<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mcguinness-oauth-actor-profile-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="OAuth Actor Profile">OAuth Actor Profile for Delegation</title>
    <seriesInfo name="Internet-Draft" value="draft-mcguinness-oauth-actor-profile-00"/>
    <author fullname="Karl McGuinness">
      <organization>Independent</organization>
      <address>
        <email>public@karlmcguinness.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="30"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>oauth</keyword>
    <keyword>delegation</keyword>
    <keyword>actor</keyword>
    <keyword>token exchange</keyword>
    <keyword>token</keyword>
    <abstract>
      <?line 110?>

<t>OAuth deployments increasingly involve agents and workloads acting on behalf of human users across organizational boundaries.  Existing specifications provide relevant building blocks (notably the <tt>act</tt> claim from RFC 8693 Token Exchange) but do not define a consistent profile for representing delegated actor relationships across JWT assertion grants (RFC 7523), JWT access tokens (RFC 9068), and Transaction Tokens, nor for classifying actor entity types or signaling support between authorization servers and resource servers.  The result is inconsistent actor representation and actor-representation interoperability gaps that force deployments to rely on proprietary conventions.</t>
      <t>This document defines the OAuth Actor Profile for Delegation.  It specifies a common <tt>act</tt> claim structure extended with <tt>sub_profile</tt> for entity-type classification, processing rules for authorization servers and resource servers across the three token families and their Token Exchange inputs, and OAuth discovery metadata parameters for advertising actor-profile support.  The profile applies uniformly across token types and integrates with existing sender-constraint mechanisms (DPoP, mTLS).  It does not standardize the policies by which systems determine whether a given actor is permitted to act for a subject; those decisions remain deployment-specific.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://mcguinness.github.io/draft-mcguinness-oauth-actor-profile/draft-mcguinness-oauth-actor-profile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mcguinness-oauth-actor-profile/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcguinness/draft-mcguinness-oauth-actor-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 117?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>When an agent acts on behalf of a user across trust domains, every system in the path needs to know who authorized the request and who is making it.  Existing specifications provide relevant building blocks (<xref target="RFC8693"/> introduced the <tt>act</tt> claim for Token Exchange) but do not define a consistent, interoperable way to represent delegated actor relationships across JWT assertion grants, JWT access tokens, and Transaction Tokens, nor how common Token Exchange input credentials should feed that representation.</t>
      <t>Several actor-representation interoperability gaps result from the absence of such a profile:</t>
      <ul spacing="normal">
        <li>
          <t><strong>No standard entity classification.</strong> The <tt>sub</tt> claim is routinely overloaded to represent heterogeneous entity types (end users, service accounts, AI agents, and workloads) without a standard classification mechanism, preventing deterministic cross-domain policy evaluation.</t>
        </li>
        <li>
          <t><strong>Inconsistent actor representation across token types.</strong> Actor context, including key material associated with the acting party, has no standard representation that survives token transformation, as JWT assertion grants, JWT access tokens, and Transaction Tokens are specified in separate documents with differing claim conventions.</t>
        </li>
        <li>
          <t><strong>Implicit delegation via client identity.</strong> Many deployments address actor representation through implicit delegation, inferring the acting party from the OAuth client identity (<tt>client_id</tt> or <tt>azp</tt>); this approach does not generalize to deployments where a single client registration fronts multiple agents, where requests pass through intermediary services, or where tokens cross organizational trust boundaries, because the client registration does not uniquely identify the runtime actor in those cases.</t>
        </li>
        <li>
          <t><strong>No discovery for actor-profile support.</strong> Neither AS metadata <xref target="RFC8414"/> nor Protected Resource Metadata <xref target="RFC9728"/> define parameters for advertising actor-profile support, requiring bilateral out-of-band configuration that does not scale to environments where clients dynamically discover services across trust domains.</t>
        </li>
      </ul>
      <t>The design center of this document is delegation clarity.  <tt>client_id</tt> identifies the OAuth client registration, <tt>sub</tt> identifies the authorizing principal, and <tt>act.sub</tt> identifies the actor exercising that authorization.  These are distinct concepts.  This profile makes the actor explicit in the token rather than leaving it to be inferred from client registration context, and it does so without redefining client identity or top-level subject semantics.</t>
      <t>This document addresses that gap by specifying:</t>
      <ul spacing="normal">
        <li>
          <t>A common actor profile structure that reuses <tt>act</tt> from <xref target="RFC8693"/> and adds <tt>sub_profile</tt> for entity-type classification.</t>
        </li>
        <li>
          <t>Processing rules for JWT assertion grants, JWT access tokens, and Transaction Tokens, covering Token Exchange inputs and outputs.</t>
        </li>
        <li>
          <t>A Token Exchange migration model that lets deployments move from bearer-style inputs to proof-of-possession outputs while preserving stable actor semantics.</t>
        </li>
        <li>
          <t>Resource-server guidance for evaluating delegated access using the (<tt>sub</tt>, outermost <tt>act.sub</tt>) pair.</t>
        </li>
        <li>
          <t>Integration with OAuth Entity Profiles and discovery metadata so actor classification and capability signaling can be used consistently across deployments.</t>
        </li>
        <li>
          <t>A stable extension model for companion profiles that add supplemental delegation data without altering core claim semantics.</t>
        </li>
      </ul>
      <t>The mechanisms are general-purpose and apply beyond AI agent scenarios.  This document is a profile and extension of existing OAuth building blocks; unless stated otherwise, the requirements of <xref target="RFC8693"/>, <xref target="RFC9068"/>, <xref target="RFC9449"/>, and <xref target="I-D.ietf-oauth-transaction-tokens"/> continue to apply.</t>
      <section anchor="illustrative-use-case">
        <name>Illustrative Use Case</name>
        <t>Alice authorizes an AI agent to book a business trip on her behalf, and the request crosses from the enterprise identity provider's domain into an external booking domain and then into the booking provider's internal service mesh.  The enterprise authorization server first issues a delegated credential that keeps Alice as <tt>sub</tt> and the agent as <tt>act</tt>; downstream issuers later transform that credential into an access token and, for the internal tool hop, a Transaction Token rebound to the booking tool as the new presenter.  Across those steps, the subject remains Alice, the immediate actor changes only when a new presenter is explicitly established, and each trust-domain boundary re-issues the token under local control.  <xref target="appendix-cross-domain">The cross-domain example</xref> provides the full end-to-end walkthrough.</t>
      </section>
      <section anchor="relationship-to-related-work">
        <name>Relationship to Related Work</name>
        <t><strong>OAuth Token Exchange (<xref target="RFC8693"/>)</strong>: This document profiles the <tt>act</tt> claim from <xref target="RFC8693"/>.  The actor object structure and processing rules supplement, and do not replace, the base Token Exchange requirements.</t>
        <t><strong>Identity Chaining (<xref target="I-D.ietf-oauth-identity-chaining"/>)</strong>: Identity Chaining addresses cross-domain subject-identity propagation; this document addresses actor representation within those same tokens.  The two are complementary and designed to be used together.</t>
        <t><strong>Identity Assertion JWT Authorization Grant (<xref target="I-D.ietf-oauth-identity-assertion-authz-grant"/>)</strong>: ID-JAG defines how an IdP issues a JWT authorization grant via Token Exchange and how a downstream AS consumes it.  ID-JAG permits <tt>actor_token</tt> inputs but leaves actor-delegation validation and resulting <tt>act</tt> claims to future profiles or extensions.  This document defines one such profile: when an implementation uses ID-JAG with actor-profile claims, the Token Exchange and JWT assertion-grant processing rules in this document apply.  See <xref target="appendix-cross-domain">the cross-domain example</xref> for an end-to-end walkthrough.</t>
        <t><strong>OAuth Entity Profiles (<xref target="I-D.mora-oauth-entity-profiles"/>)</strong>: Defines <tt>sub_profile</tt>, <tt>client_profile</tt>, <tt>entity_profiles_supported</tt>, and the entity profile registry.  This document consumes those mechanisms for actor classification and makes no independent registry requests.</t>
        <t><strong>Transaction Tokens (<xref target="I-D.ietf-oauth-transaction-tokens"/>)</strong>: This document extends the Transaction Token claim model with actor-profile support and adds actor-profile-specific TTS processing rules.  Base Transaction Token requirements continue to apply.</t>
        <t><strong>WIMSE Workload Identity (<xref target="I-D.ietf-wimse-workload-creds"/><xref target="I-D.ietf-wimse-wpt"/>)</strong>: Defines workload credentials used to authenticate workloads at token endpoints.  This document is mechanism-agnostic; <xref target="appendix-cross-domain">the cross-domain example</xref> illustrates a WIMSE-based TTS presenter binding.</t>
      </section>
    </section>
    <section anchor="conventions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Unless otherwise specified, OAuth terms such as client, authorization server, resource server, access token, refresh token, grant, Transaction Token, and Transaction Token Service (TTS) are used as defined in <xref target="RFC6749"/>, <xref target="RFC8693"/>, <xref target="I-D.ietf-oauth-transaction-tokens"/>, and related specifications.</t>
      <t>The following terms are used in this document:</t>
      <dl>
        <dt>Actor:</dt>
        <dd>
          <t>The party that is actively making a request.  When delegation is present, the actor is distinct from the subject; the subject is the principal on whose behalf the actor is acting.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>The principal whose authorization is being exercised.  In a delegated token, the subject is the original authorizing party (e.g., an end-user or an upstream service), not the party making the immediate network request.</t>
        </dd>
        <dt>Delegation:</dt>
        <dd>
          <t>The act by which a principal authorizes another party (the actor) to exercise a subset of the principal's rights.</t>
        </dd>
        <dt>Cross-Domain Delegation:</dt>
        <dd>
          <t>A delegation scenario in which the subject and actor are governed by different trust domains or different identifier namespaces under deployment policy.  This document does not define a universal interoperable algorithm for classifying a particular token instance as cross-domain.  Deployments typically make that determination from issuer context, actor identifier context, and the applicable trust framework or bilateral agreement.  The token's top-level <tt>iss</tt> alone is not sufficient to make that determination in all deployments.</t>
        </dd>
        <dt>Actor Authorization at the Resource Server:</dt>
        <dd>
          <t>An authorization policy evaluation that considers both the subject and the actor, and the relationship between them, as policy inputs.  Under this profile, the relevant actor is ordinarily the outermost actor.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>The sequence of actors representing how authorization has flowed from the subject principal (<tt>sub</tt>) to the first actor (innermost <tt>act</tt>) through any intermediate parties to the immediate actor (outermost <tt>act.sub</tt>).  The chain is conveyed structurally as the nested <tt>act</tt> claim.</t>
        </dd>
        <dt>Outermost Actor:</dt>
        <dd>
          <t>The <tt>act</tt> object at the top level of the delegation chain (the one not nested inside any other <tt>act</tt> object).  When a delegation chain of depth greater than one is present, the outermost actor identifies the immediate bearer of the token.</t>
        </dd>
        <dt>Local Policy:</dt>
        <dd>
          <t>Deployment-specific rules, configurations, or decisions made by an individual AS, RS, or organization that are not specified by this document.  Local policy <bcp14>MAY</bcp14> include delegation approval rules, scope-reduction algorithms, actor-identifier namespace mappings, and entity-profile acceptance criteria.  When this document references local policy, the specific decision logic is intentionally not standardized.</t>
        </dd>
        <dt>Identifier Reconciliation:</dt>
        <dd>
          <t>The process by which an AS or RS applies locally configured mapping rules to determine whether two identifiers from different claims or namespaces refer to the same underlying entity.  Identifier reconciliation is performed by applying configured mapping rules; string similarity, shared naming patterns, or deployment intuition are not sufficient bases for reconciliation.  When this document states that an implementation <bcp14>SHOULD</bcp14> perform identifier reconciliation, it <bcp14>SHOULD</bcp14> apply its configured mapping rules to determine whether the two identifiers are known to refer to the same entity.  When no applicable mapping rule exists or reconciliation cannot be established, the identifiers <bcp14>MUST</bcp14> be treated as distinct.</t>
        </dd>
      </dl>
      <t>Examples in this document are illustrative and focus on actor-profile-related claims and processing.  They may omit unrelated claims, parameters, or validation steps required by the underlying specifications for a complete deployment.</t>
      <t>This document uses dot-path notation to refer to nested claim values.  For example, <tt>act.sub</tt> refers to the <tt>sub</tt> member of the <tt>act</tt> object, and <tt>act.act.sub</tt> refers to the <tt>sub</tt> member of the <tt>act</tt> object nested within the outer <tt>act</tt> object (the immediately prior actor in a depth-2 chain).</t>
    </section>
    <section anchor="actor-profile">
      <name>Actor Profile for Delegation</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This profile specifies an extended form of the <tt>act</tt> claim defined in <xref target="RFC8693"/>.  When an implementation elects to use this profile in a context where an actor is distinct from the subject, it <bcp14>MUST</bcp14> apply the profile as defined in this section.  This document standardizes actor-profile claim structure, processing rules, and discovery metadata.  It does not standardize delegation approval policy, trust framework decisions, or identifier-mapping logic; those remain deployment-specific.  The absence of an explicit actor-carrying inbound credential <bcp14>MUST NOT</bcp14> be interpreted as meaning that the OAuth client automatically defines the delegated actor.</t>
      </section>
      <section anchor="profile-invariants">
        <name>Profile Invariants</name>
        <t>This document defines the following invariants:</t>
        <ul spacing="normal">
          <li>
            <t><tt>sub</tt> is the authorizing principal.</t>
          </li>
          <li>
            <t>The outermost <tt>act.sub</tt> is the immediate actor for the current token presentation.</t>
          </li>
          <li>
            <t>The canonical actor identifier conveyed by this profile is the (<tt>act.iss</tt>, <tt>act.sub</tt>) pair.</t>
          </li>
          <li>
            <t><tt>act.iss</tt> identifies the issuer or namespace context in which <tt>act.sub</tt> is to be interpreted; implementations <bcp14>MUST NOT</bcp14> reinterpret it as the issuer of the current token, a credential-issuer claim, or a hop-provenance marker.</t>
          </li>
          <li>
            <t>Nested <tt>act</tt> objects are preserved prior-actor context unless a deployment explicitly applies additional local-policy processing to them; they are not independently authenticated by the current issuer merely because they appear in a re-issued token.</t>
          </li>
          <li>
            <t><tt>client_id</tt> and <tt>azp</tt> are OAuth client identifiers, not actor identifiers.</t>
          </li>
          <li>
            <t>When the (<tt>act.iss</tt>, <tt>act.sub</tt>) pair identifies the same entity as the (<tt>iss</tt>, <tt>sub</tt>) pair of the token, no delegation is expressed and consumers <bcp14>MUST NOT</bcp14> infer a meaningful delegation relationship.  String equality of <tt>act.sub</tt> and <tt>sub</tt> alone is not a sufficient test; the issuer or namespace context must also be considered.</t>
          </li>
        </ul>
      </section>
      <section anchor="profile-scope">
        <name>Profile Scope</name>
        <section anchor="representation-and-policy">
          <name>Representation and Policy</name>
          <t>The interoperability defined by this profile operates at the representation and propagation layer, not at the authorization policy layer.  Conformance means that issuers and consumers represent, preserve, validate, and interpret actor claims consistently: using the same claim structure, the same processing rules across token types, and the same discovery metadata.  What this profile does not standardize is whether a specific actor is permitted to act on behalf of a specific subject for a specific scope; that authorization policy decision requires bilateral agreement, a trust framework, or deployment-specific configuration outside this document.  This document does not close that policy gap; it makes the actor explicit and consistently represented in the token so that such agreements can be applied deterministically.</t>
          <t>This document does not require every deployment to enforce authorization of the (<tt>sub</tt>, outermost <tt>act.sub</tt>) pair on every request, although such enforcement is <bcp14>RECOMMENDED</bcp14> for security-sensitive delegated access.  Same-domain deployments will often satisfy the representation and propagation requirements with straightforward local configuration for actor identifier context and identifier mapping.  Cross-domain deployments require explicit trust-framework or bilateral agreement decisions covering the permitted delegation relationships and therefore carry a higher interoperability burden beyond what this profile alone provides.</t>
        </section>
        <section anchor="token-format-scope">
          <name>Token Format Scope</name>
          <t>This profile defines actor-profile requirements for JWT assertion grants, JWT-formatted access tokens, and Transaction Tokens.  Opaque access tokens are not conformant token formats under this profile.  However, when an AS supports introspection, this document defines optional equivalent introspection response semantics for delegated opaque access tokens in <xref target="token-introspection">Token Introspection</xref>.  Such support is an introspection-based compatibility path; it does not make the opaque token itself conformant to this profile.  Use of opaque access tokens as <tt>subject_token</tt> or <tt>actor_token</tt> inputs to Token Exchange remains outside the interoperable scope of this document.  An AS <bcp14>MAY</bcp14> translate introspection results for an opaque access token into equivalent local inputs for deployment-specific use, but that input-processing behavior is not interoperable behavior defined by this document.</t>
        </section>
        <section anchor="supported-token-types-and-request-semantics">
          <name>Supported Token Types and Request Semantics</name>
          <t>The actor profile defines processing rules for the following token types as issued outputs: JWT assertion grants (<xref target="jwt-assertion-grants">JWT Assertion Grants</xref>), JWT-formatted access tokens (<xref target="jwt-access-tokens">JWT Access Tokens</xref>), and Transaction Tokens (<xref target="transaction-tokens">Transaction Tokens</xref>).  It also defines Token Exchange input processing for JWT assertion grants, JWT access tokens, OpenID Connect ID tokens, refresh tokens, and Transaction Tokens as <tt>subject_token</tt>, and for workload identity credentials, JWT client assertions, and JWT access tokens as <tt>actor_token</tt>.  This document defines limited processing for the <tt>may_act</tt> claim as an optional delegation-authorization input, as described in <xref target="may-act"><tt>may_act</tt></xref>; <tt>may_act</tt> is not itself a source of actor identity and is never propagated.</t>
          <t>Subject to endpoint policy and the underlying token-exchange or grant mechanism, implementations <bcp14>MAY</bcp14> transform a supported input token type into a supported output token type for which this document defines the relevant issuance processing.  This document normatively defines JWT assertion grant issuance (<xref target="jwt-assertion-grant-issuance">JWT Assertion Grant Output</xref>), JWT access token issuance via <xref target="jwt-access-token-propagation">JWT Access Token Output</xref> after authorization-grant processing, Token Exchange processing, or Transaction Token Service processing, and Transaction Token issuance from inbound JWT assertion grants, JWT access tokens, or Transaction Tokens under <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>.  It does not require every implementation to support every possible cross-product of supported inputs and outputs.  When an implementation supports a path defined by this document, actor profile information <bcp14>MUST</bcp14> be preserved and validated as specified for the resulting token type.</t>
          <t>This document profiles token contents and the processing of those contents once present.  It does not redefine the request semantics of <xref target="RFC8693"/>, including the syntax or baseline meaning of <tt>subject_token</tt>, <tt>actor_token</tt>, <tt>resource</tt>, <tt>audience</tt>, or <tt>requested_token_type</tt>.  When such inputs carry or imply actor information, this document defines only how that information is represented in issued tokens and how issuers and consumers process it.</t>
          <t>For worked examples showing the actor profile in use in both same-domain service delegation and cross-domain delegation, see <xref target="appendix-service-to-service">the service-to-service example</xref> and <xref target="appendix-cross-domain">the cross-domain example</xref>.</t>
        </section>
      </section>
      <section anchor="actor-object-structure">
        <name>Actor Object Structure</name>
        <t>An actor object conforming to this profile is a JSON object that is the value of the <tt>act</tt> claim.  In addition to the <tt>sub</tt> claim required by <xref target="RFC8693"/>, a profile-conformant actor object <bcp14>MUST</bcp14> contain an <tt>iss</tt> claim and <bcp14>SHOULD</bcp14> contain a <tt>sub_profile</tt> claim.  An <tt>act</tt> object that omits <tt>iss</tt> conforms to <xref target="RFC8693"/> but does not conform to this profile; handling of such objects is specified in <xref target="migration-and-adoption">Migration and Adoption</xref>.</t>
        <artwork><![CDATA[
act-object = {
  "sub"           : StringOrURI,        ; REQUIRED
  "iss"           : StringOrURI,        ; REQUIRED
  ? "sub_profile" : JSON String,        ; RECOMMENDED
  * StringOrURI => any                  ; extension claims
}
]]></artwork>
        <dl>
          <dt><tt>sub</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14>.  The subject identifier of the actor, as defined in <xref section="4.1" sectionFormat="comma" target="RFC8693"/>.  This value identifies the acting party.  It is a StringOrURI as defined in <xref target="RFC7519"/>.</t>
          </dd>
          <dt><tt>iss</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14>.  Identifies the issuer or namespace context in which the actor identifier carried in <tt>act.sub</tt> is to be interpreted, playing the same role for <tt>act.sub</tt> that the JWT <tt>iss</tt> claim plays for the token <tt>sub</tt>: just as <tt>iss</tt> + <tt>sub</tt> form a globally unique principal identifier in a JWT (see <xref target="RFC9493"/>), <tt>act.iss</tt> + <tt>act.sub</tt> form a canonical actor identifier within the delegation chain.  For URI, client, workload, or other deployment-specific identifiers, the value of <tt>act.iss</tt> <bcp14>MUST</bcp14> identify the context the issuer used when assigning or asserting that actor identifier.  See "Cross-Domain Delegation" in <xref target="conventions">Conventions and Definitions</xref>.  The value is a StringOrURI as defined in <xref target="RFC7519"/>.
</t>
            <t>The canonical actor identifier conveyed by this profile is the (<tt>act.iss</tt>, <tt>act.sub</tt>) pair.  Implementations <bcp14>MUST NOT</bcp14> interpret <tt>act.iss</tt> as the issuer of the current token, as a credential-issuer claim, or as a hop-provenance marker.  The actor identifier context, the token issuer, and the credential issuer may be the same entity or different entities.  In many deployments the value is an HTTPS URL, but other well-known identifier schemes (for example, a URN for workload identities) are also possible.  Preserved inner <tt>act</tt> objects remain prior-actor context as described in <xref target="carry-prior-actor-context">Carry Prior-Actor Context</xref>.</t>
            <t>For example, a TTS might issue a Transaction Token with top-level <tt>iss</tt> equal to <tt>https://tts.travel-provider.example</tt> while setting <tt>act.iss</tt> for the booking tool to <tt>https://as.travel-provider.example</tt>, if local policy uses that AS's identifier namespace for booking tool identifiers.  This is valid and expected: the TTS is the token issuer, while <tt>https://as.travel-provider.example</tt> is the actor identifier context for the booking tool identifier.</t>
          </dd>
          <dt><tt>sub_profile</tt>:</dt>
          <dd>
            <t><bcp14>RECOMMENDED</bcp14>.  A space-delimited list of entity profile values classifying the actor identified by <tt>act.sub</tt>, as defined in Section 4.2 of <xref target="I-D.mora-oauth-entity-profiles"/>.  Values used within <tt>act</tt> objects <bcp14>MUST</bcp14> be registered with the "Actor Profile" usage location in the OAuth Entity Profiles registry (Section 14.1 of <xref target="I-D.mora-oauth-entity-profiles"/>) or be privately defined collision-resistant values.
