IDENTITY AS INFRASTRUCTURE

From Authentication to Authorization to Delegation

We optimized for the wrong question.

Recent Writing

AAuth Now Has a Mission Layer

The new version of AAuth (draft-hardt-aauth-protocol-01) materially changes the earlier comparison. Mission is now first-class in the protocol, with PS-mediated approval, mission-aware token choreography, and governance endpoints. The remaining gap is no longer whether Mission exists, but whether the published model is strong enough to support portable containment rather than just mission correlation and governance hooks.

AAuth Authorization Agentic Identity OAuth Mission Shaping Standards

ID-JAG Beyond the Enterprise IdP

ID-JAG, also often called Cross-App Access (XAA), is centered in the current draft on Enterprise IdP trust, but the issuer that matters is the immediate IdP the downstream authorization server already trusts for SSO and subject resolution, not necessarily the top-level workforce IdP. The same trust pattern can also extend architecturally to CIAM and platform identity layers that federate upstream workforce login while remaining authoritative for downstream product trust, tenant context, and subject resolution.

ID-JAG Authorization IAM OAuth OpenID Connect Agentic Identity CIAM XAA
Series Mission-Bound OAuth Part 4 of 4

Why Mission-Bound OAuth Might Be the Wrong Answer

Mission-Bound OAuth is a serious attempt to govern delegated agent authority using existing OAuth infrastructure. This post takes the pessimistic view: it may be the wrong answer because it asks the authorization server to become a governance engine, a lifecycle controller, and a mission ledger all at once. A cleaner alternative is to treat Mission as a separate authority service and let OAuth be one projection of that model rather than its home.

OAuth Authorization Agentic Identity Architecture IAM
Series Mission-Bound OAuth Part 3 of 4

Mission Architecture on AAuth

Mission-Bound OAuth argues for a durable Mission object that governs delegated authority across approval, lifecycle, delegation, and termination. This follow-up asks whether Dick Hardt’s AAuth draft is a better protocol substrate for the same model, and where AAuth still appears to need an explicit Mission-like authority object.

OAuth Authorization Agentic Identity AAuth
Series Mission-Bound OAuth Part 2 of 4

Client Context and ID-JAG for Mission-Bound OAuth

Rich Authorization Requests are the natural first instinct for agent missions, but audience-bound access tokens and uneven cross-domain interoperability limit how far they can carry a governed task. Mission-Bound OAuth solves that by making the Mission a durable authority object at the authorization server. This post explores the authentication-layer companion profile: OpenID Connect Client Context carries purpose and approval input when the user is present, and ID-JAG carries reduced Mission projections across same-IdP trust domains.

Agentic Identity Delegated Authority IAM OAuth OpenID Connect Authorization ID-JAG