| Internet-Draft | Agent Delegation Receipts | April 2026 |
| Nelson | Expires 28 October 2026 | [Page] |
This document defines the Delegation Receipt Protocol (DRP), a cryptographic authorization primitive for AI agent deployments. Before any agent action executes, the authorizing user signs an Authorization Object containing scope boundaries, time window, operator instruction hash, and model state commitment. This signed receipt is published to an append-only log before the agent runtime receives control. The protocol removes the operator as a trusted third party by making the user's private key the sole signing authority over the delegation record.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 28 October 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
Agentic AI systems execute actions on behalf of human principals using natural language instructions as their primary authorization artifact. This creates a structural gap between the authorization a user believes they granted and the instructions an operator delivers to the agent at runtime. No existing cryptographic mechanism makes that gap detectable.¶
This document specifies the Delegation Receipt Protocol (DRP), a cryptographic authorization primitive that addresses this gap. DRP requires every agent action to be preceded by a user-signed Authorization Object -- the Delegation Receipt -- anchored to a tamper-evident append-only log. The receipt commits the user's authorized scope, operational boundaries, validity window, and a cryptographic hash of the operator's stated instructions. Any deviation by the operator from those instructions is provable from the public log without additional trust assumptions.¶
DRP is not a replacement for existing IETF agent authorization work. WIMSE, AIP, and OAuth 2.0 Token Exchange [RFC8693] address service-to-agent trust. DRP addresses the upstream layer: user-to-operator trust. In a complete agentic trust stack, these layers are complementary.¶
A reference implementation of this protocol is available as an open-source SDK at https://github.com/Commonguy25/authproof-sdk under the MIT License. A hosted service implementing the protocol is available at https://cloud.authproof.dev with a free tier requiring no credit card.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
The following terms are used throughout this document:¶
Agentic AI systems involve at minimum three principals:¶
The delegation chain is:¶
User --> Operator --> Agent --> Services¶
The User grants authority to the Operator. The Operator translates that authority into instructions for the Agent. The Agent acts on downstream services. At each step, fidelity to the User's original intent depends entirely on the honesty and competence of the intermediate party.¶
In current agentic deployments, the User's authorization is captured in natural language -- a chat message, a consent checkbox, a terms-of-service agreement. None of these produce a cryptographically verifiable record of what the User actually authorized at the moment of delegation.¶
This creates three compounding problems:¶
Several IETF working groups have produced or are producing specifications for agent identity and authorization. Each addresses a different trust boundary; none addresses user-to-operator trust.¶
WIMSE (Workload Identity in Multi-System Environments) addresses service-to-service authentication: can service B verify that a request came from legitimate workload A? It does not address whether the workload was authorized by the User to make that request in the first place.¶
AIP (Agent Identity Protocol) defines credential structures for agent principals and addresses how agents present identity to services they call. Like WIMSE, its trust model is downstream of the Operator -- it assumes the Operator has correctly represented the User's authorization.¶
draft-klrc-aiagent-auth addresses OAuth-style authorization flows for AI agents, allowing agents to obtain access tokens for downstream APIs. It solves the service authorization problem -- whether the agent can call an API -- but not the delegation integrity problem -- whether the Operator's instructions faithfully represent the User's authorization.¶
OAuth 2.0 Token Exchange [RFC8693] and Rich Authorization Requests [RFC9396] provide mechanisms for scoped token issuance and delegation chains between services but operate at the service layer. The User's intent is represented by the OAuth grant, which is under Operator control.¶
The gap is consistent across all existing frameworks: user-to-operator trust is taken as a precondition. DRP addresses that precondition directly.¶
A Delegation Receipt is a JSON object with the following REQUIRED fields:¶
The following OPTIONAL fields are defined by this document:¶
The complete structure is illustrated below:¶
{
"delegationId": "<sha256-of-canonical-body>",
"version": "1",
"scope": {
"reads": ["<resource>:<operation>"],
"writes": ["<resource>:<operation>"],
"deletes": ["<resource>:<operation>"],