</t>
            <t>If the acting entity fits more than one profile, multiple values <bcp14>MAY</bcp14> be included as a space-delimited string (e.g., <tt>"service ai_agent"</tt>).  Interoperability requirements and implementation guidance for multi-value strings are defined in <xref target="I-D.mora-oauth-entity-profiles"/>.</t>
            <t>When <tt>sub_profile</tt> is absent from an <tt>act</tt> object, implementations <bcp14>MUST NOT</bcp14> assume a specific entity type for the actor; resource servers that enforce entity-type-based access control <bcp14>MUST</bcp14> treat an absent <tt>sub_profile</tt> as an unclassified actor and <bcp14>SHOULD</bcp14> apply the more restrictive policy applicable to unknown entity types.</t>
            <t>The <tt>sub_profile</tt> claim <bcp14>MAY</bcp14> also appear as a top-level JWT claim outside any <tt>act</tt> object to classify the entity type of the token's <tt>sub</tt>; it applies exclusively to <tt>sub</tt> and does not affect <tt>sub_profile</tt> values within <tt>act</tt> objects.  Issuers <bcp14>SHOULD</bcp14> include a top-level <tt>sub_profile</tt> when they can authoritatively classify the subject entity type.</t>
          </dd>
        </dl>
        <t>Per-actor key provenance within the delegation chain is outside the scope of this profile.  The current presenter's keying material is conveyed only by the token's top-level <tt>cnf</tt> claim, as described in <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>.  Other members carried inside an <tt>act</tt> object, including any confirmation-style members defined by another profile, do not have standardized proof-of-possession semantics under this document unless another specification explicitly defines them.</t>
        <t>The <tt>client_profile</tt> claim defined in <xref target="I-D.mora-oauth-entity-profiles"/> classifies the OAuth client and <bcp14>MUST NOT</bcp14> appear within an <tt>act</tt> object.  Client classification belongs at the top level of the token.  An AS or RS that encounters a <tt>client_profile</tt> member inside an <tt>act</tt> node <bcp14>MAY</bcp14> reject the token or ignore the offending member; it <bcp14>MUST NOT</bcp14> treat it as a valid actor classification.</t>
        <t>When an <tt>act</tt> object contains extension members beyond those defined in this document, issuers and consumers <bcp14>MUST</bcp14> ignore unrecognized members unless another specification or local policy defines their meaning.  An issuer that re-issues a validated delegation chain <bcp14>MAY</bcp14> preserve unrecognized extension members in inherited <tt>act</tt> objects under local policy.  However, companion profiles that need independently verifiable provenance, per-hop receipts, or other chain-wide state <bcp14>SHOULD</bcp14> use the top-level extension pattern described in <xref target="companion-profile-extensibility">Companion Profiles and Extension Points</xref> rather than relying on inherited <tt>act</tt>-object extension members.</t>
      </section>
      <section anchor="delegation-chains">
        <name>Delegation Chains</name>
        <t>Delegation chains <bcp14>MUST</bcp14> be represented by nesting <tt>act</tt> objects as specified in <xref section="4.1" sectionFormat="comma" target="RFC8693"/>.  In a nested structure, the outermost <tt>act</tt> object identifies the immediate actor; inner <tt>act</tt> objects represent prior actors in the chain, with the innermost representing the first actor authorized by the subject.  This structure records delegated-actor history within the trust model of the issuer that conveys it; it does not, by itself, provide independent cryptographic provenance for each prior hop.  This profile defines a single linear delegation chain per token; concurrent delegations to multiple independent actors are out of scope and yield separate tokens with their own chains.</t>
        <t>This document uses the following terminology consistently:</t>
        <ul spacing="normal">
          <li>
            <t>A <strong>single-hop actor object</strong> is an <tt>act</tt> object with no nested <tt>act</tt>; it represents delegation depth 1.</t>
          </li>
          <li>
            <t>An <strong>inbound delegation chain</strong> is the complete <tt>act</tt> structure received in an inbound token, whether depth 1 or greater.</t>
          </li>
          <li>
            <t>A <strong>preserved delegation chain</strong> is an inbound delegation chain that an issuer has validated and copied into a newly issued token without rewriting inherited actor entries.</t>
          </li>
          <li>
            <t>A <strong>new outermost actor</strong> is the actor object created by the current issuer to represent the newly identified outermost actor for the token it is issuing.</t>
          </li>
        </ul>
        <sourcecode type="json"><![CDATA[
{
  "sub": "https://idp.enterprise.example/users/alice",
  "sub_profile": "user",
  "act": {
    "sub": "https://tools.example.com/booking-tool",
    "iss": "https://as.travel-provider.example",
    "sub_profile": "service",
    "act": {
      "sub": "https://agents.example.com/travel-assistant",
      "iss": "https://as.enterprise.example",
      "sub_profile": "ai_agent"
    }
  }
}
]]></sourcecode>
        <t>In this example the booking tool (outermost <tt>act</tt>) is the current outermost actor.  The delegation chain originates with Alice (<tt>sub</tt>), who first authorized the travel assistant (nested <tt>act</tt>); the travel assistant then sub-delegated to the booking tool, which is now the immediate presenter.  The chain carries prior-actor information to the extent that the current token issuer is trusted to have validated and faithfully propagated it.</t>
        <t>Delegation depth is defined as the number of <tt>act</tt> objects in the chain, counting from the outermost.  A token with a single <tt>act</tt> object and no nested <tt>act</tt> within it has depth 1; each additional level of nesting adds 1.  Depth is counted on the resulting chain after any new outermost <tt>act</tt> is added, not on the inbound token.</t>
        <t>Depth 1 is the minimum interoperable depth.  Implementations intended for cross-domain multi-hop interoperability <bcp14>SHOULD</bcp14> support a local maximum of at least depth 4 (sufficient for the reference architecture user → orchestrator → agent → tool, with the tool as current presenter) and <bcp14>SHOULD</bcp14> document the configured maximum.  An implementation that supports only depth 1 is conformant to this document but will not interoperate with multi-hop deployments.  Same-domain deployments <bcp14>MAY</bcp14> enforce a shallower local maximum when that limit is sufficient for their architecture.</t>
        <t>Implementations <bcp14>MUST</bcp14> define and enforce a local maximum delegation depth.  Implementations that receive a token exceeding their configured local maximum <bcp14>MUST</bcp14> reject it with <tt>invalid_request</tt>.  When a request would result in a chain exceeding that limit, the AS <bcp14>MUST</bcp14> reject with <tt>invalid_request</tt>; it <bcp14>MUST NOT</bcp14> silently truncate the chain.</t>
        <t>A token represents delegation when the party exercising the token's authorization at runtime (the actor) is distinct from the token subject (<tt>sub</tt>) and the actor has been authorized by the subject to do so.  The conditions that establish this are:</t>
        <ol spacing="normal" type="1"><li>
            <t>A validated <tt>actor_token</tt> identifying a distinct actor was present in the exchange request that produced this token.</t>
          </li>
          <li>
            <t>An inbound <tt>subject_token</tt> from a trusted upstream issuer already carried an <tt>act</tt> chain, establishing that delegation was present before the current exchange.</t>
          </li>
          <li>
            <t>The issuing AS has an independent delegation basis such as a pre-registered grant, explicit consent record, a <tt>may_act</tt> claim in a validated upstream token (see <xref target="may-act"><tt>may_act</tt></xref>), or a policy rule establishing that the current client or actor is acting as a distinct party on behalf of <tt>sub</tt> (see <xref target="jwt-access-tokens">JWT Access Tokens</xref> for the outside-Token-Exchange case).</t>
          </li>
        </ol>
        <t>When a token represents delegation, the <tt>act</tt> claim <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> conform to <xref target="actor-object-structure">Actor Object Structure</xref>.  When none of the above conditions holds, the token does not represent delegation and the <tt>act</tt> claim <bcp14>MUST</bcp14> be omitted.  The AS <bcp14>MUST NOT</bcp14> include <tt>act</tt> solely because <tt>sub</tt> and the OAuth client identifier differ; the distinction between <tt>sub</tt> and <tt>client_id</tt> is expected and does not by itself constitute delegation under this profile.</t>
      </section>
      <section anchor="delegation-chain-algorithm">
        <name>Delegation Chain Validation and Construction</name>
        <t>The following normative algorithm governs how an AS validates an inbound delegation chain and constructs the delegation chain in the issued token.  It applies to all token types defined in this profile, on request paths where actor-profile conformance is required or claimed, either because one of the type-specific processing sections (<xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>, <xref target="token-exchange-processing">Token Exchange Processing</xref>, or <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>) mandates it or because local policy or advertised metadata requires profile conformance for the request path.  Those type-specific sections reference this algorithm and add type-specific preconditions.  Actor objects that do not conform to this profile (for example, RFC 8693 <tt>act</tt> objects that omit <tt>iss</tt>) <bcp14>MUST NOT</bcp14> be processed by this algorithm; <xref target="migration-and-adoption">Migration and Adoption</xref> specifies how such objects are handled.  This algorithm governs claim handling only; it does not by itself create new delegation-authorization requirements beyond those imposed by the invoking processing section and local policy.</t>
        <section anchor="terminology">
          <name>Terminology</name>
          <ul spacing="normal">
            <li>
              <t><strong>Depth</strong> of a delegation chain: the number of nested <tt>act</tt> objects counted from the outermost.  A single <tt>act</tt> object with no nested <tt>act</tt> has depth 1; each additional nesting level adds 1.  Depth is measured on the chain as it appears in the issued token, after any new outermost actor is added.</t>
            </li>
            <li>
              <t><strong>Security-relevant entry</strong>: an inner <tt>act</tt> object that local policy uses as an additional input to issuance decisions (authorization, scope determination, or identity mapping).  Use of such entries is deployment-specific and outside the baseline interoperable behavior of this profile.</t>
            </li>
            <li>
              <t><strong>Prior-actor context</strong>: an inner <tt>act</tt> object preserved for audit or downstream authorization purposes without being used as a direct input to the current issuance decision.</t>
            </li>
          </ul>
        </section>
        <section anchor="validation-steps">
          <name>Validation Steps</name>
          <t>The AS applies the validation steps in the following order:</t>
          <ol spacing="normal" type="1"><li>
              <t>Validate the carrier token using <xref target="validate-carrier-token">Validate Carrier Token</xref>.</t>
            </li>
            <li>
              <t>Validate the outermost actor using <xref target="validate-outermost-actor">Validate Outermost Actor</xref>.</t>
            </li>
            <li>
              <t>If inner actors are used as inputs to issuance decisions, validate those entries using <xref target="validate-inner-actors-used-for-decisions">Validate Inner Actors Used for Decisions</xref>.</t>
            </li>
            <li>
              <t>For inner actors preserved only as prior-actor context, apply <xref target="carry-prior-actor-context">Carry Prior-Actor Context</xref>.</t>
            </li>
            <li>
              <t>Enforce the configured maximum chain depth using <xref target="enforce-depth-limit">Enforce Depth Limit</xref>.</t>
            </li>
          </ol>
          <section anchor="validate-carrier-token">
            <name>Validate Carrier Token</name>
            <t>The AS <bcp14>MUST</bcp14> validate the token carrying the inbound delegation chain per the type-specific rules applicable to that token before extracting actor claims.</t>
          </section>
          <section anchor="validate-outermost-actor">
            <name>Validate Outermost Actor</name>
            <t>For the outermost <tt>act</tt> object the AS <bcp14>MUST</bcp14>:</t>
            <ol spacing="normal" type="1"><li>
                <t>Verify that both <tt>act.sub</tt> and <tt>act.iss</tt> are present.  If either is absent, reject with <tt>invalid_request</tt>.</t>
              </li>
              <li>
                <t>Verify that the token issuer is trusted under local policy to assert the (<tt>act.iss</tt>, <tt>act.sub</tt>) actor identifier pair.  This trust decision is outside the representation-layer interoperability defined by this profile (<xref target="representation-and-policy">Representation and Policy</xref>); non-normative validation examples are in <xref target="act-iss-authority-guidance">Trusting Actor Identifier Pairs</xref>.  This step does not interpret <tt>act.iss</tt> as the token issuer or as proof that prior hops were independently authenticated.  If the token issuer is not trusted to assert the actor identifier pair, reject with <tt>invalid_grant</tt>.  The JWT assertion-grant path adds token-type-specific requirements in <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>.</t>
              </li>
              <li>
                <t>When the applicable processing path uses <xref target="extend-chain-with-new-actor">Extend Chain with New Actor</xref>, the AS <bcp14>MUST</bcp14> evaluate whether that actor (<tt>act.sub</tt>) is authorized to exercise delegation on behalf of <tt>sub</tt> under local policy (for example, a pre-registered grant, explicit consent record, or policy rule covering the acting party).  When the processing path uses <xref target="preserve-inbound-chain">Preserve Inbound Chain</xref> for an existing chain from a validated, trusted upstream issuer, delegation was evaluated upstream; the AS <bcp14>SHOULD</bcp14> evaluate the preserved relationship under local policy but is not required to do so for baseline interoperability.  If the required delegation relationship is prohibited by policy or cannot be confirmed, reject with <tt>actor_unauthorized</tt>.  The JWT assertion-grant path adds token-type-specific requirements in <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>.</t>
              </li>
            </ol>
          </section>
          <section anchor="validate-inner-actors-used-for-decisions">
            <name>Validate Inner Actors Used for Decisions</name>
            <t>Interoperable processing under this profile is defined around <tt>sub</tt> and the outermost <tt>act.sub</tt>.  If local policy additionally uses an inner <tt>act</tt> object as an input to issuance decisions, the AS <bcp14>SHOULD</bcp14> apply the same three sub-steps as <xref target="validate-outermost-actor">Validate Outermost Actor</xref> for that entry, including delegation-confirmation only when the current processing path or local policy requires it for that entry.  Such use of inner actors is deployment-specific.</t>
          </section>
          <section anchor="carry-prior-actor-context">
            <name>Carry Prior-Actor Context</name>
            <t>For inner <tt>act</tt> objects preserved solely as prior-actor context without being used for any issuance decision, the AS <bcp14>MAY</bcp14> rely on trust in the outer token issuer established by <xref target="validate-carrier-token">Validate Carrier Token</xref> rather than independently validating each hop.  The AS <bcp14>MUST NOT</bcp14> treat preserved prior-actor context as independently authenticated; an inner <tt>act</tt> entry carried in a token is endorsed only by the outer token issuer's signature, not by independent verification at each prior hop.</t>
          </section>
          <section anchor="enforce-depth-limit">
            <name>Enforce Depth Limit</name>
            <t>Compute the depth of the resulting chain, including any new outermost actor added by <xref target="extend-chain-with-new-actor">Extend Chain with New Actor</xref>.  If that depth exceeds the locally configured maximum (<xref target="delegation-chains">Delegation Chains</xref>), reject with <tt>invalid_request</tt>.</t>
          </section>
        </section>
        <section anchor="construction-steps">
          <name>Construction Steps</name>
          <t>The AS selects exactly one construction step in the following order:</t>
          <ol spacing="normal" type="1"><li>
              <t>If a new actor is identified for the issued token, use <xref target="extend-chain-with-new-actor">Extend Chain with New Actor</xref>.</t>
            </li>
            <li>
              <t>Otherwise, if a validated inbound delegation chain is present, use <xref target="preserve-inbound-chain">Preserve Inbound Chain</xref>.</t>
            </li>
            <li>
              <t>Otherwise, use <xref target="omit-act">Omit <tt>act</tt></xref>.</t>
            </li>
          </ol>
          <section anchor="extend-chain-with-new-actor">
            <name>Extend Chain with New Actor</name>
            <t>When a new actor is identified, the AS creates a new outermost <tt>act</tt> object and nests any validated inbound chain beneath it.</t>
            <artwork><![CDATA[
AddOutermostActor(inbound_chain, new_actor):
  outermost.sub         = new_actor.sub      // REQUIRED
  outermost.iss         = new_actor.iss      // REQUIRED: issuer or namespace context for new_actor.sub
  outermost.sub_profile = new_actor.sub_profile  // RECOMMENDED when known

  if inbound_chain is present:
    outermost.act = inbound_chain  // nest entire validated inbound chain
    verify depth(outermost) <= local_max_depth  // see Enforce Depth Limit

  return outermost
]]></artwork>
            <t>The <tt>act.iss</tt> value in the new outermost actor <bcp14>MUST</bcp14> be set by the issuing AS.  The AS <bcp14>MUST NOT</bcp14> rewrite <tt>act.iss</tt> or any other field in inherited inner actor objects; those fields were set by upstream issuers at the time of authorship and are immutable.  Dropping prior actors from the inbound chain to produce a shallower chain in the issued token is NOT permitted.  If preserving the inbound chain would cause the resulting depth to exceed the local maximum, the AS <bcp14>MUST</bcp14> reject with <tt>invalid_request</tt> rather than silently truncate.  The only exception is when the inbound token carries no <tt>act</tt> claim, in which case no prior chain exists and the issued token begins a new chain at depth 1.  When the new actor identifies the same party as the inbound outermost <tt>act.sub</tt> (same <tt>act.sub</tt> and <tt>act.iss</tt> under the same issuer or namespace context), the AS <bcp14>MAY</bcp14> use <xref target="preserve-inbound-chain">Preserve Inbound Chain</xref> instead, preserving the existing chain unchanged rather than creating a redundant nested entry.</t>
            <t>Detection of identifier reappearance deeper in the inbound chain (for example, the same actor appearing in both inner and outer positions of a longer chain) is not standardized by this profile.  An AS <bcp14>MAY</bcp14> apply local policy to such cases; the chain-construction algorithm itself neither requires nor prohibits cycle detection.</t>
          </section>
          <section anchor="preserve-inbound-chain">
            <name>Preserve Inbound Chain</name>
            <t>When no new actor is identified and an inbound chain is present, the AS copies the validated inbound chain unchanged.</t>
            <artwork><![CDATA[
PreserveChain(inbound_chain):
  return inbound_chain  // copy without modification
]]></artwork>
            <t>The AS <bcp14>MUST</bcp14> copy the validated inbound chain exactly into the issued token.  The AS <bcp14>MUST NOT</bcp14> add, remove, or rewrite any field in any actor object of a preserved chain.</t>
          </section>
          <section anchor="omit-act">
            <name>Omit <tt>act</tt></name>
            <t>When no delegation is present and no actor information should appear in the issued token, the AS <bcp14>MUST NOT</bcp14> include an <tt>act</tt> claim.  The AS <bcp14>MUST NOT</bcp14> silently drop an inbound <tt>act</tt> claim; if it cannot preserve or extend the chain, it <bcp14>MUST</bcp14> reject the request per <xref target="actor-profile-error-responses">Error Responses</xref>.</t>
          </section>
        </section>
      </section>
      <section anchor="delegated-pop-validation">
        <name>Sender Constraint and Proof-of-Possession Validation</name>
        <t>When sender-constrained tokens are used with a delegated token, the top-level <tt>cnf</tt> claim identifies the key or certificate of the immediate presenter of that token.  When delegation is present, that immediate presenter is ordinarily the party identified by the outermost actor.  The following normative rules govern proof-of-possession (PoP) validation for all token types and credential exchanges defined in this profile.  Individual processing sections reference these rules and <bcp14>MUST</bcp14> apply them in addition to any type-specific requirements stated there.</t>
        <t>For Token Exchange, this profile uses exactly two presenter-transition modes:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Presenter continuation</strong>: the issued token keeps the presenter of the inbound <tt>subject_token</tt>.  This mode is interoperable only when the inbound <tt>subject_token</tt> is PoP-capable and carries top-level <tt>cnf</tt>.</t>
          </li>
          <li>
            <t><strong>Presenter rebind</strong>: the issued token installs a new presenter.  This document defines presenter rebind only when a validated <tt>actor_token</tt> directly identifies the new presenter.</t>
          </li>
        </ul>
        <t>This profile does not define per-actor confirmation members within nested <tt>act</tt> objects.  Stronger prior-hop key provenance, if needed, would require another profile layered on top of this one using the companion-profile extension pattern in <xref target="companion-profile-extensibility">Companion Profiles and Extension Points</xref>.</t>
        <t>DPoP nonce handling per <xref section="8" sectionFormat="comma" target="RFC9449"/> applies unchanged to all DPoP-bound token requests under this profile; this profile does not modify DPoP nonce semantics.</t>
        <section anchor="top-level-cnf-governs-the-current-presenter">
          <name>Top-Level <tt>cnf</tt> Governs the Current Presenter</name>
          <t>The top-level <tt>cnf</tt> claim of any token identifies the key or certificate of the current presenter.  When delegation is present, that current presenter is the party identified by the outermost <tt>act</tt> claim: when DPoP (<xref target="RFC9449"/>) is used, the top-level <tt>cnf.jkt</tt> <bcp14>MUST</bcp14> identify that party's key; when mTLS (<xref target="RFC8705"/>) is used, the top-level <tt>cnf.x5t#S256</tt> <bcp14>MUST</bcp14> identify that party's certificate.  The AS or RS <bcp14>MUST</bcp14> validate proof of possession against the top-level <tt>cnf</tt>.  Confirmation-style members that appear inside an <tt>act</tt> object due to another specification do not have standardized proof-of-possession semantics under this document.</t>
        </section>
        <section anchor="token-exchange-continuation">
          <name>Token Exchange Continuation</name>
          <t>When Token Exchange runs in presenter-continuation mode, the <tt>subject_token</tt> itself supplies the current presenter's binding state.  This mode applies only to PoP-capable <tt>subject_token</tt> inputs that carry top-level <tt>cnf</tt>.</t>
          <ul spacing="normal">
            <li>
              <t>If the <tt>subject_token</tt> carries top-level <tt>cnf</tt>, the requester <bcp14>MUST</bcp14> prove possession for that binding using the mechanism applicable to the <tt>subject_token</tt> type and deployment.</t>
            </li>
            <li>
              <t>If the <tt>subject_token</tt> does not carry top-level <tt>cnf</tt>, this document does not define presenter continuation for that request.</t>
            </li>
          </ul>
        </section>
        <section anchor="token-exchange-rebind">
          <name>Token Exchange Rebind</name>
          <t>When Token Exchange runs in presenter-rebind mode, the request establishes a new presenter for the issued token.  This document defines that presenter as established only by a validated <tt>actor_token</tt> that directly identifies it using its own top-level subject identity.</t>
          <ul spacing="normal">
            <li>
              <t>The issuer <bcp14>MUST</bcp14> validate the <tt>actor_token</tt> and any accompanying proof required by that credential profile or deployment.</t>
            </li>
            <li>
              <t>The issuer <bcp14>MUST</bcp14> validate proof for the newly established presenter rather than requiring proof of possession for any prior <tt>subject_token</tt> binding solely because the inbound <tt>subject_token</tt> was sender-constrained.</t>
            </li>
            <li>
              <t>A delegated JWT access token or any other <tt>actor_token</tt> whose acting identity is available only through an embedded <tt>act</tt> claim does not qualify as a direct presenter credential for interoperable presenter rebind under this profile.</t>
            </li>
          </ul>
          <t>Rebind requires an <tt>actor_token</tt> whose own top-level <tt>sub</tt> names the new presenter.  An actor holding only a delegated credential cannot rebind; intermediate actors that may become new presenters must possess a direct presenter credential (workload credential (<xref target="workload-identity-as-actor-token">Workload Credential Processing</xref>), RFC 7523 client assertion (<xref target="jwt-client-assertion-as-actor-token">JWT Client Assertion</xref>), or non-delegated JWT access token (<xref target="jwt-access-token-as-actor-token">JWT Access Token as actor_token</xref>)).</t>
        </section>
        <section anchor="bearer-to-pop-upgrade">
          <name>Bearer-to-PoP Upgrade</name>
          <t>When the inbound <tt>subject_token</tt> is a bearer credential or an identity-only credential and the request supplies a validated <tt>actor_token</tt> establishing a new presenter, the issuer <bcp14>MAY</bcp14> issue a sender-constrained output token bound to that new presenter.  The absence of inbound top-level <tt>cnf</tt> creates no continuity obligation in this case.</t>
        </section>
      </section>
    </section>
    <section anchor="jwt-assertion-grants">
      <name>JWT Assertion Grants</name>
      <t>This section defines the actor-profile structure and authorization-grant processing rules for JWT assertion grants.  JWT access-token structure, Token Exchange processing, and Transaction Token Service processing are defined in later sections.</t>
      <section anchor="jwt-assertion-grants-structure">
        <name>Structure</name>
        <t>Actor-profile requirements apply to any JWT used as an authorization grant under <xref target="RFC7521"/> and <xref target="RFC7523"/>, independent of how or by which specification it was produced.  One such profile is the Identity Assertion JWT Authorization Grant (ID-JAG, <xref target="I-D.ietf-oauth-identity-assertion-authz-grant"/>), a JWT bearer grant produced by Token Exchange.  When the grant is an ID-JAG, this document acts as an actor-delegation profile layered on the base ID-JAG specification: ID-JAG defines the token-exchange and JWT-bearer flow, while this document defines how <tt>actor_token</tt>-derived actor identity and any resulting <tt>act</tt> claim are represented and processed.</t>
        <t>Such a JWT <bcp14>MAY</bcp14> include an <tt>act</tt> claim conforming to the actor profile defined in <xref target="actor-profile">Actor Profile for Delegation</xref>.  Use of this claim in JWT client authentication assertions is out of scope for this document because such assertions have different issuer and subject semantics.  However, implementers should note that some deployments rely on the authenticated OAuth client itself as implicit evidence of the acting party.  This document does not prohibit that input, but when delegation is to be expressed explicitly and propagated across token transformations, the acting party is represented by <tt>act</tt> rather than inferred solely from client authentication.</t>
        <t>The following claims are defined for a JWT assertion grant that carries actor-profile delegation.  Claims not listed here follow the requirements of <xref target="RFC7521"/> and <xref target="RFC7523"/>.</t>
        <dl>
          <dt><tt>iss</tt> (<bcp14>REQUIRED</bcp14>):</dt>
          <dd>
            <t>Identifies the assertion issuer.  <bcp14>MUST</bcp14> be authorized by local policy to assert the relationship between <tt>sub</tt> and <tt>act.sub</tt>.</t>
          </dd>
          <dt><tt>sub</tt> (<bcp14>REQUIRED</bcp14>):</dt>
          <dd>
            <t>The principal on whose behalf the grant is being made.</t>
          </dd>
          <dt><tt>sub_profile</tt> (<bcp14>RECOMMENDED</bcp14>):</dt>
