        <reference anchor="I-D.narvaneni-agent-uri">
          <front>
            <title>The agent:// Protocol -- A URI-Based Framework for Interoperable Agents</title>
            <author fullname="Yaswanth Narvaneni" initials="Y." surname="Narvaneni">
              <organization>Independent Researcher</organization>
            </author>
            <date day="15" month="October" year="2025"/>
            <abstract>
              <t>   This document defines the agent:// protocol, a URI template-based
   framework as described in RFC 6570 for addressing, invoking, and
   interoperating with autonomous and semi-autonomous software agents.
   It introduces a layered architecture that supports minimal
   implementations (addressing and transport) and extensible features
   (capability discovery, contracts, orchestration).  The protocol aims
   to foster interoperability among agents across ecosystems, platforms,
   and modalities, enabling composable and collaborative intelligent
   systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narvaneni-agent-uri-02"/>
        </reference>
        <reference anchor="TR22.870">
          <front>
            <title>Study on 6G Use Cases and Service Requirements</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 323?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