"executes": ["sha256:<capability-dag-hash>"]
},
"boundaries": ["<prohibition-string>"],
"timeWindow": {
"notBefore": "<ISO-8601-timestamp>",
"notAfter": "<ISO-8601-timestamp>"
},
"instructionHash": "sha256:<hex-digest>",
"operatorInstructions": "<operator-instruction-text>",
"signerPublicKey": { "<JWK per RFC 7517>" },
"signature": "<base64url-ecdsa-p256-signature>"
}
¶
The canonical serialization of a receipt body is defined as follows:¶
The delegationId is computed as:¶
delegationId = "sha256:" ||
lowercase_hex(SHA-256(canonical_body))
¶
Implementations MUST compute the delegationId over the body before the signature field is added. The signature field MUST NOT be included in the data that is signed.¶
Receipt issuance MUST follow this sequence:¶
The log timestamp established in step 5 is the authoritative issuance time. Client clocks MUST NOT be used as the time reference for receipt validation.¶
Each entry in the append-only log MUST contain:¶
Implementations SHOULD use a log format compatible with Certificate Transparency [RFC6962] to enable standard log consistency verification.¶
Action log entries produced during agent execution follow the same structure. Each action log entry MUST include:¶
Each log entry MUST include the SHA-256 hash of the immediately preceding entry. This chain structure guarantees:¶
The chain structure makes it impossible to insert or delete individual action records without producing a detectable inconsistency that any log monitor can identify.¶
Implementations MUST use an RFC 3161 [RFC3161] Time-Stamp Authority (TSA) to produce the authoritative timestamp for each Delegation Receipt anchored to the log. The TSA timestamp:¶
If the TSA is unreachable, implementations MAY record a local-clock timestamp marked "UNVERIFIED_TIMESTAMP". An agent verifier MUST treat UNVERIFIED_TIMESTAMP as insufficient evidence of authorization time in production deployments.¶
Before executing any action, the Agent MUST perform all of the following checks in order. All checks MUST pass; any single failure MUST abort the action without partial execution.¶
The complete verification procedure is:¶
Verify(receipt, action):
(1) if Revoked(receipt.delegationId)
-> fail
(2) if not VerifySig(receipt.signature,
canonical(receipt.body),
receipt.signerPublicKey)
-> fail
(3) if not InTimeWindow(receipt.timeWindow,
logTimestamp)
-> fail
(4) if not InScope(action, receipt.scope)
-> fail
(5) if ViolatesBoundary(action, receipt.boundaries)
-> fail
(6) if action.type == EXECUTE and
Hash(SafescriptDAG(program))
!= receipt.scope.executes[n]
-> fail
(7) if Hash(currentOperatorInstructions)
!= receipt.instructionHash
-> fail
return true
¶
The revocation pre-check (step 1) MUST be performed before any other check. A revoked receipt MUST fail immediately regardless of whether other checks would pass.¶
The check ordering reflects distinct security properties; each step eliminates a distinct attack surface.¶
When any verification check fails, the Agent MUST:¶
When a scope check (4) fails because an action is outside the current receipt's scope, the Agent MAY pause execution and request a Micro-Receipt from the User covering the specific action. The Micro-Receipt MUST reference the parent receipt hash and MUST be anchored to the append-only log before the action is attempted.¶
A valid Delegation Receipt proves that a User authorized an Agent to act within defined scope. It does not prove that the model executing the receipt is the model the User authorized. An Operator could silently substitute a fine-tuned model variant after the receipt is signed; all verification checks would pass because the receipt itself is genuine.¶
Model State Attestation closes this gap with a two-phase cryptographic protocol that binds the receipt to a measurement of model state at both delegation time and execution time.¶
Phase 1 -- Commitment (at delegation time):¶
The Operator commits to the exact model state that will execute. The commitment is a SHA-256 measurement of five components concatenated in canonical order:¶
modelMeasurement = SHA-256( normalize(modelId) || normalize(modelVersion) || systemPromptHash || runtimeConfigHash || receiptHash )¶
Including receiptHash as the fifth component binds the model measurement to the specific delegation. The same model with the same system prompt but a different receipt produces a different measurement. A commitment MUST NOT be reused across delegations.¶
The commitment is signed by the Operator's ECDSA P-256 key and attested by the TEE runtime, producing a sealed artifact that includes modelId, modelVersion, systemPromptHash, runtimeConfigHash, committedAt, the Operator's signature, and a TEE attestation quote.¶
Phase 2 -- Verification (at execution time):¶
Immediately before the agent function executes, the current model state is measured using the same five-component computation. The resulting measurement MUST equal the committed measurement. If the two measurements differ for any reason, execution MUST be blocked with a ModelDriftDetected error identifying exactly which components changed.¶
