IDENTITY AS INFRASTRUCTURE

From Authentication to Authorization to Delegation

We optimized for the wrong question.

Recent Writing

Mission Architecture on AAuth

Mission-Bound OAuth argues for a durable Mission object that governs delegated authority across approval, lifecycle, delegation, and termination. This follow-up asks whether Dick Hardt’s AAuth draft is a better protocol substrate for the same model, and where AAuth still appears to need an explicit Mission-like authority object.

OAuth Authorization Agentic Identity AAuth

Mission-Bound OAuth

OAuth answers whether a request is permitted right now. Mission-Bound OAuth asks whether a delegated mission should still be running at all. This RFC proposes a durable Mission object at the Authorization Server that governs token derivation, lifecycle, delegation, and termination across agent execution.

OAuth Authorization Agentic Identity Internet-Draft

Client Context and ID-JAG: Encoding Mission at the Authentication Layer

Rich Authorization Requests are the natural first instinct for encoding agent missions, but access tokens are audience-bound and cross-domain authorization server interoperability is limited. The OpenID Connect Client Context draft takes a different approach: encoding mission intent at authentication time so the ID Token becomes the portable trust anchor for cross-domain access via the Identity Assertion Authorization Grant pattern. Three enforcement layers result: the OpenID Provider enforces mission policy at authentication, the agent runtime enforces it before any external call, and downstream authorization servers enforce it at access time.

Agentic Identity Delegated Authority IAM OAuth OpenID Connect Authorization ID-JAG
Series You Don't Give Agents Credentials. You Grant Them Power of Attorney. Part 1 of 3

Agents Don't Need Your Passport. They Need Your Authority.

Enterprise IAM was designed for human-paced execution. Agents remove the presence, pacing, and natural scope-limiting that made those controls work. The result is a structural gap that stronger credentials, tighter scopes, and faster JIT provisioning cannot close.

Agentic Identity Delegated Authority IAM OAuth Authorization Security Architecture
Series You Don't Give Agents Credentials. You Grant Them Power of Attorney. Part 2 of 3

From Passports to Power of Attorney

Tokens, credentials, and scopes tell a system what an agent may do. They say nothing about why execution was authorized or when it should end. The Execution Mandate is the primitive that closes that gap: a signed, inspectable authority record that runtime systems can evaluate and revoke throughout the execution lifecycle.

Agentic Identity Delegated Authority IAM OAuth Authorization Security Architecture
Series You Don't Give Agents Credentials. You Grant Them Power of Attorney. Part 3 of 3

Governing the Stay, Not Just the Entry

An Execution Mandate defines what delegated authority looks like. This post builds the control plane that makes it operational: how mandates are issued and held as authoritative artifacts, how authority is evaluated continuously rather than at gates, how governance crosses organizational boundaries, and where enforcement lands in practice.

Agentic Identity Delegated Authority IAM Authorization Security Architecture

Welcome to Control Plane

Identity is getting weird again, and in a good way. This blog is where I post hot takes, field notes, and analysis on identity, security, and agentic systems. Some posts will be tactical. Some will be opinionated. Some will be me zooming out and asking, “are we solving the right problem at all?” Lately I keep coming back to one thing: most of our stack is great at deciding who can get in, and still pretty weak at governing what autonomous systems should keep doing over time.

Identity Agentic Systems Platform Architecture Enterprise Identity