          <dd>
            <t>Classifies the entity type of <tt>sub</tt>.  <bcp14>MUST</bcp14> conform to the values defined in <xref target="actor-profile">Actor Profile for Delegation</xref>.</t>
          </dd>
          <dt><tt>act</tt> (<bcp14>REQUIRED</bcp14> when delegation is asserted):</dt>
          <dd>
            <t>The actor object identifying the entity exercising the subject's delegated rights.  <bcp14>MUST</bcp14> conform to the actor object structure defined in <xref target="actor-profile">Actor Profile for Delegation</xref>.  <bcp14>MUST</bcp14> include <tt>act.sub</tt> and <tt>act.iss</tt>.</t>
          </dd>
          <dt><tt>cnf</tt> (<bcp14>REQUIRED</bcp14> when sender-constrained; otherwise <bcp14>OPTIONAL</bcp14>):</dt>
          <dd>
            <t>When the JWT assertion grant is sender-constrained, the assertion <bcp14>MUST</bcp14> carry a top-level <tt>cnf</tt> claim identifying the binding: <tt>cnf.jkt</tt> per <xref target="RFC9449"/> when DPoP is used, or <tt>cnf.x5t#S256</tt> per <xref target="RFC8705"/> when mTLS is used.  When the assertion is not sender-constrained, top-level <tt>cnf</tt> is <bcp14>OPTIONAL</bcp14> unless required by another profile or local policy.</t>
          </dd>
        </dl>
        <t>When the assertion or request context also identifies an OAuth client via <tt>client_id</tt>, <tt>azp</tt>, or an authenticated client credential, interoperable processing <bcp14>SHOULD</bcp14> use <tt>act.sub</tt> rather than treating that client identity as a substitute for it (see <xref target="client-identity-delegation">Client Identity and Delegation</xref> and <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>).</t>
        <t>Clients <bcp14>SHOULD</bcp14> use JWT assertion grants carrying actor-profile claims only when the AS's support for the actor-determination model has been confirmed via deployment documentation, prior agreement, or discovery.  For ID-JAG specifically, that confirmation <bcp14>SHOULD</bcp14> include whether the AS supports the actor-delegation extension model defined by this document.</t>
        <t>The following example shows an AS-issued assertion grant, which is the recommended pattern.  The Enterprise IdP AS performed Token Exchange, authenticated the agent as the OAuth client, established the delegation relationship under local policy, and signed the assertion.  <tt>act.iss</tt> equals the token <tt>iss</tt> here because the enterprise AS's issuer identifier is also the actor identifier context for the agent:</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "https://as.enterprise.example",
  "sub": "https://idp.enterprise.example/users/alice",
  "aud": "https://as.resource-domain.example/token",
  "jti": "a1b2c3d4-...",
  "exp": 1711820400,
  "iat": 1711816800,
  "sub_profile": "user",
  "cnf": { "jkt": "NzbLsXh8uDCcd7MNwrnNZpX0ak8ACQ" },
  "act": {
    "sub": "https://agents.enterprise.example/travel-assistant",
    "iss": "https://as.enterprise.example",
    "sub_profile": "ai_agent"
  }
}
]]></sourcecode>
        <t>The top-level <tt>sub_profile</tt> classifies the JWT's <tt>sub</tt>; <tt>sub_profile</tt> within <tt>act</tt> classifies the actor.  The top-level <tt>cnf.jkt</tt> binds the assertion to the agent's DPoP key.</t>
        <t>The AS-issued grant is the pattern defined by this document because the issuing AS independently authenticated the agent and validated the delegation relationship before signing.  The receiving AS needs to trust the enterprise AS as an issuer and as an authority for asserting the actor identifier pair carried in the grant.</t>
        <t>For AS-issued grants, the issuing AS <bcp14>MUST</bcp14> set <tt>act.iss</tt> to the issuer or namespace context in which <tt>act.sub</tt> is to be interpreted; for actors registered in the issuing AS's own namespace, this is often the AS's own issuer URI.</t>
        <t>This document defines the following issuer patterns:</t>
        <ul spacing="normal">
          <li>
            <t>an AS-issued delegated assertion where JWT <tt>iss</tt> is a trusted AS and <tt>act.sub</tt> identifies the actor (recommended),</t>
          </li>
          <li>
            <t>an assertion carrying a pre-existing nested <tt>act</tt> chain where the current JWT <tt>iss</tt> is a trusted AS carrying forward prior actor assertions.</t>
          </li>
        </ul>
        <t>A deployment <bcp14>MAY</bcp14> additionally accept a self-issued actor assertion when explicitly enabled by another specification or local policy, but that behavior is outside the scope of this document.  Implementations <bcp14>MUST</bcp14> reject self-issued assertion grants by default; see <xref target="security-self-issued-grants">Self-Issued Authorization Grants</xref> for the security controls any such deployment <bcp14>MUST</bcp14> independently establish.</t>
      </section>
      <section anchor="jwt-assertion-grants-processing">
        <name>Authorization Grant Processing</name>
        <t>When an AS receives a JWT assertion grant containing an <tt>act</tt> claim:</t>
        <ol spacing="normal" type="1"><li>
            <t>The AS <bcp14>MUST</bcp14> validate the assertion per <xref target="RFC7523"/>, including signature, <tt>iss</tt>, <tt>sub</tt>, <tt>aud</tt>, <tt>exp</tt>, and <tt>jti</tt>.  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Non-sender-constrained grants</strong>: When neither a DPoP proof (<xref target="RFC9449"/>) nor an mTLS client certificate (<xref target="RFC8705"/>) is required at the token endpoint, the AS <bcp14>MUST</bcp14> reject any assertion whose <tt>jti</tt> has already been accepted within the assertion's validity window.</t>
              </li>
              <li>
                <t><strong>Sender-constrained grants</strong>: The AS <bcp14>SHOULD</bcp14> additionally apply <tt>jti</tt> replay prevention as defense-in-depth, consistent with <xref target="RFC7523"/>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The AS <bcp14>MUST</bcp14> verify that the JWT <tt>iss</tt> is trusted under local policy to assert delegation on behalf of the actor identified by <tt>act.sub</tt>.  </t>
            <ul empty="true">
              <li>
                <t>Note: Under this document the JWT <tt>iss</tt> is expected to be a trusted AS.  Self-issued grants, where the acting entity is also the token issuer, are a deployment-specific extension outside the scope of this document; see <xref target="security-self-issued-grants">Self-Issued Authorization Grants</xref>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The AS <bcp14>MUST</bcp14> verify that the JWT <tt>iss</tt> is trusted under local policy to assert the (<tt>act.iss</tt>, <tt>act.sub</tt>) actor identifier pair.  </t>
            <ul spacing="normal">
              <li>
                <t>If <tt>act.iss</tt> is absent: reject with <tt>invalid_request</tt> (structural violation).</t>
              </li>
              <li>
                <t>If the JWT <tt>iss</tt> is not trusted to assert the actor identifier pair: reject with <tt>invalid_grant</tt>.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Note: See <xref target="validate-outermost-actor">Validate Outermost Actor</xref> for the trust-validation framing and <xref target="act-iss-authority-guidance">Trusting Actor Identifier Pairs</xref> for non-normative examples.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The AS <bcp14>MUST</bcp14> evaluate whether the identified actor is authorized to exercise delegation on behalf of <tt>sub</tt>.  The required strength of that evaluation depends on how the outermost actor was introduced:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>New actor</strong>: When the request supplies an <tt>actor_token</tt> or self-issued assertion that introduces a new <tt>act.sub</tt> not carried by the inbound chain, the AS <bcp14>MUST</bcp14> confirm the delegation relationship under local policy (for example, a pre-registered grant, explicit consent record, or policy rule).</t>
              </li>
              <li>
                <t><strong>Preserved chain</strong>: When the request preserves an existing chain from a validated, trusted upstream issuer, the issuer trust established in step 2 provides the baseline assurance; the AS <bcp14>SHOULD</bcp14> additionally evaluate under local policy but is not required to do so for baseline interoperability.</t>
              </li>
            </ul>
            <t>
In either case:  </t>
            <ul spacing="normal">
              <li>
                <t>If the delegation relationship is prohibited by AS policy or cannot be confirmed: reject with <tt>actor_unauthorized</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the inbound assertion's <tt>act</tt> object contains a nested <tt>act</tt> claim (indicating that the asserted actor is itself a delegatee), the AS <bcp14>MUST</bcp14> handle the inner chain as follows:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Propagation decision</strong>: The AS <bcp14>MUST</bcp14> determine whether to propagate the inner chain into the issued token.  The AS <bcp14>SHOULD</bcp14> propagate it by preserving the nested structure, provided the total resulting chain depth does not exceed the limit in <xref target="delegation-chains">Delegation Chains</xref>.  If the AS does not accept pre-chained assertions, it <bcp14>MUST</bcp14> reject the request.</t>
              </li>
              <li>
                <t><strong>Entries used by the AS for issuance decisions</strong>: Interoperable processing is defined around <tt>sub</tt> and the outermost <tt>act.sub</tt>.  If local policy additionally uses an inner <tt>act</tt> object for authorization, scope determination, or another issuance decision, the AS <bcp14>MUST</bcp14> validate the <tt>act.sub</tt> and <tt>act.iss</tt> pair and <bcp14>MUST</bcp14> evaluate the delegation relationship before using that entry as a security input.  Such use of inner <tt>act</tt> objects is deployment-specific rather than part of the baseline interoperable behavior of this profile.</t>
              </li>
              <li>
                <t><strong>Preserved prior-actor context</strong>: For inner <tt>act</tt> objects the AS preserves only as prior-actor context, apply <xref target="carry-prior-actor-context">Carry Prior-Actor Context</xref>.  Downstream authorization interoperability is defined around <tt>sub</tt> and the outermost <tt>act.sub</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The AS <bcp14>MUST</bcp14> verify proof of possession according to the token-endpoint mechanism in use and the top-level <tt>cnf</tt> semantics in <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>.  </t>
            <ul spacing="normal">
              <li>
                <t><strong>DPoP</strong>: When the inbound assertion grant is DPoP-bound, it <bcp14>MUST</bcp14> carry a top-level <tt>cnf.jkt</tt>; reject with <tt>invalid_request</tt> if absent.  The AS <bcp14>MUST</bcp14>:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>Verify the DPoP proof is valid per <xref target="RFC9449"/> with <tt>htm="POST"</tt> and <tt>htu</tt> equal to the AS token endpoint URI.</t>
                  </li>
                  <li>
                    <t>Verify the <tt>jkt</tt> in the DPoP proof exactly matches the <tt>cnf.jkt</tt> in the assertion.</t>
                  </li>
                  <li>
                    <t>Use the assertion's <tt>cnf.jkt</tt> as set by the upstream issuer; <bcp14>MUST NOT</bcp14> substitute a locally registered key.</t>
                  </li>
                  <li>
                    <t>Reject with <tt>invalid_dpop_proof</tt> or <tt>invalid_grant</tt> if the proof is absent or invalid.</t>
                  </li>
                </ul>
                <ul empty="true">
                  <li>
                    <t>Note: The <tt>ath</tt> claim is not applicable at the token endpoint and <bcp14>MUST NOT</bcp14> be required.  See also <xref target="I-D.parecki-oauth-jwt-dpop-grant"/> for related work on DPoP-bound JWT grants.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t><strong>mTLS</strong>: When the inbound assertion grant is mTLS-bound, it <bcp14>MUST</bcp14> carry a top-level <tt>cnf.x5t#S256</tt>; reject with <tt>invalid_request</tt> if absent.  The AS <bcp14>MUST</bcp14>:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>Validate the client certificate presented at the token endpoint against <tt>cnf.x5t#S256</tt>.</t>
                  </li>
                  <li>
                    <t>Use the <tt>cnf.x5t#S256</tt> value set by the upstream issuer; <bcp14>MUST NOT</bcp14> substitute a locally registered certificate.</t>
                  </li>
                  <li>
                    <t>Reject per <xref target="RFC8705"/> if the presented certificate does not match.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>When this JWT assertion grant is later used as a <tt>subject_token</tt> in Token Exchange, presenter continuation and presenter rebind are determined by <xref target="token-exchange-presenter-model">Presenter Transition Model</xref> and <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>, not by nested <tt>act</tt> contents.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the assertion or authenticated request context identifies an OAuth client separately from <tt>act.sub</tt>:  </t>
            <ul spacing="normal">
              <li>
                <t>The AS <bcp14>MAY</bcp14> use that client identity as an additional authorization input.</t>
              </li>
              <li>
                <t>The AS <bcp14>SHOULD NOT</bcp14> infer that the client is authorized to act on behalf of the subject solely because the client initiated the request.  Such inference is outside the interoperable behavior defined by this profile.</t>
              </li>
              <li>
                <t>When local policy maps the client identity to an actor identifier expected to match <tt>act.sub</tt>, the AS <bcp14>SHOULD</bcp14> perform identifier reconciliation before issuing a token.  If reconciliation cannot be established, the AS <bcp14>MUST</bcp14> either treat the identifiers as distinct or reject the request according to local policy.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the AS accepts the assertion, it <bcp14>MUST</bcp14> propagate the actor information into the issued token according to the rules for the output token type being issued.  For JWT access tokens, see <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.  For Transaction Tokens, see <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>.  When the output is another JWT assertion grant profile, the resulting assertion <bcp14>MUST</bcp14> preserve the validated actor information subject to local policy and the chain-depth limit in <xref target="delegation-chains">Delegation Chains</xref>.</t>
          </li>
          <li>
            <t>When constructing a new outermost <tt>act</tt> object using <xref target="extend-chain-with-new-actor">Extend Chain with New Actor</xref>, the AS <bcp14>MAY</bcp14> enrich that object with <tt>sub_profile</tt> based on its own knowledge of the actor's entity type.  The AS <bcp14>MAY</bcp14> also set or enrich the top-level <tt>sub_profile</tt> of the issued token based on its knowledge of <tt>sub</tt>.  The AS <bcp14>MUST NOT</bcp14> add, modify, or remove any claim in preserved inner <tt>act</tt> objects; those entries are immutable under <xref target="preserve-inbound-chain">Preserve Inbound Chain</xref>.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="jwt-access-tokens">
      <name>JWT Access Tokens</name>
      <t>This section defines the actor-profile structure of delegated JWT access tokens used by this document.  Processing rules that lead to issuance of such tokens are defined in <xref target="token-exchange-processing">Token Exchange Processing</xref> and <xref target="transaction-token-service">Transaction Token Service Processing</xref>.</t>
      <section anchor="jwt-access-tokens-structure">
        <name>Structure</name>
        <t>A delegated JWT access token is a JWT access token per <xref target="RFC9068"/> that carries an <tt>act</tt> claim conforming to the actor profile defined in <xref target="actor-profile">Actor Profile for Delegation</xref>.  Claims not listed here follow <xref target="RFC9068"/> and any other applicable token profile.</t>
        <t>The following claims are defined for a JWT access token that carries actor-profile delegation:</t>
        <dl>
          <dt><tt>iss</tt> (<bcp14>REQUIRED</bcp14>):</dt>
          <dd>
            <t>Identifies the access token issuer.</t>
          </dd>
          <dt><tt>sub</tt> (<bcp14>REQUIRED</bcp14>):</dt>
          <dd>
            <t>Identifies the principal on whose behalf the access token is issued.</t>
          </dd>
          <dt><tt>sub_profile</tt> (<bcp14>RECOMMENDED</bcp14>):</dt>
          <dd>
            <t>Classifies the entity type of <tt>sub</tt>.  <bcp14>MUST</bcp14> conform to the values defined in <xref target="actor-profile">Actor Profile for Delegation</xref>.</t>
          </dd>
          <dt><tt>act</tt> (<bcp14>REQUIRED</bcp14> when the token represents delegation per <xref target="delegation-chains">Delegation Chains</xref>):</dt>
          <dd>
            <t>The actor object identifying the entity exercising the subject's delegated rights.  <bcp14>MUST</bcp14> conform to the actor object structure defined in <xref target="actor-profile">Actor Profile for Delegation</xref>.  <bcp14>MUST</bcp14> include <tt>act.sub</tt> and <tt>act.iss</tt>.  When the token does not represent delegation, <tt>act</tt> <bcp14>MUST</bcp14> be omitted.</t>
          </dd>
          <dt><tt>cnf</tt> (<bcp14>REQUIRED</bcp14> when sender-constrained; otherwise <bcp14>OPTIONAL</bcp14>):</dt>
          <dd>
            <t>Binds the access token to the current presenter when a sender-constraining mechanism such as DPoP or mTLS is used.</t>
          </dd>
          <dt><tt>client_id</tt> and <tt>azp</tt> (<bcp14>OPTIONAL</bcp14>):</dt>
          <dd>
            <t>Identify the OAuth client when carried in the token.  They do not identify the delegated actor and <bcp14>MUST NOT</bcp14> be used as a substitute for <tt>act</tt>.</t>
          </dd>
        </dl>
        <t>Some deployments also carry an <tt>azp</tt> claim as an auxiliary client-identity signal, often as an OpenID Connect carry-over used by vendors in practice.  When an issuer uses both <tt>azp</tt> and <tt>act.sub</tt> to represent the same acting party, it <bcp14>SHOULD</bcp14> perform identifier reconciliation between them or else treat them as distinct identifiers under local policy.  See <xref target="migration-implicit-explicit">Migrating from Implicit to Explicit Delegation</xref> and <xref target="client-identity-delegation">Client Identity and Delegation</xref> for migration, reconciliation, and the normative client-identity rules.</t>
        <t>The following example shows a JWT access token with actor profile claims:</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "https://as.resource-domain.example",
  "sub": "https://idp.enterprise.example/users/alice",
  "client_id": "travel-assistant-client-id",
  "azp": "https://agents.example.com/travel-assistant",
  "aud": "https://api.resource-domain.example",
  "jti": "xyz987",
  "exp": 1711820400,
  "iat": 1711816800,
  "scope": "travel:book",
  "sub_profile": "user",
  "cnf": {
    "jkt": "NzbLsXh8uDCcd7MNwrnNZpX0ak8ACQ"
  },
  "act": {
    "sub": "https://agents.example.com/travel-assistant",
    "iss": "https://as.enterprise.example",
    "sub_profile": "ai_agent"
  }
}
]]></sourcecode>
        <t>In this single-hop case the top-level bearer key identifies the same party as the outermost actor because the actor is the bearer.  The differing <tt>client_id</tt>, <tt>azp</tt>, and <tt>act.sub</tt> values in this example are intentional: they illustrate a deployment where client-facing identifiers and actor identifiers are distinct and must be reconciled, if at all, only through trusted local mapping rules.  In multi-hop chains each actor remains a distinct identity in the chain; see <xref target="appendix-cross-domain">the cross-domain example</xref>.</t>
      </section>
      <section anchor="delegated-token-issuance">
        <name>Delegated Token Issuance</name>
        <t>When an AS issues a JWT access token outside Token Exchange and the token represents delegation through an independent delegation basis (<xref target="delegation-chains">Delegation Chains</xref>), it <bcp14>MUST</bcp14> establish that basis for the (<tt>sub</tt>, actor) relationship before including <tt>act</tt>.  Examples include a pre-registered delegation grant, an explicit consent record, or a policy rule covering the acting party or a class of acting parties.</t>
        <t>A client registration <bcp14>MAY</bcp14> satisfy this requirement only when it uniquely identifies a single distinct acting entity and the AS can derive that actor's identifier from the registration alone (for example, a dedicated registration for a specific agent or service).  A client registration that fronts multiple distinct acting entities (for example, an agent orchestration platform or shared-client deployment) does NOT satisfy this requirement, because <tt>client_id</tt> alone does not identify the runtime actor in those cases.</t>
        <t>When the AS determines the actor from authenticated client context, local delegation policy, or other deployment-specific inputs rather than from an explicit actor-carrying artifact, that is an operational allowance rather than an interoperable actor-proof mechanism defined by this document.  The interoperability defined here applies to the issued token and its processing, not to the upstream method by which the AS determined the actor.</t>
        <t>The authorization code flow is within scope of the preceding rules.  When a resource owner interactively authorizes an agent via <tt>/authorize</tt>, the AS <bcp14>MAY</bcp14> include <tt>act</tt> in the issued access token if it has an independent delegation basis establishing that the OAuth client is acting as a distinct actor on behalf of the resource owner.  The actor identity <bcp14>MUST</bcp14> be derived from that delegation basis.  If no such basis exists, the AS <bcp14>MUST NOT</bcp14> include <tt>act</tt> in the access token.</t>
        <t>This document does not define an authorization request parameter, authorization endpoint interaction, or token request parameter for selecting or proving the actor in the authorization code flow.  When actor-profile claims are included in access tokens issued from an authorization code grant, the AS determines the actor from local state established during authorization, client registration, consent, enterprise policy, or another deployment-specific mechanism.  Such issuance is interoperable only at the issued-token representation and resource-server processing layer.</t>
      </section>
    </section>
    <section anchor="token-exchange-processing">
      <name>Token Exchange Processing</name>
      <t>Each credential type presented as <tt>subject_token</tt> or <tt>actor_token</tt> in a Token Exchange request is processed per the applicable rules in this section.  These rules explain how subject or actor identity is introduced into the actor-profile model; they do not redefine the core <tt>act</tt> semantics in <xref target="actor-profile">Actor Profile for Delegation</xref>.</t>
      <t>This section covers RFC 8693 Token Exchange input processing and the output-token issuance rules for JWT assertion grants and JWT access tokens.  JWT assertion-grant structure is defined in <xref target="jwt-assertion-grants-structure">JWT Assertion Grant Structure</xref>.  JWT access-token structure is defined in <xref target="jwt-access-tokens-structure">JWT Access Token Structure</xref>.  Transaction Token issuance is defined separately in <xref target="transaction-token-service">Transaction Token Service Processing</xref>.</t>
      <t>Authorization-server error handling for requests processed in this section is defined in <xref target="actor-profile-error-responses">Error Responses</xref>.</t>
      <t>This profile defines three JWT-based <tt>actor_token</tt> credential types.  JWT access tokens use <tt>actor_token_type=urn:ietf:params:oauth:token-type:access_token</tt> (<xref target="jwt-access-token-as-actor-token">JWT Access Token as actor_token</xref>).  RFC 7523 client assertions (<xref target="jwt-client-assertion-as-actor-token">JWT Client Assertion</xref>) and workload identity credentials (<xref target="workload-identity-as-actor-token">Workload Credential Processing</xref>) both use <tt>actor_token_type=urn:ietf:params:oauth:token-type:jwt</tt> and are distinguished as follows.</t>
      <t>A JWT is identified as the RFC 7523 client-assertion profile when it is presented as <tt>client_assertion</tt> with <tt>client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer</tt> AND its <tt>sub</tt> equals the <tt>client_id</tt> of the authenticating client.  A JWT presented as <tt>client_assertion</tt> whose <tt>sub</tt> does not equal <tt>client_id</tt> is not a conformant RFC 7523 assertion and <bcp14>MUST NOT</bcp14> be identified as the RFC 7523 client-assertion profile solely on the basis of the <tt>client_assertion</tt> parameter; the AS <bcp14>MUST</bcp14> instead apply workload identity credential processing if the credential otherwise matches that profile, or reject with <tt>invalid_grant</tt> if no profile matches.  If the AS cannot identify exactly one supported actor-credential profile for the <tt>actor_token</tt>, it <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.  When <tt>client_assertion</tt> and <tt>actor_token</tt> are different JWTs, the AS <bcp14>MUST</bcp14> process them independently per the rules of their respective types; the disambiguation rule above applies only to the <tt>actor_token</tt>.</t>
      <section anchor="token-exchange-presenter-model">
        <name>Presenter Transition Model</name>
        <t>For PoP migration, this profile distinguishes two semantic classes of <tt>subject_token</tt> input based on whether they carry inbound <tt>act</tt> state and presenter-continuity information:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Input type</th>
              <th align="left">Carries inbound act state</th>
              <th align="left">Carries top-level cnf</th>
              <th align="left">Presenter continuity</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ID token</td>
              <td align="left">No</td>
              <td align="left">No</td>
              <td align="left">Not available</td>
            </tr>
            <tr>
              <td align="left">Refresh token</td>
              <td align="left">No</td>
              <td align="left">No</td>
              <td align="left">Not available</td>
            </tr>
            <tr>
              <td align="left">JWT assertion grant</td>
              <td align="left">Yes (if present)</td>
              <td align="left">Yes (if present)</td>
              <td align="left">Available</td>
            </tr>
            <tr>
              <td align="left">JWT access token</td>
              <td align="left">Yes (if present)</td>
              <td align="left">Yes (if present)</td>
              <td align="left">Available</td>
            </tr>
            <tr>
              <td align="left">Transaction Token</td>
              <td align="left">Yes (if present)</td>
              <td align="left">Yes (if present)</td>
              <td align="left">Available</td>
            </tr>
          </tbody>
        </table>
        <t>Identity-only inputs (ID tokens, refresh tokens) establish <tt>sub</tt> and <bcp14>MAY</bcp14> establish supporting subject state such as <tt>sub_profile</tt> or an authorization ceiling.  They do not establish inbound <tt>act</tt> state or presenter continuity, and do not by themselves justify carrying <tt>act</tt> into the issued token.</t>
        <t>Token-state inputs (JWT assertion grants, JWT access tokens, Transaction Tokens) establish <tt>sub</tt> and <bcp14>MAY</bcp14> establish <tt>sub_profile</tt>, inbound <tt>act</tt> chain state, and current-presenter binding through top-level <tt>cnf</tt>.  They are the only <tt>subject_token</tt> inputs from which this document defines interoperable delegation-chain preservation and presenter continuation.</t>
        <t>Token Exchange under this profile runs in exactly one of two presenter-transition modes:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Presenter continuation</strong>: no validated <tt>actor_token</tt> establishing a new presenter is supplied.  The issued token keeps the presenter of a PoP-capable token-state <tt>subject_token</tt>.</t>
          </li>
          <li>
            <t><strong>Presenter rebind</strong>: a validated <tt>actor_token</tt> establishes a new presenter for the issued token.  When the output token is sender-constrained, its top-level <tt>cnf</tt> is bound to that new presenter.</t>
          </li>
        </ul>
        <t>This document defines presenter rebind only when a validated <tt>actor_token</tt> establishes the new presenter.  Other ways an implementation might authenticate or install a new presenter are deployment-specific and outside the scope of this document.</t>
        <t>When the inbound <tt>subject_token</tt> is bearer or identity-only, presenter continuation is unavailable, but presenter rebind remains available.  This bearer-to-PoP upgrade path lets a deployment exchange an existing bearer-style input for a sender-constrained output token without changing the actor semantics defined by this profile.</t>
        <t>A rebind-capable <tt>actor_token</tt> under this profile is a <strong>direct presenter credential</strong>: its own top-level subject identity names the new presenter, and the request proves possession according to that credential profile when sender-constrained output is being established.</t>