With Model State Attestation in place, the complete verifiable chain of accountability is:¶
+---------------------------+
| Delegation Receipt | <-- User signed
+---------------------------+
|
+---------------------------+
| Model State Commitment | <-- Hardware measured
+---------------------------+
|
+---------------------------+
| Execution Attestation | <-- TEE verified
+---------------------------+
|
+---------------------------+
| Action Log Entry | <-- Chain linked
+---------------------------+
|
+---------------------------+
| Data Flow Receipt | <-- Output policy
+---------------------------+
¶
An auditor presented with a chain proof can verify each layer independently and confirm that a logged action was taken by the model the User authorized, acting within the defined scope, under conditions unaltered since authorization was granted.¶
Hosted model providers may silently update the underlying model behind a versioned alias without Operator action. Treating this identically to a deliberate substitution attack is too blunt: it would block legitimate executions whenever a provider retires a model version, forcing operators to recommit on every provider maintenance cycle.¶
Model State Attestation distinguishes two categories of measurement mismatch:¶
The Operator explicitly changed the model identifier, system prompt, or runtime configuration after the commitment was signed. This MUST always be a hard block. Indicators are any of:¶
The model version changed, but the Operator's configured modelId is unchanged. The provider updated the model behind a stable alias. Indicators are all of:¶
Operators declare how provider updates are handled at construction time via the providerUpdatePolicy field:¶
The "reauthorize" policy preserves a recovery path. The provider update is flagged and the system halts, but the cause is identified as a non-malicious provider action. A human MUST explicitly invoke reauthorize() with userApproval: true before execution resumes. This is an explicit human-in-the-loop checkpoint; the system MUST NOT silently resume execution after a provider update.¶
The per-component comparison in the Phase 2 verification identifies exactly which aspects of model state changed: model identity, version, system prompt, or runtime configuration. This enables forensic analysis of how an unauthorized execution occurred.¶
The full SHA-256 measurement comparison is performed in addition to per-component comparison. This is redundant given the component checks but provides a cryptographic guarantee: even if the component comparison logic contains a bug, the measurement comparison will detect any state change.¶
Model State Attestation proves:¶
Model State Attestation does not prove that the committed model is safe, aligned, or correctly configured. It does not inspect the content of the system prompt. In simulation mode (the default for testing), attestations are signed with a software ECDSA key rather than produced by real TEE hardware. Production deployments SHOULD use Intel SGX, Intel TDX, or ARM TrustZone attestation.¶
The Scope Discovery Protocol addresses the upstream authorization gap: a User cannot correctly define agent scope before observing agent behavior. Asking users to define scope upfront produces one of two failure modes:¶
Neither outcome produces a receipt that reflects the User's actual intent. The scope field becomes a legal fiction rather than a genuine authorization boundary.¶
The Scope Discovery Protocol inverts the authorization sequence. Instead of asking Users to define scope before running the agent, it runs the agent first in a sandboxed simulation and uses the observed behavior to derive the scope definition.¶
The protocol proceeds in four stages:¶
The observation log is analyzed to produce:¶
The receipt produced by Scope Discovery is structurally identical to one produced by direct issuance. It carries all standard fields and MUST be verifiable by the standard Verify procedure (Section 6.1) without modification.¶
The critical property of observation-based scope generation is grounding: every entry in allowedActions corresponds to an operation the agent actually performed during a representative run. This is a structural record of what the agent did, not a user estimate of what it might need.¶
Grounding has three practical consequences:¶
For operators who trust their agent's observed behavior and do not require manual review, a guided mode provides a single-call end-to-end flow that runs observe, generate, approve, and finalize automatically. The returned riskFlags allow operators to inspect what was flagged even when they choose not to gate on it.¶
A Delegation Receipt is a static artifact. It answers one question at one moment in time: did this User authorize this Agent to perform this class of actions? It cannot answer whether a specific action is safe to take right now, given everything that has happened in this session.¶
Static receipts have three blind spots for long-running sessions:¶
