IDENTITY AS INFRASTRUCTURE

From Authentication to Authorization to Delegation

We optimized for the wrong question.

Recent Writing

Series Mission-Bound OAuth Part 4 of 4

Why Mission-Bound OAuth Might Be the Wrong Answer

Mission-Bound OAuth is a serious attempt to govern delegated agent authority using existing OAuth infrastructure. This post takes the pessimistic view: it may be the wrong answer because it asks the authorization server to become a governance engine, a lifecycle controller, and a mission ledger all at once. A cleaner alternative is to treat Mission as a separate authority service and let OAuth be one projection of that model rather than its home.

OAuth Authorization Agentic Identity Architecture IAM
Series Mission-Bound OAuth Part 3 of 4

Mission Architecture on AAuth

Mission-Bound OAuth argues for a durable Mission object that governs delegated authority across approval, lifecycle, delegation, and termination. This follow-up asks whether Dick Hardt’s AAuth draft is a better protocol substrate for the same model, and where AAuth still appears to need an explicit Mission-like authority object.

OAuth Authorization Agentic Identity AAuth
Series Mission-Bound OAuth Part 2 of 4

Client Context and ID-JAG for Mission-Bound OAuth

Rich Authorization Requests are the natural first instinct for agent missions, but audience-bound access tokens and uneven cross-domain interoperability limit how far they can carry a governed task. Mission-Bound OAuth solves that by making the Mission a durable authority object at the authorization server. This post explores the authentication-layer companion profile: OpenID Connect Client Context carries purpose and approval input when the user is present, and ID-JAG carries reduced Mission projections across same-IdP trust domains.

Agentic Identity Delegated Authority IAM OAuth OpenID Connect Authorization ID-JAG
Series You Don't Give Agents Credentials. You Grant Them Power of Attorney. Part 1 of 3

Agents Don't Need Your Passport. They Need Your Authority.

Enterprise IAM was designed for human-paced execution. Agents remove the presence, pacing, and natural scope-limiting that made those controls work. The result is a structural gap that stronger credentials, tighter scopes, and faster JIT provisioning cannot close.

Agentic Identity Delegated Authority IAM OAuth Authorization Security Architecture