        <t>For legacy bearer-to-PoP migration, the recommended interoperable pattern is to present the existing bearer-style or identity-only credential as <tt>subject_token</tt>, present a direct presenter credential as <tt>actor_token</tt>, and issue a sender-constrained output token in presenter-rebind mode.  Deployments that need to preserve an inbound delegation chain while changing presenters <bcp14>SHOULD</bcp14> use the delegated credential as <tt>subject_token</tt> and a separate direct presenter credential as <tt>actor_token</tt>.</t>
        <t>JWT assertion grants are not suitable for use as <tt>actor_token</tt> in Token Exchange.  Their <tt>sub</tt> identifies the subject of delegation rather than the acting party.  Requests that need to establish an agent, workload, or client as the actor <bcp14>SHOULD</bcp14> use one of the actor credential types defined in this section instead.</t>
      </section>
      <section anchor="subject-tokens">
        <name>Subject Tokens</name>
        <t>This section is organized by the two semantic <tt>subject_token</tt> classes defined in <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>.  The class-level text defines the common actor-profile consequences.  The individual token sections then define only the validation and extraction rules specific to each token type.  SAML 1.1 and SAML 2.0 assertions are not supported <tt>subject_token</tt> inputs under this profile; while <xref target="RFC8693"/> defines token type URNs for SAML assertions, actor-profile extraction from XML-based SAML credentials is outside scope.</t>
        <section anchor="token-state-subject-tokens">
          <name>Token-State Subject Tokens</name>
          <t>JWT assertion grants, JWT access tokens, and Transaction Tokens are token-state <tt>subject_token</tt> inputs.  For these inputs, this document defines the following common model:</t>
          <ul spacing="normal">
            <li>
              <t>the validated token establishes the inbound <tt>sub</tt>;</t>
            </li>
            <li>
              <t><tt>sub_profile</tt>, if present and trusted, becomes inbound supporting subject state;</t>
            </li>
            <li>
              <t><tt>act</tt>, if present, becomes inbound delegation-chain state for <xref target="jwt-access-token-propagation">JWT Access Token Output</xref> or <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>;</t>
            </li>
            <li>
              <t>top-level <tt>cnf</tt>, if present, makes the input eligible for presenter continuation under <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>;</t>
            </li>
            <li>
              <t>if top-level <tt>cnf</tt> is absent, the token still <bcp14>MAY</bcp14> be used in presenter-rebind mode for bearer-to-PoP upgrade.</t>
            </li>
          </ul>
          <section anchor="jwt-assertion-grant-as-subject-token">
            <name>JWT Assertion Grant</name>
            <t>When a Token Exchange request (<xref target="RFC8693"/>) presents a JWT assertion grant as the <tt>subject_token</tt>, the AS <bcp14>MUST</bcp14> apply the inbound validation rules of <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref> to validate the inbound token.  Assertion-grant output construction from that section does not apply; propagation and scope reduction are governed by the rules below and by <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.</t>
            <t>A JWT assertion grant used as <tt>subject_token</tt> is a token-state input for <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>.  If it carries top-level <tt>cnf</tt>, presenter continuation requires proof for that binding per <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>.  If it does not carry top-level <tt>cnf</tt>, it still <bcp14>MAY</bcp14> be used as a bearer subject token in presenter-rebind mode for bearer-to-PoP upgrade when a validated <tt>actor_token</tt> establishes the new presenter.</t>
            <t>The AS <bcp14>MUST</bcp14> apply scope reduction per <xref section="4" sectionFormat="comma" target="RFC8693"/> and <bcp14>MUST</bcp14> then apply the propagation rules in <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.</t>
          </section>
          <section anchor="jwt-access-token-as-subject-token">
            <name>JWT Access Token</name>
            <t>When a Token Exchange request (<xref target="RFC8693"/>) presents a JWT access token as the <tt>subject_token</tt> (<tt>subject_token_type=urn:ietf:params:oauth:token-type:access_token</tt>), the AS <bcp14>MUST</bcp14> apply the following steps.  Use of an opaque access token as the <tt>subject_token</tt> is outside the interoperable scope of this profile (see <xref target="profile-scope">Profile Scope</xref>).</t>
            <ol spacing="normal" type="1"><li>
                <t>The AS <bcp14>MUST</bcp14> validate the inbound JWT access token per <xref target="RFC9068"/>: signature, <tt>iss</tt>, <tt>sub</tt>, <tt>exp</tt>, <tt>nbf</tt>, and <tt>jti</tt>.  Because a JWT access token used as <tt>subject_token</tt> was issued for a resource server, its <tt>aud</tt> will not ordinarily include the Token Exchange AS's token endpoint; the AS <bcp14>MUST NOT</bcp14> reject the inbound token solely because its <tt>aud</tt> does not include the AS's token endpoint URI.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> verify that the inbound token's <tt>iss</tt> is trusted under local policy to assert the delegation chain it carries.  If not, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>If the inbound token carries top-level <tt>cnf</tt>, it is a PoP-capable token-state input for <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>, and the AS <bcp14>MUST</bcp14> apply the continuation or rebind rules in <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>.  If the inbound token carries no top-level <tt>cnf</tt>, it is a bearer <tt>subject_token</tt> for PoP purposes and <bcp14>MAY</bcp14> still be used in presenter-rebind mode for bearer-to-PoP upgrade.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> extract <tt>sub</tt>, <tt>sub_profile</tt> (if present), and <tt>act</tt> (if present) from the validated token as the inbound delegation state for <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> apply scope reduction per <xref section="4" sectionFormat="comma" target="RFC8693"/>.  The effective scope of the issued token <bcp14>MUST NOT</bcp14> exceed the inbound token's effective scope.</t>
              </li>
            </ol>
            <t>After completing these steps, the AS <bcp14>MUST</bcp14> apply the propagation rules in <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.</t>
          </section>
          <section anchor="txn-token-as-subject-token">
            <name>Transaction Token</name>
            <t>When a Token Exchange request (<xref target="RFC8693"/>) presents a Transaction Token as the <tt>subject_token</tt> (<tt>subject_token_type=urn:ietf:params:oauth:token-type:txn_token</tt>) to a regular AS (not a TTS), the AS <bcp14>MUST</bcp14> apply the following steps.</t>
            <ol spacing="normal" type="1"><li>
                <t>The AS <bcp14>MUST</bcp14> validate the Transaction Token per <xref target="I-D.ietf-oauth-transaction-tokens"/> (signature, <tt>aud</tt>, <tt>exp</tt>, <tt>iat</tt>, and issuer identity).  When the token carries an <tt>act</tt> claim, the top-level <tt>iss</tt> claim <bcp14>MUST</bcp14> be present and the AS <bcp14>MUST</bcp14> validate it as the Transaction Token issuer identifier; if <tt>iss</tt> is absent, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_request</tt>.  When the token carries no <tt>act</tt> claim and <tt>iss</tt> is absent, the AS <bcp14>MUST</bcp14> determine the issuer using the trust-domain and issuer-identification rules of <xref target="I-D.ietf-oauth-transaction-tokens"/> and local deployment configuration.  If validation fails or the issuer cannot be established, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> verify that the Transaction Token issuer identified in step 1 is trusted under local policy.  If not, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>If the inbound Transaction Token carries a top-level presenter-binding claim such as <tt>cnf</tt>, it is a PoP-capable token-state input for <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>, and the AS <bcp14>MUST</bcp14> apply the continuation or rebind rules in <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref> using the proof mechanism defined by <xref target="I-D.ietf-oauth-transaction-tokens"/> and the applicable deployment profile.  If the inbound Transaction Token carries no top-level presenter binding, it <bcp14>MAY</bcp14> still be used in presenter-rebind mode for bearer-to-PoP upgrade.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> extract <tt>sub</tt>, <tt>sub_profile</tt> (if present), and <tt>act</tt> (if present) from the validated Transaction Token as the inbound delegation state for <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.</t>
              </li>
              <li>
                <t>The <tt>req_wl</tt> claim identifies the workload that requested the Transaction Token from the TTS and provides informational context about the transaction origin.  The AS <bcp14>MAY</bcp14> use <tt>req_wl</tt> for audit or local policy decisions but <bcp14>MUST NOT</bcp14> carry it forward into the issued JWT access token.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> apply the propagation rules in <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.  For a Transaction Token used as <tt>subject_token</tt>, this document defines only the actor-profile consequences of the inbound <tt>sub</tt>, <tt>act</tt>, <tt>req_wl</tt>, and presenter-binding state.  Transaction Token field semantics and any transaction-specific scope handling remain defined by <xref target="I-D.ietf-oauth-transaction-tokens"/>, <xref target="RFC8693"/>, and local policy.</t>
              </li>
            </ol>
          </section>
        </section>
        <section anchor="identity-only-subject-tokens">
          <name>Identity-Only Subject Tokens</name>
          <t>ID tokens and refresh tokens are identity-only <tt>subject_token</tt> inputs.  For these inputs, this document defines the following common model:</t>
          <ul spacing="normal">
            <li>
              <t>the validated input establishes <tt>sub</tt>;</t>
            </li>
            <li>
              <t><tt>sub_profile</tt>, if available from the validated input or trusted state, becomes supporting subject state;</t>
            </li>
            <li>
              <t>the input does not establish inbound <tt>act</tt> chain state for propagation;</t>
            </li>
            <li>
              <t>the input does not establish presenter continuity;</t>
            </li>
            <li>
              <t>any <tt>act</tt> in the issued token therefore comes from a validated <tt>actor_token</tt> or another independent delegation basis under local policy;</t>
            </li>
            <li>
              <t>any sender-constrained issued token is therefore issued in presenter-rebind mode, with the new presenter established in the current exchange.</t>
            </li>
          </ul>
          <section anchor="id-tokens">
            <name>OpenID Connect ID Token</name>
            <section anchor="id-token-overview">
              <name>Overview</name>
              <t>An OpenID Connect ID token <xref target="OpenID.Core"/> is a JWT issued by an OpenID Provider (OP) that asserts the authenticated identity of a user.  Its <tt>sub</tt> identifies the user, its <tt>aud</tt> identifies the relying party (the OAuth client) to which it was issued, and it may carry <tt>azp</tt> as an authorized-party/client identifier per <xref target="OpenID.Core"/>.  Under this profile, <tt>aud</tt> and <tt>azp</tt> remain client-identity inputs; they do not establish actor identity.  ID tokens carry no <tt>act</tt> claim and no delegation chain; they establish the user's identity only.</t>
              <t>In this profile, ID tokens serve as <tt>subject_token</tt> in Token Exchange requests to introduce a user identity into a delegation chain.  The acting party is established by the <tt>actor_token</tt>.  This is the foundational pattern for cross-domain identity chaining: the user's OIDC identity flows forward as <tt>sub</tt> in the issued token while the actor identity becomes <tt>act.sub</tt>.</t>
            </section>
            <section anchor="id-token-as-subject-token">
              <name>Processing</name>
              <t>When a Token Exchange request (<xref target="RFC8693"/>) presents an ID token as the <tt>subject_token</tt> (<tt>subject_token_type=urn:ietf:params:oauth:token-type:id_token</tt>), the AS <bcp14>MUST</bcp14> apply the following steps.</t>
              <ol spacing="normal" type="1"><li>
                  <t>The AS <bcp14>MUST</bcp14> validate the ID token per <xref target="OpenID.Core"/> and local policy before using it as actor-profile input.  Any checks on <tt>aud</tt> or <tt>azp</tt> remain OpenID Connect and client-identity checks; they do not by themselves establish the delegated actor under this profile.</t>
                </li>
                <li>
                  <t>The AS <bcp14>MUST</bcp14> use the validated ID token's <tt>sub</tt> as the subject identity for the issued token, subject to the same-subject preservation rule in <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.</t>
                </li>
                <li>
                  <t>The AS <bcp14>SHOULD</bcp14> set <tt>sub_profile</tt> to <tt>user</tt> in the issued token if it can authoritatively classify the ID token's <tt>sub</tt> as a human user identity and no conflicting subject classification is available under local policy.</t>
                </li>
                <li>
                  <t>The ID token is an identity-only <tt>subject_token</tt> for <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>.  It does not establish actor identity or presenter continuity.  If an <tt>actor_token</tt> is present, the AS <bcp14>MUST</bcp14> process it per its type-specific rules and <bcp14>MUST</bcp14> use the derived actor identity as <tt>act.sub</tt>.  If the issued token is sender-constrained, that <tt>actor_token</tt> also establishes the new presenter for presenter-rebind mode.  If no <tt>actor_token</tt> or independent delegation basis is present, the AS <bcp14>MUST NOT</bcp14> include <tt>act</tt> in the issued token.</t>
                </li>
                <li>
                  <t>The AS <bcp14>MUST</bcp14> apply the propagation rules in <xref target="jwt-access-token-propagation">JWT Access Token Output</xref> to determine the remaining claims in the issued token.  Because an ID token carries no inbound <tt>act</tt> chain and no OAuth scope ceiling, delegation-chain construction and scope determination come from the <tt>actor_token</tt> (if any), <xref target="RFC8693"/>, and local policy rather than from the ID token itself.</t>
                </li>
              </ol>
            </section>
          </section>
          <section anchor="refresh-tokens">
            <name>Refresh Token</name>
            <section anchor="refresh-token-overview">
              <name>Overview</name>
              <t>A refresh token is a long-lived credential issued by an AS to a specific OAuth client that authorizes that client to obtain new access tokens without repeating end-user authentication.  Refresh tokens are opaque by design; they do not carry claims such as <tt>sub</tt> or <tt>act</tt> and are validated through the issuing AS's own token store rather than by signature verification.</t>
              <t>Refresh tokens <bcp14>MAY</bcp14> be presented as <tt>subject_token</tt> in a Token Exchange request to introduce a user's existing authorization into a delegation chain; for example, when a client authorized to use a user's refresh token needs a delegated access token for a specific resource.  This use is intended for same-AS deployments or deployments with a trusted back-channel to the issuing AS.  A refresh token <bcp14>MUST NOT</bcp14> be treated as a portable cross-domain delegation artifact.  Because refresh tokens carry no identity claims directly, the actor <bcp14>MUST</bcp14> be established by an <tt>actor_token</tt> in the same request or by an independent delegation basis under local policy.</t>
              <t>Refresh tokens <bcp14>MUST NOT</bcp14> be used as <tt>actor_token</tt>.  They carry no actor identity, are opaque credentials bound to a user authorization grant rather than to a workload or client identity, and cannot supply the <tt>sub</tt> value required to construct <tt>act.sub</tt>.</t>
              <t>This document does not standardize client-binding policy, cross-client presentation policy, or cross-AS acceptance policy for refresh tokens used as <tt>subject_token</tt>.  Those behaviors remain deployment-specific.  This document defines refresh-token <tt>subject_token</tt> processing only for deployments where the AS can validate the refresh token's authorization state directly or through a trusted back-channel.  Cross-AS refresh-token presentation without such validation is outside the interoperable scope of this profile.</t>
            </section>
            <section anchor="refresh-token-as-subject-token">
              <name>Processing</name>
              <t>When a Token Exchange request (<xref target="RFC8693"/>) presents a refresh token as the <tt>subject_token</tt> (<tt>subject_token_type=urn:ietf:params:oauth:token-type:refresh_token</tt>), the AS <bcp14>MUST</bcp14> apply the following steps.</t>
              <ol spacing="normal" type="1"><li>
                  <t>The AS <bcp14>MUST</bcp14> validate the refresh token through its own token store or a trusted back-channel with the issuing AS.  Signature-based validation does not apply.  If the AS did not issue the refresh token, it <bcp14>MUST NOT</bcp14> accept the token unless it validates the token and obtains the associated subject, client binding, authorized scope, and revocation state through a trusted back-channel with the issuing AS.  If the token is expired, revoked, or otherwise invalid, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
                </li>
                <li>
                  <t>The AS <bcp14>MUST</bcp14> verify that the requesting client or authenticated presenter is authorized to use the refresh token under the refresh token's client-binding, sender-constraint, rotation, and cross-client presentation policy.  If the requester is not authorized to use the refresh token, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
                </li>
                <li>
                  <t>The AS <bcp14>MUST</bcp14> extract the subject identity and authorized scope associated with the refresh token from its token store or other trusted refresh-token state.  The <tt>sub</tt> of the user associated with the refresh token becomes <tt>sub</tt> in the issued token.  The AS <bcp14>SHOULD</bcp14> set <tt>sub_profile</tt> in the issued token if it can authoritatively classify the subject entity type.</t>
                </li>
                <li>
                  <t>Refresh tokens are identity-only <tt>subject_token</tt> inputs for <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>; they do not establish presenter continuity or actor identity.  A refresh token alone does not establish delegation.  The acting party <bcp14>MUST</bcp14> be established by an <tt>actor_token</tt> or an independent delegation basis under local policy.  If neither is present, the AS <bcp14>MUST NOT</bcp14> include <tt>act</tt> in the issued token.  If an <tt>actor_token</tt> is present, the AS <bcp14>MUST</bcp14> process it per its type-specific rules and <bcp14>MUST</bcp14> use the actor identity derived by those rules as the outermost actor in the issued token.  If the issued token is sender-constrained, that <tt>actor_token</tt> also establishes the new presenter for presenter-rebind mode.</t>
                </li>
                <li>
                  <t>The effective scope of the issued token <bcp14>MUST</bcp14> be a subset of the scope authorized by the refresh token.  The AS <bcp14>MUST</bcp14> apply scope reduction per <xref section="4" sectionFormat="comma" target="RFC8693"/> against that ceiling.</t>
                </li>
              </ol>
              <t>After completing these checks, the AS <bcp14>MUST</bcp14> apply the propagation rules in <xref target="jwt-access-token-propagation">JWT Access Token Output</xref> to determine the remaining claims in the issued token.</t>
              <t>This document does not standardize whether an AS issues refresh tokens in response to delegated JWT assertion grant requests, how such refresh tokens are revoked, or whether later use of such refresh tokens requires re-presentation of upstream delegation artifacts.  Those decisions remain deployment-specific.</t>
            </section>
          </section>
        </section>
      </section>
      <section anchor="actor-tokens">
        <name>Actor Tokens</name>
        <t>An <tt>actor_token</tt> of any type defined in this profile <bcp14>MUST</bcp14> identify the acting party in its top-level <tt>sub</tt>.  If the <tt>actor_token</tt> carries an <tt>act</tt> claim, indicating that the credential itself represents a delegation chain rather than a direct identity assertion, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.  This uniform rule preserves the identity-extraction invariant that the <tt>actor_token</tt>'s top-level <tt>sub</tt> is the new outermost actor.  Type-specific sections below refine validation and presenter-rebind handling.</t>
        <t>Interoperable sub-delegation under this profile therefore requires every actor that may become a new presenter to possess a direct presenter credential naming itself in <tt>sub</tt>.  Deployments anticipating multi-hop chains <bcp14>SHOULD</bcp14> provision intermediate actors accordingly.</t>
        <section anchor="jwt-client-assertion-as-actor-token">
          <name>JWT Client Assertion</name>
          <section anchor="overview-1">
            <name>Overview</name>
            <t>A JWT client assertion per <xref target="RFC7523"/> may be presented as <tt>actor_token</tt> (<tt>actor_token_type=urn:ietf:params:oauth:token-type:jwt</tt>) to establish an OAuth client's own identity as the acting party.  Per <xref target="RFC7523"/>, the assertion has <tt>iss = sub = client_id</tt> and is signed with the client's private key.  Under <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>, it is a direct presenter credential.  Two usage patterns arise:</t>
            <ul spacing="normal">
              <li>
                <t>The same JWT is presented as both <tt>client_assertion</tt> and <tt>actor_token</tt> in a single request, making the authenticated client identity explicit in the issued token's <tt>act</tt> chain.</t>
              </li>
              <li>
                <t>The client authenticates by another method (e.g., <tt>client_secret</tt>, mTLS) and presents a separate JWT client assertion as <tt>actor_token</tt> to name that same client as the actor.</t>
              </li>
            </ul>
            <t>To establish a principal distinct from the OAuth <tt>client_id</tt> as the actor, the request <bcp14>MUST</bcp14> use a different actor credential type, such as a workload identity credential (<xref target="workload-identity-as-actor-token">Workload Credential Processing</xref>), whose <tt>sub</tt> names that distinct principal.  A client assertion conforming to <xref target="RFC7523"/> cannot name a subordinate identity.</t>
          </section>
          <section anchor="processing">
            <name>Processing</name>
            <t>When a Token Exchange request includes an <tt>actor_token</tt> that is a JWT client assertion, the AS <bcp14>MUST</bcp14> apply the following steps.</t>
            <ol spacing="normal" type="1"><li>
                <t>The AS <bcp14>MUST</bcp14> validate the <tt>actor_token</tt> per <xref target="RFC7523"/>.  If the same JWT is also used as <tt>client_assertion</tt> for client authentication in the same request and this shared validation fails, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_client</tt>; otherwise, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> verify that the <tt>actor_token</tt>'s <tt>iss</tt> is a client registered with the AS, that <tt>sub</tt> equals that client's <tt>client_id</tt>, and that local policy permits that client's assertion to be used as an actor credential.  If not, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>The <tt>actor_token</tt>'s <tt>sub</tt> identifies the immediate acting party.  The AS <bcp14>MUST</bcp14> use it as <tt>act.sub</tt> in the outermost <tt>act</tt> of the issued token and <bcp14>MUST</bcp14> set <tt>act.iss</tt> to the issuer or namespace context in which that actor identifier is to be interpreted.</t>
              </li>
              <li>
                <t>When the <tt>actor_token</tt> is the same JWT presented as <tt>client_assertion</tt> for client authentication in the same request, the AS <bcp14>MAY</bcp14> derive the actor identity from the already-authenticated client context rather than re-validating the <tt>actor_token</tt> separately, provided the result is an identical <tt>act.sub</tt> value.  Actor-profile-specific policy failures that occur after successful client authentication are still <tt>invalid_grant</tt>, not <tt>invalid_client</tt>.</t>
              </li>
              <li>
                <t>When the request uses this client assertion to establish a sender-constrained output token in presenter-rebind mode, the AS <bcp14>MUST</bcp14> validate any proof required by the selected proof mechanism for the new presenter per <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>.</t>
              </li>
              <li>
                <t>When a <tt>subject_token</tt> is also present and carries an <tt>act</tt> chain: the <tt>actor_token</tt>'s <tt>sub</tt> takes precedence as the new outermost actor identity.  Divergence (the <tt>actor_token</tt>'s identified principal and the inbound outermost <tt>act.sub</tt> refer to different entities under their respective issuer or namespace contexts, with no trusted local mapping establishing equivalence) is the normal case in presenter-rebind flows and is permitted by default.  Local policy <bcp14>MAY</bcp14> restrict divergence for specific request paths where the <tt>actor_token</tt> is expected only to confirm an existing actor rather than introduce a new one; when such a restriction applies and the identities diverge, the AS <bcp14>MUST</bcp14> reject with <tt>invalid_grant</tt>.  Any prior <tt>act</tt> chain in the <tt>actor_token</tt> itself <bcp14>MUST NOT</bcp14> be automatically merged with the <tt>subject_token</tt>'s chain; the AS <bcp14>MUST</bcp14> omit it from the issued token unless local policy defines a single unambiguous ordering, in which case the AS <bcp14>MAY</bcp14> preserve it subject to the chain-depth limit in <xref target="delegation-chains">Delegation Chains</xref>.</t>
              </li>
            </ol>
          </section>
        </section>
        <section anchor="workload-identity">
          <name>Workload Identity Credential</name>
          <section anchor="workload-identity-overview">
            <name>Overview</name>
            <t>A workload identity credential is a JWT that asserts the identity of a software workload (such as a microservice, AI agent, or batch job).  Unlike JWT assertion grants (<xref target="jwt-assertion-grants-structure">JWT Assertion Grant Structure</xref>), whose <tt>sub</tt> identifies the principal on whose behalf the grant is made, a workload credential has the workload's own identifier in <tt>sub</tt>, making it the natural credential type for establishing an agent or service as the acting party.  Under <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>, it is a direct presenter credential.  WIMSE workload credentials are defined in <xref target="I-D.ietf-wimse-workload-creds"/>; profile disambiguation is in <xref target="token-exchange-processing">Token Exchange Processing</xref>.</t>
            <t>The recommended pattern for agentic Token Exchange is:</t>
            <ul spacing="normal">
              <li>
                <t><tt>subject_token</tt>: a JWT access token or JWT assertion grant carrying the user's <tt>sub</tt> and the delegation chain (<tt>act</tt>)</t>
              </li>
              <li>
                <t><tt>actor_token</tt>: a workload identity credential whose <tt>sub</tt> is the agent or service identity</t>
              </li>
              <li>
                <t>Output: a JWT access token with the user as <tt>sub</tt> and the workload as the outermost <tt>act.sub</tt></t>
              </li>
            </ul>
          </section>
          <section anchor="workload-identity-as-actor-token">
            <name>Processing</name>
            <t>When a Token Exchange request (<xref target="RFC8693"/>) includes an <tt>actor_token</tt> that is a workload identity credential, the AS <bcp14>MUST</bcp14> apply the following steps.</t>
            <ol spacing="normal" type="1"><li>
                <t>The AS <bcp14>MUST</bcp14> validate the workload identity credential per its type specification.  For WIMSE workload identity credentials (<xref target="I-D.ietf-wimse-workload-creds"/>), validation follows the rules defined in that specification.  If validation fails, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> verify that the workload credential's issuer (<tt>iss</tt>) is trusted under local policy to assert the workload's identity.  If not, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>The workload credential's <tt>sub</tt> identifies the immediate acting party.  The AS <bcp14>MUST</bcp14> use it as <tt>act.sub</tt> in the outermost <tt>act</tt> of the issued token and <bcp14>MUST</bcp14> set <tt>act.iss</tt> to the issuer or namespace context in which that actor identifier is to be interpreted.</t>