SessionState closes these gaps by maintaining a live, stateful view of each session that evolves with every action. It tracks a trustScore for each session, initialized at 100 and bounded between 0 and 100.¶
Trust decays when anomalies are detected:¶
trustScore -= anomaly.severity * trustDecayRate¶
Anomaly severity levels are defined as:¶
Prompt injection detected : severity 5 Sensitive data in external dest. : severity 4 Frequency spike : severity 3 Scope edge usage : severity 2 First-time action : severity 1¶
Trust recovers slightly on each clean action:¶
trustScore += trustRecoveryRate (default: 0.01)¶
Session status is driven by trust score thresholds:¶
trustScore >= 30 : ACTIVE -- normal operation trustScore < 30 : DEGRADED -- risk scores amplified trustScore < 10 : SUSPENDED -- all actions blocked¶
The DEGRADED state does not block operations directly. Instead, it causes the risk scorer to apply a multiplier to every score, making previously marginal decisions tip into REQUIRE_APPROVAL or BLOCK territory.¶
Before each action, every payload is classified into one of four sensitivity levels:¶
RESTRICTED : SSN, credit card, medical identifiers, API keys
CONFIDENTIAL : Internal email addresses, system prompts,
database schemas, config files
INTERNAL : Company domain references, internal project
names, user IDs
PUBLIC : Everything else
¶
Each level modifies the block and approval thresholds:¶
RESTRICTED : Block threshold drops to at most 60 CONFIDENTIAL : Approval threshold drops to at most 40 INTERNAL : No change PUBLIC : All thresholds relax by +10¶
The complete decision engine evaluates five risk checks and maps the final score to one of three outcomes:¶
Check 1 -- Sensitive data scan: SSN pattern +35 Credit card pattern +35 API key pattern +30 High-entropy string +20 Prompt injection pattern +40 Password keyword +25 Check 2 -- External exfiltration: External domain + sensitive data +30 First-time external domain +15 Check 3 -- Frequency anomaly: Same action type >10x in 60s +25 >50 total actions in session +15 Check 4 -- Scope edge usage: New permission class +10 At scope boundary +10 Check 5 -- Trust multiplier: finalScore = rawScore * (1 + (100 - trust) / 100) if session.status == SUSPENDED --> BLOCK if finalScore >= blockThreshold --> BLOCK if finalScore >= approvalThreshold --> REQUIRE_APPROVAL else --> ALLOW¶
The checks are deterministic and ordered. The same action, payload, and session state always produce the same score. Every BLOCK or REQUIRE_APPROVAL decision SHOULD be accompanied by a structured reason object identifying which specific checks contributed to the score.¶
SessionState MUST be integrated with the PreExecutionVerifier as a final check, running after all static receipt checks pass (see Section 6.1). An action that passes all cryptographic checks but produces a BLOCK outcome from session risk evaluation MUST NOT execute.¶
The architectural insight is that authorization is not binary. A valid receipt is a necessary condition for execution, not a sufficient one. Real-world safety requires a live, stateful layer that observes behavior and adapts its decisions based on the full session context.¶
When a delegated Agent needs to hand off a subtask to another Agent, the chain of authority MUST remain auditable and bounded. DRP enforces three invariants at every delegation hop.¶
Each delegation step MUST produce a strict proper subset of the parent's authorized scope. Specifically:¶
The receipt chain MUST track delegation depth. The root receipt, signed directly by the User, is at depth 0. Each delegation increments depth by 1. When a delegation would produce a receipt at depth >= maxDepth, the implementation MUST raise a MaxDepthExceeded error before creating the receipt. The default maxDepth is 3, meaning at most three levels of agent-to-agent hand-off before the chain MUST be re-anchored at the User level.¶
The root receipt MUST carry a valid ECDSA P-256 signature from the User's key. If the root could be generated by an Agent or Operator without User involvement, the entire chain could be bootstrapped unilaterally, defeating the protocol. Any downstream Agent that wants to prove its authority can walk the chain to the root and demonstrate a continuous path of scope-narrowing receipts.¶
Revocation of a receipt in a multi-agent chain MAY or may not cascade to child receipts, depending on the revocation call.¶
Cascade revocation entries MUST be signed by the User's private key and anchored to the append-only log with the same requirements as the original revocation procedure (see Section 11.1).¶
DRP considers the following adversaries and mitigations:¶
When a User wishes to revoke a Delegation Receipt, they MUST:¶
The log anchor establishes the authoritative revocation time. Actions taken before this timestamp under the original receipt remain valid. Actions attempted after this timestamp MUST fail.¶