              </li>
              <li>
                <t>When the request uses this workload credential to establish a sender-constrained output token in presenter-rebind mode, the AS <bcp14>MUST</bcp14> validate the proof required by the workload-credential profile: a WIMSE Workload Proof Token (WPT, <xref target="I-D.ietf-wimse-wpt"/>) per its specification, or a DPoP proof (<xref target="RFC9449"/>) over the token endpoint URI when the credential carries <tt>cnf.jkt</tt>.  If the required proof is absent or invalid, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>When a <tt>subject_token</tt> is also present and carries an <tt>act</tt> chain:  </t>
                <ul spacing="normal">
                  <li>
                    <t>The workload credential's <tt>sub</tt> takes precedence as the new outermost actor identity.</t>
                  </li>
                  <li>
                    <t>Divergence from the inbound outermost <tt>act.sub</tt> (the two identities refer to different entities under their respective issuer or namespace contexts, with no trusted local mapping establishing equivalence) is permitted by default, as this is the normal case in presenter-rebind flows.  Local policy <bcp14>MAY</bcp14> restrict divergence for paths where the <tt>actor_token</tt> is expected only to confirm an existing actor; when such a restriction applies and the identities diverge, the AS <bcp14>MUST</bcp14> reject with <tt>invalid_grant</tt>.</t>
                  </li>
                  <li>
                    <t>Any prior <tt>act</tt> chain in the <tt>actor_token</tt> itself <bcp14>MUST NOT</bcp14> be automatically merged with the <tt>subject_token</tt>'s chain; the AS <bcp14>MUST</bcp14> omit it from the issued token unless local policy defines a single unambiguous ordering, in which case the AS <bcp14>MAY</bcp14> preserve it subject to the chain-depth limit in <xref target="delegation-chains">Delegation Chains</xref>.</t>
                  </li>
                </ul>
              </li>
            </ol>
          </section>
        </section>
        <section anchor="jwt-access-token-as-actor-token">
          <name>JWT Access Token</name>
          <section anchor="overview-2">
            <name>Overview</name>
            <t>A non-delegated JWT access token may be presented as <tt>actor_token</tt> to establish a service or workload as the acting party; its top-level <tt>sub</tt> identifies the acting party and satisfies the direct-presenter-credential requirement in <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>.  A delegated JWT access token (one carrying <tt>act</tt>) does not satisfy that requirement; see <xref target="actor-tokens">Actor Tokens</xref> for the sub-delegation pattern.</t>
          </section>
          <section anchor="processing-1">
            <name>Processing</name>
            <t>When a Token Exchange request includes an <tt>actor_token</tt> that is a JWT access token (<tt>actor_token_type=urn:ietf:params:oauth:token-type:access_token</tt>), the AS <bcp14>MUST</bcp14> apply the following steps.  Use of an opaque access token as the <tt>actor_token</tt> is outside the interoperable scope of this profile (see <xref target="profile-scope">Profile Scope</xref>).</t>
            <ol spacing="normal" type="1"><li>
                <t>The AS <bcp14>MUST</bcp14> validate the <tt>actor_token</tt> per <xref target="RFC9068"/>.  If validation fails, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>The AS <bcp14>MUST</bcp14> verify that the <tt>actor_token</tt>'s <tt>iss</tt> is trusted under local policy to assert the acting party's identity in the top-level <tt>sub</tt>.  If trust cannot be established, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>Apply the uniform <tt>actor_token</tt> rule in <xref target="actor-tokens">Actor Tokens</xref>: if the <tt>actor_token</tt> carries <tt>act</tt>, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t>The <tt>actor_token</tt>'s top-level <tt>sub</tt> identifies the immediate acting party.  The AS <bcp14>MUST</bcp14> use it as <tt>act.sub</tt> in the outermost <tt>act</tt> of the issued token and <bcp14>MUST</bcp14> set <tt>act.iss</tt> to the issuer or namespace context in which that actor identifier is to be interpreted.</t>
              </li>
              <li>
                <t>When the request uses this JWT access token to establish a sender-constrained output token in presenter-rebind mode and the token carries top-level <tt>cnf</tt>, the AS <bcp14>MUST</bcp14> validate proof for that binding per <xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>.</t>
              </li>
              <li>
                <t>When a <tt>subject_token</tt> is also present and carries an <tt>act</tt> chain, the outermost actor identity derived from this <tt>actor_token</tt> takes precedence as the new outermost actor.  Divergence from the inbound outermost <tt>act.sub</tt> (the two identities refer to different entities under their respective issuer or namespace contexts, with no trusted local mapping establishing equivalence) is permitted by default.  Local policy <bcp14>MAY</bcp14> restrict divergence for paths where the <tt>actor_token</tt> is expected only to confirm an existing actor; when such a restriction applies and the identities diverge, the AS <bcp14>MUST</bcp14> reject with <tt>invalid_grant</tt>.</t>
              </li>
            </ol>
          </section>
        </section>
      </section>
      <section anchor="may-act">
        <name><tt>may_act</tt></name>
        <t>The <tt>may_act</tt> claim (<xref section="4.4" sectionFormat="comma" target="RFC8693"/>) pre-authorizes a specific party to act on behalf of the subject in a subsequent Token Exchange.  This document defines limited use of <tt>may_act</tt> as a delegation-authorization input when actor identity is established by other means: when present in a validated <tt>subject_token</tt>, it <bcp14>MAY</bcp14> satisfy the delegation-authorization check in step 3 of <xref target="validate-outermost-actor">Validate Outermost Actor</xref> without a separately pre-registered grant.  In no case is <tt>may_act</tt> itself the source of actor identity, and it <bcp14>MUST NOT</bcp14> be propagated into any output token.</t>
        <t>Two pre-conditions apply regardless of how the Token Exchange request is structured:</t>
        <ol spacing="normal" type="1"><li>
            <t>The <tt>subject_token</tt> issuer is trusted under local policy to assert <tt>may_act</tt> on behalf of the subject.</t>
          </li>
          <li>
            <t>The canonical <tt>may_act</tt> identifier matches the derived actor identity under Identifier Reconciliation (<xref target="conventions">Conventions and Definitions</xref>).</t>
          </li>
        </ol>
        <t>Because <xref target="RFC8693"/> Section 4.4 defines <tt>may_act</tt> with only a <tt>sub</tt> member and no <tt>iss</tt>, the issuer or namespace context for <tt>may_act.sub</tt> is taken to be <tt>subject_token.iss</tt>; the canonical <tt>may_act</tt> identifier is therefore (<tt>subject_token.iss</tt>, <tt>may_act.sub</tt>).  The AS <bcp14>MUST</bcp14> apply configured mapping rules and <bcp14>MUST NOT</bcp14> infer equivalence from naming similarity alone.</t>
        <t>How actor identity is derived and how the identifier reconciliation check is performed depends on what the request supplies:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Request includes</th>
              <th align="left">Actor identity source</th>
              <th align="left">Identifier Reconciliation</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>actor_token</tt></td>
              <td align="left">Derived from <tt>actor_token</tt> per type-specific rules, yielding (<tt>act.iss</tt>, <tt>act.sub</tt>)</td>
              <td align="left">Reconcile (<tt>subject_token.iss</tt>, <tt>may_act.sub</tt>) against (<tt>act.iss</tt>, <tt>act.sub</tt>)</td>
            </tr>
            <tr>
              <td align="left">No <tt>actor_token</tt></td>
              <td align="left">Authenticated confidential client credential</td>
              <td align="left">Reconcile (<tt>subject_token.iss</tt>, <tt>may_act.sub</tt>) against the canonical client identifier</td>
            </tr>
          </tbody>
        </table>
        <t><strong><tt>actor_token</tt> present</strong>: actor identity is derived from the <tt>actor_token</tt> per the applicable type-specific rules in this document, yielding the (<tt>act.iss</tt>, <tt>act.sub</tt>) pair.  The AS applies Identifier Reconciliation to determine whether (<tt>subject_token.iss</tt>, <tt>may_act.sub</tt>) refers to the same entity as (<tt>act.iss</tt>, <tt>act.sub</tt>).  <tt>may_act</tt> <bcp14>MUST NOT</bcp14> override the actor identity derived from the <tt>actor_token</tt>.</t>
        <t><strong>No <tt>actor_token</tt> present</strong>: the requesting client <bcp14>MUST</bcp14> be a confidential client that has authenticated in the request; public clients <bcp14>MUST NOT</bcp14> use this path.  Actor identity is derived from the authenticated client credential.  The AS applies Identifier Reconciliation to determine whether (<tt>subject_token.iss</tt>, <tt>may_act.sub</tt>) refers to the same entity as the authenticated client, and sets <tt>act.sub</tt> to the canonical identifier of the authenticated client.  The AS <bcp14>MUST</bcp14> set <tt>act.iss</tt> to the issuer or namespace context that locally registered the authenticated client (typically the AS's own issuer URI when the client is registered directly with the AS).  This path enables the pre-authorization use case of <xref target="RFC8693"/>, where the <tt>subject_token</tt> pre-authorizes a specific client and that client presents it directly without a separate <tt>actor_token</tt>.</t>
        <t>When <tt>may_act</tt> is absent or the conditions above are not met, the AS <bcp14>MUST</bcp14> satisfy the delegation-authorization check through another recognized basis (pre-registered grant, consent record, or applicable policy rule).  The AS <bcp14>MUST NOT</bcp14> treat the mere presence of <tt>may_act</tt> as authorization for any actor other than the one whose canonical identity matches it.</t>
      </section>
      <section anchor="output-token-rules">
        <name>Output Token Rules</name>
        <section anchor="jwt-assertion-grant-issuance">
          <name>JWT Assertion Grant Output</name>
          <t>When <tt>requested_token_type</tt> in a Token Exchange request (<xref target="RFC8693"/>) designates a JWT assertion grant as the output, whether by using <tt>urn:ietf:params:oauth:token-type:jwt</tt> or a more specific JWT assertion-grant token type defined by another specification (for example, an ID-JAG token type), the issued JWT <bcp14>MUST</bcp14> satisfy the structural requirements of <xref target="jwt-assertion-grants-structure">JWT Assertion Grant Structure</xref>.  A JWT assertion-grant token type URI is compatible with this section when it is defined as a profile of <tt>urn:ietf:params:oauth:token-type:jwt</tt>; for example, <tt>urn:ietf:params:oauth:token-type:id-jag</tt> as defined by <xref target="I-D.ietf-oauth-identity-assertion-authz-grant"/> is one such compatible type.  This section defines the actor-profile requirements for the resulting JWT assertion grant regardless of which compatible JWT assertion-grant output token type was requested.  The delegation chain <bcp14>MUST</bcp14> be constructed per <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.  The <tt>aud</tt> <bcp14>MUST</bcp14> be set to the downstream token endpoint (from the <tt>resource</tt> parameter or deployment configuration), and the assertion <bcp14>MUST</bcp14> be signed by the issuing AS.  The AS <bcp14>MUST NOT</bcp14> issue a JWT assertion grant as Token Exchange output unless it is configured to do so and can establish the delegation relationship under local policy.</t>
        </section>
        <section anchor="jwt-access-token-propagation">
          <name>JWT Access Token Output</name>
          <t>The issued JWT access token <bcp14>MUST</bcp14> satisfy the structural requirements in <xref target="jwt-access-tokens-structure">JWT Access Token Structure</xref>.  This section is the common output step for Token Exchange paths in this section that produce a JWT access token.  It is reached after completing the applicable class-level and type-specific <tt>subject_token</tt> processing defined above, the applicable <tt>actor_token</tt> processing, or Transaction Token Service processing.</t>
          <t>After completing the applicable <tt>subject_token</tt> processing in this section, whether for an identity-only input (<xref target="id-token-as-subject-token">ID Token Processing</xref>, <xref target="refresh-token-as-subject-token">Refresh Token Processing</xref>) or a token-state input (<xref target="jwt-assertion-grant-as-subject-token">JWT Assertion Grant as subject_token</xref>, <xref target="jwt-access-token-as-subject-token">JWT Access Token as subject_token</xref>, <xref target="txn-token-as-subject-token">Transaction Token as subject_token</xref>), or after Transaction Token Service processing (<xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>), the AS <bcp14>MUST</bcp14> apply the following rules when issuing a JWT access token.  These rules govern the delegation chain, subject, and scope in the issued token regardless of inbound credential type.</t>
          <t>When both a <tt>subject_token</tt> carrying an inbound <tt>act</tt> chain and an <tt>actor_token</tt> are present, the validated <tt>actor_token</tt> determines the new outermost actor identity in the issued token.  Any preserved inbound <tt>act</tt> chain from the <tt>subject_token</tt> is nested beneath that new outermost <tt>act</tt>; the validation and conflict rules are defined in the applicable <tt>actor_token</tt> section.</t>
          <t>When the issued token is sender-constrained, the issuer <bcp14>MUST</bcp14> bind the output token's top-level <tt>cnf</tt> according to <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>:</t>
          <ul spacing="normal">
            <li>
              <t>In presenter-continuation mode, the output token remains bound to the continued presenter of the validated PoP-capable <tt>subject_token</tt>.</t>
            </li>
            <li>
              <t>In presenter-rebind mode, the output token is bound to the new presenter established by the validated <tt>actor_token</tt>.</t>
            </li>
            <li>
              <t>Bearer-to-PoP upgrade is therefore performed by issuing a sender-constrained output token in presenter-rebind mode even when the inbound <tt>subject_token</tt> carried no top-level <tt>cnf</tt>.</t>
            </li>
          </ul>
          <t>If a Token Exchange request explicitly seeks a delegated output, for example by supplying an <tt>actor_token</tt> or by presenting a <tt>subject_token</tt> that already carries <tt>act</tt>, and the AS cannot validate the actor information, it <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.  If the AS can validate the actor information but cannot establish or confirm the required delegation basis, or if local policy prohibits the relationship, it <bcp14>MUST</bcp14> reject the request with <tt>actor_unauthorized</tt>.  The AS <bcp14>MUST NOT</bcp14> issue a non-delegated JWT access token in place of the requested delegated output.</t>
          <ol spacing="normal" type="1"><li>
              <t>When the issued access token represents delegation per <xref target="delegation-chains">Delegation Chains</xref>, the AS <bcp14>MUST</bcp14> include an <tt>act</tt> claim.  The AS <bcp14>MUST NOT</bcp14> silently drop actor information.  If the inbound credential carries no <tt>act</tt>, no validated <tt>actor_token</tt> is present, and no independent delegation basis exists, the AS <bcp14>MUST</bcp14> omit <tt>act</tt>.</t>
            </li>
            <li>
              <t>The AS <bcp14>MUST</bcp14> preserve <tt>sub</tt> to refer to the same underlying subject as the inbound token.  If the AS uses a different subject-identifier namespace, it <bcp14>MAY</bcp14> change the <tt>sub</tt> value only to re-express that same subject in the new namespace under a trusted local mapping.  The AS <bcp14>MUST NOT</bcp14> replace <tt>sub</tt> with an identifier for a different subject.  Subject-namespace translation requirements and relying-party consequences are described in <xref target="subject-namespace-translation">Subject Namespace Translation</xref>.</t>
            </li>
            <li>
              <t>The AS <bcp14>MUST</bcp14> construct the <tt>act</tt> claim using the construction decision order in <xref target="delegation-chain-algorithm">Delegation Chain Validation and Construction</xref>.  In summary:  </t>
              <ul spacing="normal">
                <li>
                  <t>first, when a new actor is identified, create a new outermost <tt>act</tt> object and nest any inbound chain beneath it (<xref target="extend-chain-with-new-actor">Extend Chain with New Actor</xref>);</t>
                </li>
                <li>
                  <t>otherwise, when an inbound chain is present, copy that chain unchanged (<xref target="preserve-inbound-chain">Preserve Inbound Chain</xref>);</t>
                </li>
                <li>
                  <t>otherwise, omit <tt>act</tt> from the issued token (<xref target="omit-act">Omit <tt>act</tt></xref>).</t>
                </li>
              </ul>
              <t>
The <tt>act.iss</tt> obligation applies only to an <tt>act</tt> object the AS creates for the current actor.  Inherited <tt>act</tt> objects <bcp14>MUST NOT</bcp14> be rewritten.  </t>
              <t>
When the actor identity was derived from an <tt>actor_token</tt> parameter rather than from an <tt>act</tt> claim in the <tt>subject_token</tt>, the outermost <tt>act</tt> in the issued token is AS-asserted based on the validated <tt>actor_token</tt>; it is not chain-propagated from the <tt>subject_token</tt>.  Consumers <bcp14>MUST NOT</bcp14> infer that the <tt>actor_token</tt>-derived <tt>act</tt> was present in or endorsed by the <tt>subject_token</tt> issuer.</t>
            </li>
            <li>
              <t>If actor information that would be preserved or added to the issued token cannot be validated, or nesting would exceed the chain-depth limit in <xref target="delegation-chains">Delegation Chains</xref>, the AS <bcp14>MUST</bcp14> reject the request.  The AS <bcp14>MUST</bcp14> return <tt>invalid_request</tt> when the chain-depth limit would be exceeded and <tt>invalid_grant</tt> when actor information fails validation; these error codes apply equally to Token Exchange requests producing JWT access tokens.  Note: a missing required structural claim (<tt>act.sub</tt> or <tt>act.iss</tt>) in the inbound token is a structural violation that produces <tt>invalid_request</tt>, not a validation failure that produces <tt>invalid_grant</tt>.  The AS <bcp14>MUST NOT</bcp14> issue a token that partially preserves the delegation chain.</t>
            </li>
            <li>
              <t>The AS <bcp14>SHOULD</bcp14> include <tt>sub_profile</tt> in the issued token's top-level claims if it can authoritatively classify the token's <tt>sub</tt> entity type.</t>
            </li>
            <li>
              <t>The AS <bcp14>MUST</bcp14> apply scope reduction per <xref section="4" sectionFormat="comma" target="RFC8693"/>.  If the reduction required by <xref target="RFC8693"/> yields an empty scope, the AS <bcp14>MUST</bcp14> reject the request with <tt>invalid_scope</tt>.  </t>
              <t>
When the AS additionally applies actor-based scope restriction based on the (<tt>sub</tt>, <tt>act.sub</tt>) pair or the actor's <tt>sub_profile</tt>:  </t>
              <ul spacing="normal">
                <li>
                  <t>The AS <bcp14>MUST</bcp14> include the effective <tt>scope</tt> value in the token response so that clients can detect any reduction from the requested scope.</t>
                </li>
                <li>
                  <t>If actor-based restriction yields an empty scope because the actor is categorically unauthorized for any of the remaining scope (for example, the actor's <tt>sub_profile</tt> is not permitted for any of the requested scope values), the AS <bcp14>MUST</bcp14> reject with <tt>actor_unauthorized</tt>.</t>
                </li>
                <li>
                  <t>If actor-based restriction yields an empty scope for a reason unrelated to the actor's categorical authorization (for example, because the actor's scope ceiling simply does not include the requested values), the AS <bcp14>MUST</bcp14> reject with <tt>invalid_scope</tt>.</t>
                </li>
                <li>
                  <t>The <tt>scope</tt> value in the token response <bcp14>MUST</bcp14> reflect the effective granted scope after all reductions, including any actor-based reduction.  This is consistent with the existing requirement in <xref section="4" sectionFormat="comma" target="RFC8693"/> that <tt>scope</tt> in the response indicate the actual authorized scope.  Silent divergence between the requested scope and the issued token's scope is not permitted.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>If the inbound credential carries <tt>client_id</tt>, <tt>azp</tt>, or both, the AS <bcp14>MAY</bcp14> preserve those values per the output token profile or local policy.  If preserved:  </t>
              <ul spacing="normal">
                <li>
                  <t>They <bcp14>MUST</bcp14> continue to identify the OAuth client and <bcp14>MUST NOT</bcp14> be rewritten to represent delegation state that belongs in <tt>act</tt>.</t>
                </li>
                <li>
                  <t>If preserving them would create ambiguity about the delegated actor relationship, the AS <bcp14>SHOULD</bcp14> omit them.</t>
                </li>
              </ul>
              <t>
See <xref target="client-identity-delegation">Client Identity and Delegation</xref> for the normative rules governing client identity and actor identity.</t>
            </li>
            <li>
              <t>Clients <bcp14>SHOULD</bcp14> use the <tt>resource</tt> parameter (<xref target="RFC8707"/>) when requesting delegated tokens to restrict the issued token's <tt>aud</tt> claim to the intended resource server.  The AS <bcp14>MUST</bcp14> honor resource-indicator constraints in delegated token requests per <xref section="4.2" sectionFormat="comma" target="RFC8693"/>.  Audience-scoped delegation limits the blast radius of a compromised token by preventing its presentation to resource servers other than the one it was issued for.  This profile does not define a new mechanism for audience restriction; it applies the existing <tt>resource</tt> parameter and <tt>aud</tt> claim semantics to the delegated-token context.</t>
            </li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="transaction-token-service">
      <name>Transaction Token Service Processing</name>
      <t>This section defines the actor-profile claim structure for Transaction Tokens and the rules a Transaction Token Service (TTS) applies when it validates supported <tt>subject_token</tt> inputs, authenticates the new presenter, and issues a delegated Transaction Token.</t>
      <t>TTS error handling for requests processed in this section is defined in <xref target="actor-profile-error-responses">Error Responses</xref>.</t>
      <section anchor="transaction-tokens">
        <name>Transaction Tokens</name>
        <t>Transaction Tokens <xref target="I-D.ietf-oauth-transaction-tokens"/> are short-lived JWTs that capture the workload identity and request context for a series of related service calls within a single business transaction. They are issued by a Transaction Token Service (TTS), which is a specialized authorization server.</t>
        <t>Transaction Token claims are defined in <xref target="I-D.ietf-oauth-transaction-tokens"/>.  This profile modifies or adds the following claims:</t>
        <dl>
          <dt><tt>iss</tt> (<bcp14>OPTIONAL</bcp14> in <xref target="I-D.ietf-oauth-transaction-tokens"/>; <bcp14>REQUIRED</bcp14> by this profile when carrying <tt>act</tt>):</dt>
          <dd>
            <t>Issuer of the Transaction Token.  <bcp14>MUST</bcp14> be present when the Transaction Token carries an <tt>act</tt> claim, because recipients need to identify the token issuer before deciding whether to trust the actor identifier pairs carried in the chain.  <bcp14>SHOULD</bcp14> be present when the Transaction Token crosses trust-domain boundaries, even in non-delegated cases, as recipients can require it to validate issuer identity or chain-of-trust per local policy.  <bcp14>MAY</bcp14> be omitted only when no delegation (<tt>act</tt>) is present, all tokens are scoped to a single Trust Domain, and all recipients have out-of-band knowledge of the issuer.  When <tt>iss</tt> is omitted, recipients <bcp14>MUST</bcp14> rely on the trust-domain and issuer-identification rules of <xref target="I-D.ietf-oauth-transaction-tokens"/> and local deployment configuration rather than the generic outer-token <tt>iss</tt> processing rules in this document.</t>
          </dd>
          <dt><tt>req_wl</tt>:</dt>
          <dd>
            <t>This claim provides TTS-level workload context and is not a substitute for <tt>act.sub</tt>; see <xref target="actor-claim-in-transaction-tokens">Actor Claim in Transaction Tokens</xref>.</t>
          </dd>
          <dt><tt>act</tt> (<bcp14>REQUIRED</bcp14> when delegated; <bcp14>OPTIONAL</bcp14> otherwise):</dt>
          <dd>
            <t>Represents the current acting party and any prior delegation steps, conforming to <xref target="actor-object-structure">Actor Object Structure</xref>.  See <xref target="actor-claim-in-transaction-tokens">Actor Claim in Transaction Tokens</xref> for delegation semantics and the relationship between <tt>act.sub</tt> and <tt>req_wl</tt>.</t>
          </dd>
        </dl>
        <section anchor="actor-claim-in-transaction-tokens">
          <name>Actor Claim in Transaction Tokens</name>
          <t>A Transaction Token is delegated for purposes of this document when it carries an explicit actor credential (either an <tt>actor_token</tt> in the exchange request or an inbound token that already contains an <tt>act</tt> chain) establishing that the requesting workload is acting on behalf of the identified <tt>sub</tt> rather than in its own right.  In a delegated Transaction Token, the <tt>act</tt> claim conforming to this profile <bcp14>MUST</bcp14> be included to represent the current acting party and any prior delegation steps, as specified in <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>.  Because a delegated Transaction Token carries <tt>act</tt>, it <bcp14>MUST</bcp14> also carry a top-level <tt>iss</tt> claim per <xref target="transaction-tokens">Transaction Tokens</xref>.  In non-delegated Transaction Tokens (those issued for a workload acting under its own independent grant, where no explicit actor credential was presented), <tt>act</tt> is <bcp14>OPTIONAL</bcp14>.  The TTS <bcp14>MUST NOT</bcp14> infer delegation solely from the fact that <tt>sub</tt> and <tt>req_wl</tt> identify different entities; the presence of an explicit actor credential is required.</t>
          <t><tt>req_wl</tt> identifies the workload that requested the token from the TTS.  <tt>act.sub</tt> identifies the immediate acting party in the subject identifier namespace used by this profile.  The authoritative actor identifier for authorization decisions under this document is the outermost <tt>act.sub</tt>; <tt>req_wl</tt> is supporting workload context.</t>
          <t>Claim semantics under this profile:</t>
          <ul spacing="normal">
            <li>
              <t><tt>sub</tt>: identifies the original initiator.  When a Transaction Token is exchanged for a replacement, the new token <bcp14>MUST</bcp14> continue to refer to the same underlying subject.  The issuer <bcp14>MAY</bcp14> change <tt>sub</tt> only to re-express that same subject in a different identifier namespace.</t>
            </li>
            <li>
              <t><tt>act.sub</tt> (outermost): identifies the immediate acting party.  When a TTS sets both <tt>req_wl</tt> and the new outermost <tt>act.sub</tt> in a single token issuance (presenter-rebind mode), it <bcp14>MUST</bcp14> ensure they identify the same entity under local policy.  When a TTS preserves <tt>req_wl</tt> from an inbound token, the TTS <bcp14>SHOULD</bcp14> perform identifier reconciliation between <tt>req_wl</tt> and the outermost <tt>act.sub</tt>.  When a recipient relies on both and cannot reconcile them under local policy, the recipient <bcp14>MUST</bcp14> reject the token.</t>
            </li>
            <li>
              <t>Inner <tt>act</tt> objects: identify prior presenters in the delegation path.  <tt>act.sub_profile</tt> at each level classifies the entity type of that presenter.</t>
            </li>
          </ul>
          <t>The following example shows a Transaction Token after two hops:</t>
          <sourcecode type="json"><![CDATA[
{
  "iss": "https://tts.enterprise.example",
  "sub": "https://idp.enterprise.example/users/alice",
  "sub_profile": "user",
  "scope": "inventory:check",
  "req_wl": "https://tools.example.com/booking-tool",
  "aud": "https://api.travel-provider.example",
  "txn": "550e8400-e29b-41d4-a716-446655440000",
  "exp": 1711816900,
  "iat": 1711816800,
  "tctx": {
    "action": "check-availability"
  },
  "rctx": {
    "req_ip": "203.0.113.42"
  },
  "cnf": {
    "jkt": "0ZcOCORZNYy9ZhHiZN..."
  },
  "act": {
    "sub": "https://tools.example.com/booking-tool",
    "iss": "https://as.travel-provider.example",
    "sub_profile": "service",
    "act": {
      "sub": "https://agents.example.com/travel-assistant",
      "iss": "https://as.enterprise.example",
      "sub_profile": "ai_agent"
    }
  }
}
]]></sourcecode>
          <t>In this example the booking tool is the current presenter.  It is identified by <tt>req_wl</tt> as the workload that requested the token and by the outermost <tt>act.sub</tt> in the actor profile's subject namespace, and it has its own top-level <tt>cnf.jkt</tt>.  The travel assistant appears as a nested <tt>act</tt> object, showing that it was the prior delegated actor between Alice and the booking tool.</t>
        </section>
      </section>
      <section anchor="presenter-authentication-and-transition">
        <name>Presenter Authentication and Transition</name>
        <t>The TTS applies the same two presenter-transition modes defined in <xref target="token-exchange-presenter-model">Presenter Transition Model</xref>, but only for token-state <tt>subject_token</tt> inputs:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Presenter continuation</strong>: the authenticated requester is the same current presenter as the inbound token.  This mode is available only when the inbound token carries a top-level presenter binding and the TTS validates proof for that binding under <xref target="I-D.ietf-oauth-transaction-tokens"/> and the applicable deployment profile.  When the inbound token carries <tt>act</tt>, the authenticated requester <bcp14>MUST</bcp14> correspond to the outermost (<tt>act.iss</tt>, <tt>act.sub</tt>) pair.  In this mode the TTS preserves the inbound <tt>act</tt> chain unchanged and <bcp14>MUST NOT</bcp14> add a new outermost <tt>act</tt>.</t>
          </li>
          <li>
            <t><strong>Presenter rebind</strong>: a validated <tt>actor_token</tt> direct presenter credential establishes a different current presenter for the issued Transaction Token.  In this mode the TTS creates a new outermost <tt>act</tt> for that presenter and nests any inbound <tt>act</tt> chain beneath it.</t>
          </li>
        </ul>
        <t>A bearer token-state <tt>subject_token</tt> that carries no presenter binding is not eligible for presenter continuation, but it <bcp14>MAY</bcp14> still be upgraded to a sender-constrained Transaction Token in presenter-rebind mode when a validated <tt>actor_token</tt> establishes the new presenter.  This document does not define TTS processing for identity-only <tt>subject_token</tt> inputs such as ID tokens or refresh tokens.</t>
      </section>
      <section anchor="supported-subject-tokens">
        <name>Supported Subject Tokens</name>
        <t>The TTS accepts only token-state <tt>subject_token</tt> inputs.  Identity-only inputs such as ID tokens and refresh tokens do not carry the inbound delegation-chain or presenter state needed for <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref> and are therefore outside the scope of the TTS profile defined here.</t>
        <section anchor="jwt-assertion-grant">
          <name>JWT Assertion Grant</name>
          <t>When the TTS receives a JWT assertion grant as <tt>subject_token</tt>, it <bcp14>MUST</bcp14> apply the validation, presenter-continuity, and scope-reduction rules in <xref target="jwt-assertion-grant-as-subject-token">JWT Assertion Grant as subject_token</xref>.  Instead of applying <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>, the TTS uses the resulting subject identity, optional <tt>sub_profile</tt>, inbound <tt>act</tt> chain, proof-of-possession state, and effective scope ceiling as the inbound delegation state for <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>.</t>
        </section>
        <section anchor="jwt-access-token">
          <name>JWT Access Token</name>
          <t>When the TTS receives a JWT access token as <tt>subject_token</tt>, it <bcp14>MUST</bcp14> apply the validation and extraction rules in <xref target="jwt-access-token-as-subject-token">JWT Access Token as subject_token</xref>.  Instead of applying <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>, the TTS uses the resulting inbound delegation state as input to <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>.</t>
        </section>
        <section anchor="transaction-token">
          <name>Transaction Token</name>
          <t>When the TTS receives a Transaction Token as <tt>subject_token</tt>, it <bcp14>MUST</bcp14> apply the validation and extraction rules in <xref target="txn-token-as-subject-token">Transaction Token as subject_token</xref>.  Instead of applying <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>, the TTS uses the extracted <tt>sub</tt>, optional <tt>sub_profile</tt>, inbound <tt>act</tt> chain, <tt>req_wl</tt>, and presenter-binding state as input to <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>.</t>
        </section>
      </section>
      <section anchor="transaction-token-output-rules">
        <name>Transaction Token Output Rules</name>
        <t>TTS processing follows the generic delegation chain algorithm defined in <xref target="delegation-chain-algorithm">Delegation Chain Validation and Construction</xref> and the output rules in <xref target="jwt-access-token-propagation">JWT Access Token Output</xref>.  The steps below apply those rules to the Transaction Token context and define the TTS-specific adaptations: <tt>req_wl</tt> handling, the TTS presenter-authentication model, Transaction Token claim set requirements, and the treatment of <tt>iss</tt> in Transaction Tokens.  Where a step below is parallel to JWT access token processing, the TTS-specific detail is noted explicitly.</t>
        <t>When a TTS receives a token-exchange request to issue or refresh a Transaction Token from an inbound JWT assertion grant, JWT access token, or Transaction Token that carries actor-profile claims, it <bcp14>MUST</bcp14> apply the following rules:</t>
        <ol spacing="normal" type="1"><li>
            <t>The TTS <bcp14>MUST</bcp14> preserve <tt>sub</tt> from the inbound token to refer to the same underlying subject.  </t>
            <ul spacing="normal">
              <li>
                <t>The TTS <bcp14>MAY</bcp14> re-express <tt>sub</tt> in a different identifier namespace only when a trusted local mapping establishes that both identifiers refer to the same underlying subject (for example, when crossing trust-domain boundaries in a federation scenario).</t>
              </li>
              <li>
                <t>The TTS <bcp14>MUST NOT</bcp14> replace <tt>sub</tt> with an identifier for a different subject.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Note: Subject-namespace translation requirements and relying-party consequences are described in <xref target="subject-namespace-translation">Subject Namespace Translation</xref>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The <tt>req_wl</tt> field and any Transaction Token fields other than actor-profile claims remain governed by <xref target="I-D.ietf-oauth-transaction-tokens"/> and local policy.  Under this profile, <tt>req_wl</tt> is supporting workload context and <bcp14>MUST NOT</bcp14> be treated as a substitute for the outermost <tt>act.sub</tt>.</t>
          </li>
          <li>
            <t>The TTS <bcp14>MUST</bcp14> compute the depth of the resulting <tt>act</tt> chain after applying step 6.  If that resulting chain would exceed the limit in <xref target="delegation-chains">Delegation Chains</xref>, the TTS <bcp14>MUST</bcp14> reject the request with <tt>invalid_request</tt>.</t>
          </li>
          <li>
            <t>The TTS <bcp14>MUST</bcp14> validate the inbound token and establish issuer trust before preserving or extending any <tt>act</tt> chain.  For the outermost <tt>act</tt> object in the inbound chain, the TTS <bcp14>MUST</bcp14>:  </t>
            <ul spacing="normal">
              <li>
                <t>Verify that the inbound token issuer is trusted under local policy to assert the (<tt>act.iss</tt>, <tt>act.sub</tt>) actor identifier pair, using local trust mechanisms equivalent to <xref target="validate-outermost-actor">Validate Outermost Actor</xref>.</t>
              </li>
              <li>
                <t>Evaluate the delegation relationship per <xref target="validate-outermost-actor">Validate Outermost Actor</xref>, applying the same creation-vs-preservation distinction: <bcp14>MUST</bcp14> evaluate when installing a new outermost actor in presenter-rebind mode; <bcp14>SHOULD</bcp14> evaluate under local policy when preserving an existing chain from a trusted upstream issuer in presenter-continuation mode.</t>
              </li>
            </ul>
            <t>
For inner <tt>act</tt> objects in the inbound chain:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Security-relevant use</strong>: If local policy uses an inner entry as an input to access control or scope decisions, the TTS <bcp14>SHOULD</bcp14> apply the same validation as for the outermost entry.  If the TTS cannot validate it to the required assurance level, it <bcp14>SHOULD</bcp14> reject with <tt>invalid_grant</tt>.</t>
              </li>
              <li>
                <t><strong>Prior-actor context only</strong>: If an inner entry is preserved solely for audit purposes without driving any security decision, apply <xref target="carry-prior-actor-context">Carry Prior-Actor Context</xref>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The TTS <bcp14>MUST</bcp14> determine whether the request is presenter continuation or presenter rebind:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Presenter continuation</strong>: The TTS <bcp14>MUST</bcp14> authenticate the requester as the same current presenter as the inbound token.  When the inbound token carries <tt>act</tt>, the authenticated requester <bcp14>MUST</bcp14> correspond to the outermost (<tt>act.iss</tt>, <tt>act.sub</tt>) pair or the TTS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.  If the required actor relationship is prohibited by local policy, absent, or cannot be confirmed from the current inputs and policy, the TTS <bcp14>MUST</bcp14> reject the request with <tt>actor_unauthorized</tt>.</t>
              </li>
              <li>
                <t><strong>Presenter rebind</strong>: The TTS <bcp14>MUST</bcp14> validate a direct presenter <tt>actor_token</tt> for the new presenter.  Before creating a new outermost <tt>act</tt> object, the TTS <bcp14>MUST</bcp14> evaluate whether the newly authenticated presenter is authorized under local policy to act on behalf of <tt>sub</tt> for the requested transaction.  If the required actor relationship is prohibited by local policy, absent, or cannot be confirmed from the current inputs and policy, the TTS <bcp14>MUST</bcp14> reject the request with <tt>actor_unauthorized</tt>.</t>
              </li>
            </ul>
            <t>
If the current inputs satisfy neither presenter-continuation nor presenter-rebind requirements, the TTS <bcp14>MUST</bcp14> reject the request with <tt>invalid_grant</tt>.</t>
          </li>
          <li>
            <t>When the issued Transaction Token carries delegated actor information, the TTS <bcp14>MUST</bcp14> include a top-level <tt>iss</tt> claim identifying itself as the Transaction Token issuer, and it <bcp14>MUST</bcp14> construct the <tt>act</tt> claim using <xref target="delegation-chain-algorithm">Delegation Chain Validation and Construction</xref>.  In summary:  </t>
            <ul spacing="normal">
              <li>
                <t>in presenter-continuation mode, preserve the inbound chain unchanged (<xref target="preserve-inbound-chain">Preserve Inbound Chain</xref>);</t>
              </li>
              <li>
                <t>in presenter-rebind mode, create a new outermost <tt>act</tt> object for the new presenter and nest any inbound chain beneath it (<xref target="extend-chain-with-new-actor">Extend Chain with New Actor</xref>).</t>
              </li>
            </ul>
            <t>
For a new outermost actor, the TTS <bcp14>MUST</bcp14> set <tt>act.sub</tt> to the new presenter's identifier, <bcp14>MUST</bcp14> set <tt>act.iss</tt> to the issuer or namespace context for that identifier, and <bcp14>SHOULD</bcp14> set <tt>act.sub_profile</tt> when known.  Inherited <tt>act</tt> objects <bcp14>MUST NOT</bcp14> be rewritten.</t>
          </li>
          <li>
            <t>When the issued Transaction Token includes a top-level presenter-binding claim such as <tt>cnf</tt>, that binding applies to the current presenter.  The underlying presenter-authentication and proof mechanism is defined by <xref target="I-D.ietf-oauth-transaction-tokens"/> and any applicable deployment profile, not by this document.</t>
          </li>
          <li>
            <t>Transaction Token fields other than actor-profile claims, including <tt>scope</tt>, <tt>tctx</tt>, and <tt>rctx</tt>, are defined by <xref target="I-D.ietf-oauth-transaction-tokens"/> and local policy.  This document does not standardize their issuance semantics.</t>
          </li>
        </ol>
        <t>These same preservation rules apply regardless of whether the inbound credential is a JWT assertion grant, a JWT access token, or a Transaction Token, provided that the TTS supports issuing a Transaction Token from that input.  This document does not define direct Transaction Token issuance from ID tokens or refresh tokens.</t>
        <t>This document does not define TTS-specific processing for <tt>may_act</tt>.  A deployment <bcp14>MAY</bcp14> use <tt>may_act</tt> under local policy or another specification as a transaction-authorization hint, but that behavior is outside the scope of this document and <bcp14>MUST NOT</bcp14> replace validation of the inbound credential, presenter authentication, or the rules in this document governing whether a new outermost <tt>act</tt> is created.</t>
      </section>
    </section>
    <section anchor="resource-server-processing">
      <name>Resource Server Processing</name>
      <t>This section brings together the normative rules for delegated-token consumers at the resource server and the actor authorization model they apply, whether the RS evaluates a JWT directly or relies on introspection.</t>
      <section anchor="actor-authorization">
        <name>Actor Authorization</name>
        <t>When a token contains both <tt>sub</tt> and an <tt>act</tt> claim, a resource server has two independent principals available for authorization policy:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Subject principal</strong> (<tt>sub</tt>): the party whose authorization is being exercised.  This principal typically has a relationship with the resource (e.g., an account, a role, a permission).</t>
          </li>
          <li>
            <t><strong>Actor principal</strong> (<tt>act.sub</tt>): the party that is making the immediate request.  This principal may be in a different organizational domain and trust level from the subject.</t>
          </li>
        </ul>
        <t>For Transaction Tokens, the primary policy pair remains (<tt>sub</tt>, <tt>act.sub</tt>).  The <tt>req_wl</tt> claim provides workload context from the TTS and is not a replacement for <tt>act.sub</tt>.  Nested <tt>act</tt> objects provide prior-actor context for audit or other deployment-specific processing; this document does not standardize their authorization use.</t>
        <t>Actor authorization is conditional under this profile.  When an RS accepts a token as satisfying a delegated-access requirement, it <bcp14>MUST NOT</bcp14> ignore the <tt>act</tt> claim and authorize the request solely as if the token were non-delegated.  The RS <bcp14>SHOULD</bcp14> evaluate the (<tt>sub</tt>, outermost <tt>act.sub</tt>) pair according to local policy.  Resource servers that receive delegated tokens <bcp14>SHOULD</bcp14> define and document their actor authorization policy.  The following steps describe one approach for resource servers that choose to enforce actor authorization policy:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Advertise delegated-token requirements</strong>: An RS that wants to signal that delegated requests are expected to carry actor-profile information <bcp14>SHOULD</bcp14> set <tt>actor_profile_required: true</tt> (<xref target="protected-resource-metadata">Protected Resource Metadata</xref>).  An RS <bcp14>MAY</bcp14> still apply actor authorization without advertising it, but clients <bcp14>MUST NOT</bcp14> rely on that behavior.</t>
          </li>
          <li>
            <t><strong>Evaluate subject authorization</strong>: Determine whether <tt>sub</tt> has been granted the requested scope or permission, using the same mechanisms applied to non-delegated tokens.</t>
          </li>
          <li>
            <t><strong>Evaluate actor authorization</strong>: Determine whether the (<tt>sub</tt>, outermost <tt>act.sub</tt>) pair is permitted for the requested operation.  This evaluation <bcp14>MAY</bcp14> be performed against:  </t>
            <ul spacing="normal">
              <li>
                <t>a registered delegation policy for the (subject, actor) pair,</t>
              </li>
              <li>
                <t>the actor's <tt>sub_profile</tt> (e.g., only AI agents from a trusted domain are permitted to act as delegatees),</t>
              </li>
              <li>
                <t>the token's <tt>scope</tt> claim.</t>
              </li>
            </ul>
            <t>
For Transaction Tokens, the RS <bcp14>SHOULD</bcp14> evaluate <tt>req_wl</tt> as supporting context.  If the RS relies on both <tt>req_wl</tt> and <tt>act.sub</tt> to identify the current presenter and cannot reconcile them under local policy, it <bcp14>MUST</bcp14> reject the request.</t>
          </li>
          <li>
            <t><strong>Evaluate combined policy</strong>: Apply resource-specific actor authorization policies (e.g., requiring both principals to have agreed to terms of service).</t>
          </li>
          <li>
            <t>If the RS requires actor authorization but cannot complete it, it <bcp14>MUST</bcp14> reject the request.</t>
          </li>
        </ol>
        <t>When a deployment applies multi-principal authorization under local policy, the outermost <tt>act.sub</tt> remains the baseline interoperable actor identifier, while nested <tt>act</tt> objects are additional local-policy inputs only.  Failure semantics, ordering, and weighting for those nested actors are deployment-specific.  Clients <bcp14>MUST NOT</bcp14> assume that nested actors will be used for authorization unless deployment-specific agreements say otherwise.</t>
      </section>
      <section anchor="jwt-access-token-rs-processing">
        <name>JWT Access Token Processing</name>
        <t>Upon receiving a JWT access token on a request path where delegated-token processing may apply, a resource server <bcp14>MUST</bcp14> validate and process that token according to its local delegated-token policy.  For RS processing purposes, a JWT access token is evaluated as delegated when it carries an <tt>act</tt> claim conforming to this profile; the RS <bcp14>MUST NOT</bcp14> infer delegation from <tt>azp</tt>, <tt>client_id</tt>, or other client-identity claims alone.  The authorization-policy model for delegated tokens is defined in <xref target="resource-server-processing">Resource Server Processing</xref>.  Protected resource metadata can advertise delegated-token expectations to clients, but the RS's enforcement decision remains local to the resource server.</t>
        <t>When the resource server evaluates a JWT access token as a delegated token under local policy, it <bcp14>MUST</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Validate the token's signature, <tt>iss</tt>, <tt>aud</tt>, and temporal claims per <xref target="RFC9068"/>.  If local policy for the request path requires actor-profile conformance for delegated requests (including when the resource advertises <tt>actor_profile_required: true</tt> per <xref target="protected-resource-metadata">Protected Resource Metadata</xref>), any token the RS evaluates as delegated <bcp14>MUST</bcp14> carry <tt>act</tt>, and each <tt>act</tt> object the RS relies on <bcp14>MUST</bcp14> include <tt>act.iss</tt>; if either is missing, the RS <bcp14>MUST</bcp14> reject the request with HTTP 401 <tt>invalid_token</tt>.  The <tt>actor_profile_required: true</tt> signal does not require non-delegated tokens for the same resource to carry <tt>act</tt>.</t>
          </li>
          <li>
            <t>If the token carries a top-level <tt>cnf.jkt</tt>, validate the accompanying DPoP proof per <xref section="7" sectionFormat="comma" target="RFC9449"/>.  If a DPoP proof is present but the token does not carry <tt>cnf.jkt</tt>, the RS <bcp14>MUST</bcp14> treat the token as a bearer token; the RS <bcp14>MUST NOT</bcp14> infer a confirmation binding from the DPoP proof key.</t>
          </li>
          <li>
            <t>Extract the <tt>sub</tt> and the outermost <tt>act.sub</tt> as the two principals relevant for authorization policy.</t>
          </li>
          <li>
            <t>If the token carries <tt>client_id</tt>, <tt>azp</tt>, or both, treat those as client-identity inputs only.  The RS <bcp14>SHOULD</bcp14> use <tt>act.sub</tt> rather than <tt>client_id</tt> or <tt>azp</tt> as the actor identifier when <tt>act</tt> is present.  When local policy expects both to identify the same acting party, the RS <bcp14>SHOULD</bcp14> perform identifier reconciliation; if reconciliation cannot be established, the RS <bcp14>MUST</bcp14> either treat them as distinct identifiers or reject the request according to local policy.  See <xref target="client-identity-delegation">Client Identity and Delegation</xref>.</t>
          </li>
          <li>
            <t>Apply actor authorization per <xref target="actor-authorization">Actor Authorization</xref> when required by local policy or when the token is accepted as satisfying a delegated-access requirement for the request path.  Resource servers that do not require actor authorization <bcp14>SHOULD</bcp14> still evaluate the actor as part of authorization, audit, or trust decisions.</t>
          </li>
          <li>
            <t>The RS <bcp14>MAY</bcp14> traverse inner <tt>act</tt> objects for audit, policy refinement, or trust decisions; such use is deployment-specific.  Inner <tt>act</tt> objects are prior-actor context as described in <xref target="carry-prior-actor-context">Carry Prior-Actor Context</xref>, and interoperable authorization behavior is defined around <tt>sub</tt> and the outermost <tt>act.sub</tt>.</t>
          </li>
          <li>
            <t>If any of the above steps fail, return an appropriate error response.  The HTTP authentication scheme used in the <tt>WWW-Authenticate</tt> challenge follows the token's binding mechanism: <tt>Bearer</tt> per <xref section="3.1" sectionFormat="comma" target="RFC6750"/> for bearer or mTLS-bound (<xref target="RFC8705"/>) tokens, or <tt>DPoP</tt> per <xref section="7.1" sectionFormat="comma" target="RFC9449"/> for DPoP-bound tokens.  </t>
            <ul spacing="normal">
              <li>
                <t>If signature, <tt>iss</tt>, <tt>aud</tt>, or temporal validation fails: HTTP 401 with <tt>error="invalid_token"</tt>.</t>
              </li>
              <li>
                <t>If DPoP proof validation for <tt>cnf.jkt</tt> fails: HTTP 401 per <xref section="7" sectionFormat="comma" target="RFC9449"/>.</t>
              </li>
              <li>
                <t>If the token is structurally valid but the actor fails an authorization evaluation required by local policy, including actor authorization when required: HTTP 403 with <tt>error="actor_unauthorized"</tt>.  The <tt>error</tt> attribute supports extension values registered in the OAuth Extensions Error Registry; <tt>actor_unauthorized</tt> is registered by this document (<xref target="iana-error-codes">OAuth Error Registry</xref>).  The RS <bcp14>MUST NOT</bcp14> use <tt>error="insufficient_scope"</tt> to signal actor authorization failures; that error code indicates the token's scope is insufficient for the operation and implies the client should retry with broader scope, which does not describe an actor identity or delegation policy failure.</t>
              </li>
              <li>
                <t>The RS <bcp14>MUST NOT</bcp14> include actor-specific rejection details in error responses exposed to clients outside the trust domain.</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
      <section anchor="txn-token-rs-processing">
        <name>Transaction Token Processing</name>
        <t>Upon receiving a Transaction Token on a request path where delegated-token processing may apply, a resource server <bcp14>MUST</bcp14> validate and process that token according to <xref target="I-D.ietf-oauth-transaction-tokens"/>, any applicable deployment profile, and the actor-profile rules in this document.</t>