Verification MUST check revocation before any other check (Section 6.1, step 1). Because the revocation record is itself signed by the User and anchored to the log, it carries the same evidentiary weight as the original receipt. Revocation is auditable, tamper-evident, and does not depend on the Operator to propagate or acknowledge it.¶
The protocol does not eliminate the semantic gap between authorized scope and authorized intent. A User who authorizes "write to calendar" may not intend to authorize deletion of all existing events. The Scope Discovery Protocol (Section 8) narrows this gap by grounding scope definitions in observed agent behavior rather than user speculation.¶
The "executes" scope class narrows the gap further for code execution by requiring the SHA-256 hash of the program's static capability DAG rather than a program name or URI. A program identified by name or URI can be silently replaced; a program identified by its capability signature MUST have the same capability set as the authorized version. Any capability addition or removal changes the signature.¶
Natural language MUST NOT appear in any scope field. Scope entries MUST be structured resource:operation pairs. This restriction exists because natural language scope definitions are ambiguous, subject to interpretation, and cannot be used for deterministic validation. A scope entry of "manage email" does not deterministically resolve to a set of permitted or denied operations.¶
Cryptographic primitive upgrade path: DRP uses SHA-256 throughout for receipt ID computation, instruction hash commitment, manifest body hashing, action log chain linking, and revocation record linking. The version field in the receipt structure provides a migration path to SHA-3-256 (FIPS 202) or BLAKE3 in a future protocol version. Both are drop-in replacements for the SHA-256 role in this protocol. No structural redesign is required for a hash function migration.¶
Quantum resistance: ECDSA P-256 is vulnerable to Shor's algorithm on a sufficiently capable quantum computer. The signing layer of the protocol is therefore not post-quantum secure under current implementations. The migration path is through the FIDO2/WebAuthn credential layer: because all DRP signing is abstracted behind the WebAuthn API, a platform-level upgrade to post-quantum FIDO2 authenticators (e.g., CRYSTALS-Dilithium, FALCON) upgrades the protocol's quantum resistance without protocol-layer changes. The append-only log and hash commitment structures are unaffected -- SHA-256 preimage resistance is not threatened by known quantum algorithms.¶
For broader AI-specific risk management considerations beyond the cryptographic scope of this protocol, see the NIST AI Risk Management Framework [NIST-AI-100-1].¶
Cryptographic receipt verification alone cannot prevent a compromised agent runtime from calling the verifier with a spoofed receipt, receiving an "allowed" result, and then ignoring the scope. A three-layer enforcement model addresses this:¶
Without Layer 3, a compromised agent runtime could bypass the verifier. The eBPF LSM runs in kernel space and cannot be disabled by userspace code, including a compromised agent runtime. All three layers MUST be present for the enforcement model to be complete and non-bypassable.¶
Intel TDX and AMD SEV-SNP provide encrypted memory pages inaccessible to the host OS and hypervisor, hardware-rooted attestation quotes signed by the CPU vendor's key, and measured boot that hashes every component loaded into the enclave. DRP binds delegation receipts to enclave measurements via:¶
mrenclave = SHA-256( platform || verifierHash || modelHash )¶
This value is committed into the receipt's teeMeasurement.expectedMrenclave field at delegation time. At execution time, the runtime recomputes mrenclave from its runtime parameters and MUST reject execution if there is any mismatch.¶
The token injection sequence is:¶
When the delegation log is unavailable, implementations face a choice between fail-open and fail-closed behavior.¶
RECOMMENDATION: Implementations SHOULD fail-closed in regulated environments. When the append-only log cannot be reached for receipt publication, the pre-execution verifier MUST deny execution rather than proceed without log confirmation.¶
When operating against a locally cached revocation registry, implementations MUST note the cache timestamp and SHOULD reject receipts issued after the cache was last updated if the cache age exceeds a configurable maximum.¶
Implementations MAY continue execution in degraded mode with explicit operator acknowledgment, but MUST record the degraded status in the action log entry and MUST surface this status in any audit export produced during the degraded period.¶
Implementations SHOULD provide configuration to specify maximum acceptable cache age for revocation data, defaulting to one hour for regulated deployments.¶
This document has no IANA actions.¶
The authors thank the IETF WIMSE, OAuth, and SCITT working groups for their work on workload identity, token exchange, and supply chain integrity, which informed the design of this protocol.¶