        <t>When the resource server evaluates a Transaction Token as a delegated token under local policy, it <bcp14>MUST</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Validate the Transaction Token per <xref target="I-D.ietf-oauth-transaction-tokens"/> and local deployment profile (signature, <tt>aud</tt>, temporal claims, and issuer identification).  When the token carries an <tt>act</tt> claim, the top-level <tt>iss</tt> claim <bcp14>MUST</bcp14> be present and the RS <bcp14>MUST</bcp14> validate it as the Transaction Token issuer identifier.  When the token carries no <tt>act</tt> claim and <tt>iss</tt> is absent, the RS <bcp14>MUST</bcp14> determine the issuer using the trust-domain and issuer-identification rules of <xref target="I-D.ietf-oauth-transaction-tokens"/> and local deployment configuration.  If local policy for the request path requires actor-profile conformance for delegated requests (including when the resource advertises <tt>actor_profile_required: true</tt> per <xref target="protected-resource-metadata">Protected Resource Metadata</xref>), any Transaction Token the RS evaluates as delegated <bcp14>MUST</bcp14> carry <tt>act</tt>, and each <tt>act</tt> object the RS relies on <bcp14>MUST</bcp14> include <tt>act.iss</tt>; if either is missing, the RS <bcp14>MUST</bcp14> reject the request.  The <tt>actor_profile_required: true</tt> signal does not require non-delegated Transaction Tokens for the same resource to carry <tt>act</tt>.</t>
          </li>
          <li>
            <t>When the token carries a top-level presenter-binding claim such as <tt>cnf</tt>, validate the accompanying proof according to <xref target="I-D.ietf-oauth-transaction-tokens"/> and the applicable deployment profile.  The top-level presenter binding applies to the current presenter only.</t>
          </li>
          <li>
            <t>Extract <tt>sub</tt> and the outermost <tt>act.sub</tt> as the two principals relevant for authorization policy.  If <tt>req_wl</tt> is present, treat it as supporting workload context only.  The RS <bcp14>MUST NOT</bcp14> treat <tt>req_wl</tt> as a substitute for <tt>act.sub</tt>.  When local policy expects <tt>req_wl</tt> and the outermost <tt>act.sub</tt> to identify the same party, the RS <bcp14>SHOULD</bcp14> perform identifier reconciliation; if reconciliation cannot be established, the RS <bcp14>MUST</bcp14> either treat them as distinct identifiers or reject the request according to local policy.</t>
          </li>
          <li>
            <t>Apply actor authorization per <xref target="actor-authorization">Actor Authorization</xref> when required by local policy or when the token is accepted as satisfying a delegated-access requirement for the request path.  Resource servers that do not require actor authorization <bcp14>SHOULD</bcp14> still evaluate the actor as part of authorization, audit, or trust decisions.</t>
          </li>
          <li>
            <t>Optionally traverse inner <tt>act</tt> objects to audit the full delegation chain.  If the RS relies on inner <tt>act</tt> objects for audit, policy refinement, or trust decisions, it <bcp14>MUST</bcp14> do so only under the prior-actor context rules in <xref target="carry-prior-actor-context">Carry Prior-Actor Context</xref>.</t>
          </li>
          <li>
            <t>If any of the above steps fail, the RS <bcp14>MUST</bcp14> reject the request according to the Transaction Token mechanism in use and local deployment profile.  Validation or presenter-proof failures are token-validation failures; actor-policy failures required by local policy are authorization failures.  The RS <bcp14>MUST NOT</bcp14> include actor-specific rejection details in error responses exposed outside the trust domain.</t>
          </li>
        </ol>
      </section>
      <section anchor="token-introspection">
        <name>Token Introspection</name>
        <t>When token introspection (<xref target="RFC7662"/>) is used for delegated tokens, an AS <bcp14>MUST</bcp14> expose actor-profile information needed for equivalent RS processing.  For an active delegated token whose authorization context includes actor-profile claims, the introspection response <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t><tt>active</tt>: <bcp14>REQUIRED</bcp14>.  <bcp14>MUST</bcp14> be <tt>true</tt> for an active token.</t>
          </li>
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>.  The subject of the delegated token, as defined in <xref target="RFC7662"/>.</t>
          </li>
          <li>
            <t><tt>act</tt>: <bcp14>REQUIRED</bcp14>.  The actor object conforming to <xref target="actor-object-structure">Actor Object Structure</xref>, including <tt>act.sub</tt>, <tt>act.iss</tt>, and any nested <tt>act</tt> chain, structured identically to the JWT form defined in this document.</t>
          </li>
          <li>
            <t><tt>sub_profile</tt>: <bcp14>REQUIRED</bcp14> when the token's authorization context includes a top-level <tt>sub_profile</tt>; otherwise <bcp14>SHOULD</bcp14> be included when the AS can authoritatively classify the subject entity type.</t>
          </li>
          <li>
            <t><tt>scope</tt>: <bcp14>REQUIRED</bcp14>.  The effective scope of the token.</t>
          </li>
          <li>
            <t><tt>iss</tt>: <bcp14>REQUIRED</bcp14> when the AS has a stable issuer identifier.</t>
          </li>
          <li>
            <t><tt>chain_complete</tt>: <bcp14>OPTIONAL</bcp14>.  When absent, the RS <bcp14>SHOULD</bcp14> treat the chain as complete unless local policy or deployment context indicates otherwise.</t>
          </li>
        </ul>
        <t>An AS <bcp14>MUST NOT</bcp14> omit actor-profile claims that are part of the delegated token's authorization context, because doing so would misrepresent the token's delegation status to the introspecting RS.  When a delegated token carries a nested <tt>act</tt> chain, the AS <bcp14>MUST</bcp14> include the complete nested <tt>act</tt> structure unless local privacy policy requires omitting specific inner chain entries.</t>
        <t>When local privacy policy requires omitting specific inner chain entries, the AS <bcp14>MAY</bcp14> return a filtered <tt>act</tt> chain but <bcp14>MUST</bcp14> include <tt>"chain_complete": false</tt>.  The AS <bcp14>SHOULD NOT</bcp14> filter inner chain entries when it has knowledge (for example, from <tt>actor_profile_required</tt> metadata (<xref target="protected-resource-metadata">Protected Resource Metadata</xref>), deployment configuration, or bilateral agreement) that the RS uses one or more inner chain entries as inputs to authorization, scope, or other security decisions.  In those cases the AS <bcp14>SHOULD</bcp14> either return the full chain or reject the introspection request.</t>
        <t>The RS handles <tt>chain_complete: false</tt> as follows:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Security-relevant use</strong>: When local policy uses any inner <tt>act</tt> entry as an input to an authorization, scope determination, or other security decision, the RS <bcp14>MUST</bcp14> reject the request upon receiving <tt>chain_complete: false</tt>.  The RS cannot safely make that security decision on an incomplete chain, and a filtered chain is indistinguishable from a chain that was truncated or manipulated before reaching the introspection endpoint.</t>
          </li>
          <li>
            <t><strong>Audit-only use</strong>: When local policy uses inner <tt>act</tt> entries solely for logging, audit, or informational purposes, and not as inputs to any security decision, the RS <bcp14>MAY</bcp14> accept a filtered chain and record the partial information, provided it notes the incompleteness.  The outermost <tt>act.sub</tt> and <tt>sub</tt>, which are unaffected by inner-chain filtering, remain available for authorization.</t>
          </li>
        </ul>
        <t>In either case, the RS <bcp14>MUST NOT</bcp14> treat the partial chain as a faithful representation of the complete delegation history.  A companion profile that defines additional introspection parameters aligned to the visible delegation chain <bcp14>MUST</bcp14> define how those parameters behave when the visible <tt>act</tt> chain is filtered, consistent with <xref target="companion-profile-extensibility">Companion Profiles and Extension Points</xref>.</t>
        <t>Opaque access tokens are not conformant token formats under this profile.  When an AS supports delegated opaque access tokens through introspection, it <bcp14>MUST</bcp14> return the equivalent actor-profile fields listed above for active delegated tokens.  This compatibility path does not make the opaque token itself conformant to this profile, and support for it <bcp14>MUST NOT</bcp14> be inferred solely from <tt>actor_profile_required</tt> metadata.</t>
        <t>An introspecting RS <bcp14>MUST</bcp14> apply the same delegated-token processing to the introspection response claims that it would apply to equivalent locally validated JWT claims, including actor authorization when required by local policy.  An RS that relies on introspection rather than local JWT validation <bcp14>MUST</bcp14> treat a missing <tt>act</tt> claim as an inconsistency whenever local policy, protected resource metadata, or other token context indicates that the token is delegated or that actor-profile conformance is required.  In such cases, the RS <bcp14>MUST</bcp14> reject the token.  Only when no such requirement or indication exists <bcp14>MAY</bcp14> the RS treat an active introspection response without <tt>act</tt> as representing a non-delegated token.</t>
        <t>Introspection endpoints for delegated tokens <bcp14>SHOULD</bcp14> be advertised via the <tt>introspection_endpoint</tt> parameter in AS metadata (<xref target="RFC8414"/>).  When revocation is integrated, the introspection response for a revoked delegated token <bcp14>MUST</bcp14> return <tt>"active": false</tt> and <bcp14>MUST NOT</bcp14> include <tt>act</tt> or <tt>sub_profile</tt> claims.</t>
        <t>Resource servers that cache introspection responses for delegated tokens <bcp14>SHOULD</bcp14> use short cache lifetimes appropriate to the deployment's revocation requirements.  When an introspection response carries <tt>"chain_complete": false</tt>, an RS that uses inner <tt>act</tt> entries for security decisions <bcp14>SHOULD NOT</bcp14> cache the response, because a subsequent request relying on the cached partial chain cannot distinguish privacy filtering from chain truncation or manipulation.</t>
      </section>
    </section>
    <section anchor="actor-profile-error-responses">
      <name>Error Responses</name>
      <t>When an AS or TTS rejects a request under this profile for reasons related to actor-profile processing, it <bcp14>MUST</bcp14> return an OAuth error response per <xref section="5.2" sectionFormat="comma" target="RFC6749"/> and <xref section="2.2" sectionFormat="comma" target="RFC8693"/>.  These error codes do not override <tt>invalid_client</tt> when a request fails client authentication per <xref target="RFC6749"/> or <xref target="RFC7523"/>.</t>
      <t>The following table summarizes actor-profile error handling by using three existing OAuth error codes and defining one new error code, <tt>actor_unauthorized</tt>.  The "AS" and "TTS" columns note context-specific triggers where the two server types differ; otherwise the trigger condition applies to both.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Error Code</th>
            <th align="left">General Trigger</th>
            <th align="left">AS-specific detail</th>
            <th align="left">TTS-specific detail</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>invalid_request</tt></td>
            <td align="left">
              <tt>act</tt> claim structure syntactically invalid; delegation chain depth exceeds limit; required claim (<tt>act.sub</tt> or <tt>act.iss</tt>) absent</td>
            <td align="left">DPoP-bound JWT assertion grant omits required top-level <tt>cnf.jkt</tt>; delegated Transaction Token used as <tt>subject_token</tt> omits required top-level <tt>iss</tt></td>
            <td align="left">Delegated inbound Transaction Token omits required top-level <tt>iss</tt></td>
          </tr>
          <tr>
            <td align="left">
              <tt>invalid_grant</tt></td>
            <td align="left">Inbound token or assertion fails signature or claims validation; issuer not trusted to assert the delegation relationship</td>
            <td align="left">Proof-of-possession check cannot be confirmed</td>
            <td align="left">
              <tt>sub</tt> identity cannot be preserved per step 1 of <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>; inbound actor information fails validation per step 4</td>
          </tr>
          <tr>
            <td align="left">
              <tt>invalid_scope</tt></td>
            <td align="left">Scope reduction under <xref target="RFC8693"/> or local policy leaves no effective scope for reasons unrelated to actor authorization</td>
            <td align="left">Requested scope is not available after ordinary Token Exchange scope reduction</td>
            <td align="left">Requested transaction scope is not available under TTS policy</td>
          </tr>
          <tr>
            <td align="left">
              <tt>actor_unauthorized</tt></td>
            <td align="left">Actor-policy failure: the (<tt>sub</tt>, <tt>act.sub</tt>) pair fails a policy check, the actor's <tt>sub_profile</tt> is not in the accepted set, the required delegation relationship cannot be confirmed from current inputs, or local policy prohibits the actor relationship</td>
            <td align="left">Includes policy failures for a newly introduced actor or a preserved delegation chain evaluated by the AS</td>
            <td align="left">Includes the newly authenticated presenter the TTS would install as the new outermost actor</td>
          </tr>
        </tbody>
      </table>
      <t>The <tt>error_description</tt> field <bcp14>SHOULD</bcp14> be included and <bcp14>SHOULD</bcp14> describe which aspect of actor-profile processing failed, to the extent permitted by the server's security and privacy policy.  Some <tt>actor_unauthorized</tt> failures are recoverable by using a different actor credential, actor type, or delegation grant; others are definitive local-policy prohibitions.</t>
      <t>When <tt>actor_unauthorized</tt> is returned from a token endpoint (AS or TTS), the client <bcp14>SHOULD</bcp14> consult <tt>entity_profiles_supported.actor</tt> in AS metadata (<xref target="authorization-server-metadata">Authorization Server Metadata</xref>) to determine whether the actor's <tt>sub_profile</tt> is accepted, then inspect <tt>error_description</tt> for missing-grant indications.  If neither resolves the failure, deployment documentation governs whether any remediation path exists.  When returned from a resource server, the token has already been issued; the client <bcp14>SHOULD</bcp14> obtain a new token via a different actor credential or grant path.</t>
      <t>Example:</t>
      <sourcecode type="json"><![CDATA[
{
  "error": "actor_unauthorized",
  "error_description": "act.sub_profile not accepted for payments:create"
}
]]></sourcecode>
    </section>
    <section anchor="metadata-and-discovery">
      <name>Metadata and Discovery</name>
      <t>This section defines a minimal set of metadata parameters that, together with the <tt>entity_profiles_supported.actor</tt> array defined in <xref target="I-D.mora-oauth-entity-profiles"/> and the <tt>authorization_grant_profiles_supported</tt> parameter defined by <xref target="I-D.ietf-oauth-identity-assertion-authz-grant"/>, allow authorization servers and resource servers to advertise actor-profile support with reduced out-of-band coordination.  Authorization grant profile support uses <tt>authorization_grant_profiles_supported</tt>; Token Exchange role-specific capabilities are grouped under <tt>actor_profile_token_exchange</tt>; entity type enumeration uses <xref target="I-D.mora-oauth-entity-profiles"/> metadata.</t>
      <t>These parameters are coarse-grained capability indicators only; they do not provide a complete description of every supported grant path or guarantee successful token issuance.  Deployment documentation, prior agreement, or companion profiles can still be needed for details outside the parameters defined here.  Companion profiles <bcp14>MAY</bcp14> define additional metadata, consistent with <xref target="companion-profile-extensibility">Companion Profiles and Extension Points</xref>.</t>
      <section anchor="authorization-server-metadata">
        <name>Authorization Server Metadata</name>
        <t>The following parameters are defined for use in the AS metadata document (<xref target="RFC8414"/>):</t>
        <dl>
          <dt><tt>authorization_grant_profiles_supported</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>.  A JSON array of authorization grant profile identifiers, as defined by <xref target="I-D.ietf-oauth-identity-assertion-authz-grant"/>.  An AS that supports processing JWT authorization grants carrying actor-profile claims under this document <bcp14>SHOULD</bcp14> include <tt>urn:ietf:params:oauth:grant-profile:actor-profile</tt> in this array.  This value covers all JWT authorization-grant paths defined by this document (<xref target="jwt-assertion-grants">JWT Assertion Grants</xref>), not a single specific grant type variant; it signals that the AS implements the actor-profile JWT authorization-grant processing rules as a whole.  It does not indicate that any particular issuer, subject, actor, client, audience, resource, scope, or authorization request will be accepted.  An AS that includes <tt>urn:ietf:params:oauth:grant-profile:actor-profile</tt> in <tt>authorization_grant_profiles_supported</tt> <bcp14>MUST</bcp14> also include <tt>urn:ietf:params:oauth:grant-type:jwt-bearer</tt> in <tt>grant_types_supported</tt>.</t>
          </dd>
          <dt><tt>actor_profile_token_exchange</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>.  A JSON object advertising coarse Token Exchange capabilities for requests in which actor-profile processing can apply.  When absent, the AS makes no claim about Token Exchange support for this actor profile.  This parameter applies only to Token Exchange; it does not describe authorization code grants or JWT bearer authorization grants.  The object members defined by this document are:
</t>
            <ul spacing="normal">
              <li>
                <t><tt>subject_token_types_supported</tt>: <bcp14>OPTIONAL</bcp14>.  A JSON array of token-type URI strings indicating the <tt>subject_token_type</tt> values the AS accepts for Token Exchange requests in which actor-profile processing can apply.  Values defined by this document are:      </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:jwt</tt>: JWT assertion grants (<xref target="jwt-assertion-grants">JWT Assertion Grants</xref>)</t>
                  </li>
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:access_token</tt>: JWT access tokens (<xref target="jwt-access-tokens">JWT Access Tokens</xref>)</t>
                  </li>
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:id_token</tt>: OpenID Connect ID tokens (<xref target="id-tokens">OpenID Connect ID Token</xref>)</t>
                  </li>
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:refresh_token</tt>: refresh tokens (<xref target="refresh-tokens">Refresh Token</xref>)</t>
                  </li>
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:txn_token</tt>: Transaction Tokens (<xref target="transaction-tokens">Transaction Tokens</xref>)</t>
                  </li>
                </ul>
              </li>
              <li>
                <t><tt>actor_token_types_supported</tt>: <bcp14>OPTIONAL</bcp14>.  A JSON array of token-type URI strings indicating the <tt>actor_token_type</tt> values the AS accepts for Token Exchange requests in which actor-profile processing can apply.  Values defined by this document are:      </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:jwt</tt>: JWT client assertions (<xref target="jwt-client-assertion-as-actor-token">JWT Client Assertion</xref>) and workload identity credentials (<xref target="workload-identity-as-actor-token">Workload Credential Processing</xref>)</t>
                  </li>
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:access_token</tt>: JWT access tokens (<xref target="jwt-access-token-as-actor-token">JWT Access Token as actor_token</xref>)</t>
                  </li>
                </ul>
              </li>
              <li>
                <t><tt>requested_token_types_supported</tt>: <bcp14>OPTIONAL</bcp14>.  A JSON array of token-type URI strings indicating the <tt>requested_token_type</tt> values the AS accepts for Token Exchange requests in which actor-profile processing can apply.  Values defined by this document are:      </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:access_token</tt>: JWT access tokens (<xref target="jwt-access-tokens">JWT Access Tokens</xref>)</t>
                  </li>
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:jwt</tt>: JWT assertion grants (<xref target="jwt-assertion-grants">JWT Assertion Grants</xref>)</t>
                  </li>
                  <li>
                    <t><tt>urn:ietf:params:oauth:token-type:txn_token</tt>: Transaction Tokens (<xref target="transaction-tokens">Transaction Tokens</xref>)</t>
                  </li>
                </ul>
              </li>
            </ul>
            <t>Each member of <tt>actor_profile_token_exchange</tt> is a coarse capability signal only.  The presence of a token type in one member does not guarantee that it can be combined with every token type in another member, every resource, every scope, every presenter-binding mechanism, or every profile-specific JWT variant.  For example, this document uses <tt>urn:ietf:params:oauth:token-type:jwt</tt> for both RFC 7523 client assertions and workload identity credentials as <tt>actor_token</tt> inputs, with profile disambiguation performed during request processing (<xref target="token-exchange-processing">Token Exchange Processing</xref>).</t>
          </dd>
        </dl>
        <t>The entity profile types the AS accepts for actors are advertised via the <tt>entity_profiles_supported.actor</tt> array defined in <xref target="I-D.mora-oauth-entity-profiles"/>, not via a separate metadata parameter.  DPoP support is advertised via <tt>dpop_signing_alg_values_supported</tt> per <xref target="RFC9449"/>.</t>
        <t>Example AS metadata fragment:</t>
        <sourcecode type="json"><![CDATA[
{
  "issuer": "https://as.enterprise.example",
  "token_endpoint": "https://as.enterprise.example/token",
  "grant_types_supported": [
    "urn:ietf:params:oauth:grant-type:token-exchange",
    "urn:ietf:params:oauth:grant-type:jwt-bearer"
  ],
  "dpop_signing_alg_values_supported": ["ES256", "RS256"],
  "authorization_grant_profiles_supported": [
    "urn:ietf:params:oauth:grant-profile:actor-profile"
  ],
  "actor_profile_token_exchange": {
    "subject_token_types_supported": [
      "urn:ietf:params:oauth:token-type:id_token",
      "urn:ietf:params:oauth:token-type:jwt",
      "urn:ietf:params:oauth:token-type:access_token",
      "urn:ietf:params:oauth:token-type:txn_token"
    ],
    "actor_token_types_supported": [
      "urn:ietf:params:oauth:token-type:jwt",
      "urn:ietf:params:oauth:token-type:access_token"
    ],
    "requested_token_types_supported": [
      "urn:ietf:params:oauth:token-type:access_token",
      "urn:ietf:params:oauth:token-type:jwt",
      "urn:ietf:params:oauth:token-type:txn_token"
    ]
  },
  "entity_profiles_supported": {
    "client": ["service", "ai_agent"],
    "subject": ["user", "service", "ai_agent"],
    "actor":   ["user", "service", "ai_agent"]
  }
}
]]></sourcecode>
      </section>
      <section anchor="protected-resource-metadata">
        <name>Protected Resource Metadata</name>
        <t>One new parameter is defined for use in Protected Resource Metadata (<xref target="RFC9728"/>):</t>
        <dl>
          <dt><tt>actor_profile_required</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>.  A boolean.  When <tt>true</tt>, the RS indicates that requests intending to exercise delegated authority for this resource are expected to provide actor-profile information conforming to this document's semantics.  For JWT access tokens and Transaction Tokens, this ordinarily means a delegated token carrying an <tt>act</tt> claim conforming to this profile.  In deployments that use opaque access tokens, equivalent actor-profile information <bcp14>MAY</bcp14> instead be conveyed to the RS via the introspection compatibility path in <xref target="token-introspection">Token Introspection</xref>, but the opaque token itself is not conformant to this profile.  When <tt>false</tt> or absent, actor-profile conformance is not advertised by metadata.</t>
          </dd>
          <dt/>
          <dd>
            <t>Clients <bcp14>SHOULD</bcp14> treat <tt>actor_profile_required: true</tt> as a strong indication that delegated access will require either a conforming <tt>act</tt> claim in the token or an explicitly documented opaque-token/introspection path providing equivalent claims.</t>
          </dd>
          <dt/>
          <dd>
            <t>When an AS has obtained and processed Protected Resource Metadata for the target RS and that metadata includes <tt>actor_profile_required: true</tt>, the AS <bcp14>MUST</bcp14> reject any token request that would produce a token non-conformant with this profile for use at that resource unless an explicitly supported introspection compatibility path will provide equivalent actor-profile information to the RS.  An RS that enforces this policy for a given request path <bcp14>MUST</bcp14> reject a request it determines is attempting delegated access if neither a conforming <tt>act</tt> claim nor equivalent introspection-derived actor-profile information is available to the RS.  This parameter does not require otherwise acceptable non-delegated requests for the same resource to carry <tt>act</tt>, and it does not by itself describe the RS's full actor authorization logic.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is resource-scoped, not path-scoped; <xref target="RFC9728"/> does not define sub-resource granularity for Protected Resource Metadata.  An RS that requires actor-profile conformance only on specific request paths (e.g., <tt>/payments</tt> but not <tt>/profile</tt>) <bcp14>MUST</bcp14> apply enforcement at the request layer.  Such an RS <bcp14>MAY</bcp14> set this parameter to <tt>true</tt> as a conservative resource-wide signal, but clients and deployment documentation <bcp14>SHOULD</bcp14> recognize that path-specific enforcement can be stricter than resource metadata alone expresses.</t>
          </dd>
        </dl>
        <t>Clients discover which actor entity profile values the RS's AS will accept by consulting <tt>entity_profiles_supported.actor</tt> in the AS metadata for one of the authorization servers listed in the resource's <tt>authorization_servers</tt> array (<xref target="RFC9728"/>).  When <tt>authorization_servers</tt> lists multiple entries, the client <bcp14>SHOULD</bcp14> select the AS that issued or will issue the token being presented.</t>
        <t>Example Protected Resource Metadata fragment:</t>
        <sourcecode type="json"><![CDATA[
{
  "resource": "https://api.travel-provider.example",
  "authorization_servers": [
    "https://as.travel-provider.example"
  ],
  "actor_profile_required": true
}
]]></sourcecode>
      </section>
      <section anchor="transaction-token-capability-signaling">
        <name>Transaction Token Capability Signaling</name>
        <t>Transaction Token support under this profile for Token Exchange paths is advertised through <tt>actor_profile_token_exchange.requested_token_types_supported</tt>.  When an AS or TTS can issue Transaction Tokens as delegated Token Exchange outputs under this profile, it <bcp14>MUST</bcp14> list <tt>urn:ietf:params:oauth:token-type:txn_token</tt> in <tt>actor_profile_token_exchange.requested_token_types_supported</tt>.  This document does not define any separate Transaction Token discovery parameter.</t>
      </section>
      <section anchor="capability-signaling-usage">
        <name>Capability Signaling Usage</name>
        <t>Clients use Protected Resource Metadata (<xref target="RFC9728"/>) to determine whether a resource advertises actor-profile conformance (<tt>actor_profile_required</tt>), and the associated AS metadata (<xref target="RFC8414"/>) to assess JWT authorization-grant support (<tt>authorization_grant_profiles_supported</tt>), Token Exchange compatibility (<tt>actor_profile_token_exchange</tt>), and accepted actor entity profiles (<tt>entity_profiles_supported.actor</tt>).  When this profile is combined with Identity Chaining (<xref target="I-D.ietf-oauth-identity-chaining"/>), clients <bcp14>SHOULD</bcp14> additionally consult <tt>identity_chaining_requested_token_types_supported</tt>; the two parameter sets are independent.</t>
        <t>The metadata in this document does not advertise authorization-code actor-selection mechanisms or per-scope/per-path actor type restrictions.  Deployments that need either capability rely on deployment documentation, bilateral agreement, or a companion profile.  When a delegated request carries <tt>act.sub_profile</tt>, its value <bcp14>SHOULD</bcp14> be drawn from <tt>entity_profiles_supported.actor</tt> when that metadata is available.</t>
        <t>Example client preflight failure: if the RS metadata advertises <tt>"actor_profile_required": true</tt> but the target AS metadata advertises <tt>"entity_profiles_supported": { "actor": ["service"] }</tt> and the client's acting entity profile is <tt>ai_agent</tt>, the client would ordinarily stop before making the token request because the AS does not advertise support for the actor type the client would need to represent.</t>
      </section>
    </section>
    <section anchor="companion-profile-extensibility">
      <name>Companion Profiles and Extension Points</name>
      <t>This document defines current-token delegated identity while leaving room for companion profiles to define supplementary behavior such as provenance, transparency, or deployment-specific audit material.</t>
      <t>A companion profile layered on top of this one:</t>
      <ul spacing="normal">
        <li>
          <t><bcp14>MAY</bcp14> define additional top-level JWT claims, OAuth metadata parameters, or introspection response parameters that apply only when a token already conforms to this profile;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> preserve the meanings of the token's top-level <tt>sub</tt>, the outermost <tt>act.sub</tt>, the (<tt>act.iss</tt>, <tt>act.sub</tt>) actor identifier pair, the nested <tt>act</tt> chain ordering, and the top-level <tt>cnf</tt> claim for the current presenter;</t>
        </li>
        <li>
          <t><bcp14>MUST NOT</bcp14> reinterpret <tt>act.iss</tt>, nested <tt>act</tt> objects, or the top-level <tt>cnf</tt> claim as independently trusted prior-hop provenance artifacts;</t>
        </li>
        <li>
          <t><bcp14>SHOULD</bcp14> define any supplementary provenance, receipt, or chain-wide state in separate top-level claims or equivalent companion mechanisms rather than by overloading members inside inherited <tt>act</tt> objects;</t>
        </li>
        <li>
          <t>if it defines data that aligns to the visible <tt>act</tt> chain, <bcp14>MUST</bcp14> specify the alignment rules, the behavior when coverage is partial, and the behavior when introspection or privacy filtering suppresses part of the visible chain.</t>
        </li>
      </ul>
      <t>An implementation that conforms only to this core profile <bcp14>MUST</bcp14> ignore unrecognized companion-profile claims, metadata parameters, and introspection response parameters unless another specification or local policy defines their meaning.  A deployment that requires support for a companion profile <bcp14>MUST</bcp14> express that requirement through the companion profile's own metadata, through out-of-band agreement, or through another explicit local-policy mechanism.</t>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>This section provides deployment and migration guidance for adopting the OAuth Actor Profile in systems that currently rely on implicit delegation or older <tt>act</tt> semantics.</t>
      <section anchor="migration-and-adoption">
        <name>Migration and Adoption</name>
        <section anchor="rfc-8693-backwards-compatibility">
          <name>RFC 8693 Backwards Compatibility</name>
          <t>This profile defines a conformant <tt>act</tt> object structure that requires <tt>iss</tt> in addition to the <tt>sub</tt> required by <xref target="RFC8693"/>, and adds <tt>sub_profile</tt> for entity-type classification.  This is a profile requirement: <xref target="RFC8693"/> <tt>act</tt> objects that include only <tt>sub</tt> remain valid under that specification, but they do not conform to this profile.  Deployments that receive an <tt>act</tt> object that conforms only to <xref target="RFC8693"/> but omits this profile's required members <bcp14>MUST</bcp14> treat that actor object as not conforming to this profile.</t>
          <t>When a token or assertion is required by local policy or advertised metadata to conform to this profile, such non-conforming <tt>act</tt> objects <bcp14>MUST</bcp14> be rejected.  When profile conformance is not required, implementations <bcp14>MAY</bcp14> continue to process a base <xref target="RFC8693"/> <tt>act</tt> object according to local policy, but they <bcp14>MUST NOT</bcp14> infer profile-defined semantics for claims that are absent.</t>
          <t>The migration path for deployments currently using RFC 8693 <tt>act</tt> objects is:</t>
          <ol spacing="normal" type="1"><li>
              <t>ASes that issue tokens carrying <tt>act</tt> claims <bcp14>MUST</bcp14> begin emitting <tt>act.iss</tt> in all newly issued tokens once support for this profile is enabled.  Existing consumers that do not recognize <tt>act.iss</tt> will ignore it.</t>
            </li>
            <li>
              <t>Update consumers to validate <tt>act.iss</tt> per <xref target="actor-object-structure">Actor Object Structure</xref> once issuers have deployed step 1.</t>
            </li>
            <li>
              <t>Once all token issuers and consumers on a given path have been updated, resource servers can enforce profile conformance by setting <tt>actor_profile_required: true</tt> in their Protected Resource Metadata.  ASes that wish to accept only profile-conformant inbound assertions can do so via local policy once issuers on inbound paths have deployed step 1.</t>
            </li>
          </ol>
          <t>Steps 2 and 3 are <bcp14>RECOMMENDED</bcp14>; step 1 is <bcp14>REQUIRED</bcp14> for any AS that issues actor-profile tokens.  This graduated approach avoids a flag-day cutover and allows incremental rollout across trust domains.</t>
          <t>When an AS receives an inbound token or assertion whose <tt>act</tt> object omits <tt>act.iss</tt> (that is, the object conforms only to <xref target="RFC8693"/> and not to this profile):</t>
          <ul spacing="normal">
            <li>
              <t>If local policy or advertised metadata requires actor-profile conformance for the request path, the AS <bcp14>MUST</bcp14> reject the request.  It <bcp14>MUST</bcp14> return <tt>invalid_request</tt> consistent with <xref target="actor-profile-error-responses">Error Responses</xref>.</t>
            </li>
            <li>
              <t>If actor-profile conformance is not required, the AS <bcp14>MAY</bcp14> process the inbound <tt>act</tt> object under local policy for non-profile behavior, subject to the following constraints:  </t>
              <ul spacing="normal">
                <li>
                  <t>The AS <bcp14>MUST NOT</bcp14> rewrite an inherited actor entry to add <tt>act.iss</tt>; inherited entries are immutable.</t>
                </li>
                <li>
                  <t>The AS <bcp14>MUST</bcp14> reject any request that would carry the non-conforming chain into a profile-conforming output token.</t>
                </li>
                <li>
                  <t>When the AS issues a non-profile-conforming output token under local policy, it <bcp14>MUST NOT</bcp14> silently drop the inbound <tt>act</tt> claim.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>Implementations that previously treated confirmation members inside <tt>act</tt> as active sender-constraining mechanisms should note that this document defines proof-of-possession only through the top-level <tt>cnf</tt> claim and the immediate presenter.  Deployments that relied on per-hop actor-key verification for multi-hop security properties will need a separate provenance mechanism or profile rather than the core actor profile defined here.</t>
        </section>
        <section anchor="migration-implicit-explicit">
          <name>Migrating from Implicit to Explicit Delegation</name>
          <t>Migration from implicit delegation is the process of making actor identity explicit in tokens where the acting party was previously inferred from <tt>client_id</tt>, <tt>azp</tt>, or token-request context.  The normative client-identity rules are defined in <xref target="client-identity-delegation">Client Identity and Delegation</xref>.</t>
          <t>Deployments that currently rely on implicit delegation can migrate incrementally.  A common transition pattern is to emit both legacy client-oriented identifiers and explicit actor claims during rollout, measure and reconcile mismatches, and then require <tt>act</tt> where explicit delegation is needed.</t>
          <t>A deployment that chooses explicit delegation only can reject non-<tt>act</tt> delegated requests entirely and omit legacy client-identity reconciliation.</t>
          <t>One safe migration pattern is:</t>
          <ul spacing="normal">
            <li>
              <t>Clients that can obtain explicit-delegation tokens under this profile <bcp14>SHOULD</bcp14> prefer those tokens over relying on legacy implicit client-identity interpretation.</t>
            </li>
            <li>
              <t>If <tt>act</tt> is absent, deployments <bcp14>MAY</bcp14> continue to apply legacy implicit client-based policy according to local policy, and existing client-based authorization logic <bcp14>MAY</bcp14> remain in place during migration.</t>
            </li>
            <li>
              <t>If both explicit and implicit signals are present, apply the reconciliation rules in <xref target="client-identity-delegation">Client Identity and Delegation</xref> and record mismatches during rollout.</t>
            </li>
            <li>
              <t>An RS that enforces explicit delegation under this profile for a given request path <bcp14>MUST NOT</bcp14> treat the successful presentation of a non-<tt>act</tt> token as an acceptable substitute for a delegated token merely because legacy client-based policy would otherwise allow the request.</t>
            </li>
          </ul>
          <t>During transition, issuers <bcp14>SHOULD</bcp14> emit both legacy client-oriented identifiers and explicit actor claims whenever doing so is feasible for the deployment.</t>
          <t>The legacy form carries only <tt>client_id</tt> (and optionally <tt>azp</tt>) to identify the acting party.  The explicit form adds an <tt>act</tt> block:</t>
          <sourcecode type="json"><![CDATA[
{
  "iss": "https://as.example.com",
  "sub": "https://idp.example.com/users/alice",
  "client_id": "travel-assistant-client-id",
  "azp": "travel-assistant-client-id",
  "act": {
    "sub": "https://agents.example.com/travel-assistant",
    "iss": "https://as.example.com",
    "sub_profile": "ai_agent"
  },
  "scope": "booking:create"
}
]]></sourcecode>
          <t>In this example, <tt>client_id</tt> and <tt>azp</tt> remain as auxiliary client-identity inputs while <tt>act.sub</tt> carries the explicit actor identity.  See <xref target="client-identity-delegation">Client Identity and Delegation</xref> for the normative treatment of these claims when both are present.</t>
          <t>Mismatch example, where the client and actor identify different parties:</t>
          <sourcecode type="json"><![CDATA[
{
  "iss": "https://as.example.com",
  "sub": "https://idp.example.com/users/alice",
  "client_id": "travel-assistant-client-id",
  "act": {
    "sub": "https://agents.other-provider.example/concierge-bot",
    "iss": "https://as.other-provider.example",
    "sub_profile": "ai_agent"
  },
  "scope": "booking:create"
}
]]></sourcecode>
          <t>This example illustrates the mismatch case covered by <xref target="client-identity-delegation">Client Identity and Delegation</xref>: the OAuth client identifier and the explicit actor identifier name different parties unless trusted local mapping rules bind them.</t>
        </section>
      </section>
      <section anchor="act-iss-authority-guidance">
        <name>Trusting Actor Identifier Pairs</name>
        <t>This section gives non-normative examples for the trust decision required by <xref target="validate-outermost-actor">Validate Outermost Actor</xref>.  Actor resolution under this profile starts from the (<tt>act.iss</tt>, <tt>act.sub</tt>) pair; the token's top-level <tt>iss</tt> identifies the token issuer and is the actor identifier context only when the two happen to be the same entity.  As described in <xref target="representation-and-policy">Representation and Policy</xref>, this profile does not define a universal trust framework or proof algorithm for establishing that <tt>act.iss</tt> is authoritative for <tt>act.sub</tt>.</t>
        <t>Examples of local validation approaches include:</t>
        <ul spacing="normal">
          <li>
            <t>federation metadata or trust-framework configuration that authorizes the token issuer to assert actor identifiers in the <tt>act.iss</tt> context (for example, <xref target="OpenID.Federation"/>);</t>
          </li>
          <li>
            <t>pre-registration entries that explicitly authorize the token issuer to assert a specific (<tt>act.iss</tt>, <tt>act.sub</tt>) pair or identifiers of that form; and</t>
          </li>
          <li>
            <t>bilateral or deployment-local policy rules that authorize the token issuer to carry the specific class of actor identifier used in <tt>act.sub</tt>.</t>
          </li>
        </ul>
        <t>For HTTPS URI identifiers, one possible local rule is URL namespace containment.  Under that style of rule, deployments might accept a token issuer's assertion of an actor identifier pair when the scheme, host, and port of <tt>act.iss</tt> and <tt>act.sub</tt> match, or when <tt>act.sub</tt> falls within a path prefix of <tt>act.iss</tt> that has been explicitly configured for that issuer.  In those deployments, scheme and host comparison typically follows the case-insensitive rules in <xref section="3.2.2" sectionFormat="comma" target="RFC3986"/>, while path-prefix matching is usually case-sensitive and boundary-aware.  Subdomain relationships alone are often insufficient to establish trust without explicit configuration.</t>
        <t>Examples:</t>
        <ul spacing="normal">
          <li>
            <t>A token issued by <tt>https://as.enterprise.example</tt> with <tt>act.iss = https://as.enterprise.example</tt> and <tt>act.sub = https://as.enterprise.example/agents/travel-assistant</tt> would commonly satisfy a same-host local trust rule.</t>
          </li>
          <li>
            <t>A token issued by <tt>https://as.enterprise.example</tt> with <tt>act.iss = https://as.enterprise.example</tt> and <tt>act.sub = https://idp.enterprise.example/users/alice</tt> would not ordinarily satisfy URL containment alone, because the host differs.</t>
          </li>
          <li>
            <t>For non-HTTPS identifier schemes such as workload-identity URNs, deployments typically rely on registry, federation, or other explicit local trust configuration rather than URL-based rules.</t>
          </li>
        </ul>
      </section>
      <section anchor="delegation-chain-token-lifetime">
        <name>Token Lifetime for Delegation Chains</name>
        <t>Delegated tokens carry the combined exposure surface of all principals in the delegation chain.  A single issued token may authorize actions by an actor whose delegation grant has since been revoked; the token remains valid until its <tt>exp</tt> time.  Because revocation cannot retroactively invalidate already-issued tokens, lifetime is the primary control.</t>
        <t>Deployments <bcp14>SHOULD</bcp14> use shorter token lifetimes for delegated tokens than for non-delegated tokens of equivalent scope.  In cross-domain flows, the upstream delegation artifact (e.g., an ID-JAG or delegated access token) limits how long the downstream actor can continue to request tokens without re-authenticating the delegation chain.  Transaction Tokens are already expected to be short-lived; JWT access tokens and JWT assertion grants in multi-hop chains <bcp14>SHOULD</bcp14> be issued with lifetimes no longer than necessary to complete the task they authorize.</t>
        <t>Deployments with deep chains (three or more nested <tt>act</tt> objects) <bcp14>SHOULD</bcp14> account for the fact that any revocation event at any hop in the chain cannot propagate to already-issued downstream tokens.  In environments with significant revocation risk (for example, AI agent delegation chains where user consent can be withdrawn at any time), deployments <bcp14>SHOULD</bcp14> combine short-lived tokens with active introspection at sensitive resource servers rather than relying solely on <tt>exp</tt>.</t>
        <t>General guidance on access token lifetime and security tradeoffs is provided in <xref target="RFC9700"/>.</t>
      </section>
    </section>
    <section anchor="conformance">
      <name>Conformance</name>
      <t>This section enumerates per-role requirements for claiming conformance to this profile.  Profile scope (representation versus policy, supported token formats, and supported request semantics) is defined in <xref target="profile-scope">Profile Scope</xref>.  An implementation claiming conformance <bcp14>MUST</bcp14> satisfy the requirements listed for each role it performs.</t>
      <section anchor="conformance-as">
        <name>Issuing Authorization Server</name>
        <t>An issuing AS that claims conformance to this profile <bcp14>MUST</bcp14>:</t>
        <ul spacing="normal">
          <li>
            <t>emit <tt>act.iss</tt> in every newly issued token carrying <tt>act</tt> (<xref target="actor-object-structure">Actor Object Structure</xref>);</t>
          </li>
          <li>
            <t>apply the chain validation and construction algorithm in <xref target="delegation-chain-algorithm">Delegation Chain Validation and Construction</xref>;</t>
          </li>
          <li>
            <t>define and enforce a local maximum delegation depth (<xref target="delegation-chains">Delegation Chains</xref>);</t>
          </li>
          <li>
            <t>preserve <tt>sub</tt> across token issuance, translating only under a trusted local mapping (<xref target="jwt-access-token-propagation">JWT Access Token Output</xref>);</t>
          </li>
          <li>
            <t>apply the presenter-transition model in <xref target="token-exchange-presenter-model">Presenter Transition Model</xref> when performing Token Exchange;</t>
          </li>
          <li>
            <t>reject any <tt>actor_token</tt> carrying <tt>act</tt> (<xref target="actor-tokens">Actor Tokens</xref>);</t>
          </li>
          <li>
            <t>return the error codes specified in <xref target="actor-profile-error-responses">Error Responses</xref> for the listed failure conditions;</t>
          </li>
          <li>
            <t>preserve <tt>act</tt> and top-level <tt>sub_profile</tt> in introspection responses for active delegated tokens, when introspection is supported (<xref target="token-introspection">Token Introspection</xref>).</t>
          </li>
        </ul>
      </section>
      <section anchor="conformance-tts">
        <name>Transaction Token Service</name>
        <t>A TTS that claims conformance to this profile <bcp14>MUST</bcp14>:</t>
        <ul spacing="normal">
          <li>
            <t>satisfy the issuing-AS requirements above for Transaction Token output;</t>
          </li>
          <li>
            <t>set top-level <tt>iss</tt> on every Transaction Token carrying <tt>act</tt> (<xref target="transaction-tokens">Transaction Tokens</xref>);</t>
          </li>
          <li>
            <t>apply the TTS presenter-authentication and output rules in <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>;</t>
          </li>
          <li>
            <t>treat <tt>req_wl</tt> as supporting workload context, not as a substitute for the outermost <tt>act.sub</tt> (<xref target="actor-claim-in-transaction-tokens">Actor Claim in Transaction Tokens</xref>).</t>
          </li>
        </ul>
      </section>
      <section anchor="conformance-rs">
        <name>Resource Server</name>
        <t>An RS that claims conformance to this profile <bcp14>MUST</bcp14>:</t>
        <ul spacing="normal">
          <li>
            <t>validate <tt>act</tt> only when the outer token issuer is trusted to convey it (<xref target="delegation-chain-integrity">Delegation Chain Integrity and Trust</xref>);</t>
          </li>
          <li>
            <t>treat <tt>client_id</tt> and <tt>azp</tt> as client-identity inputs only, not as actor identifiers, when <tt>act</tt> is present (<xref target="client-identity-delegation">Client Identity and Delegation</xref>);</t>
          </li>
          <li>
            <t>evaluate proof of possession against the top-level <tt>cnf</tt> only (<xref target="delegated-pop-validation">Sender Constraint and Proof-of-Possession Validation</xref>);</t>
          </li>
          <li>
            <t>use the <tt>WWW-Authenticate</tt> challenge scheme appropriate to the token's binding mechanism (<xref target="jwt-access-token-rs-processing">JWT Access Token Processing</xref>).</t>
          </li>
        </ul>
        <t>An RS that enforces actor authorization additionally <bcp14>MUST</bcp14> evaluate the (<tt>sub</tt>, outermost <tt>act.sub</tt>) pair per <xref target="actor-authorization">Actor Authorization</xref>.</t>
      </section>
      <section anchor="conformance-client">
        <name>Client</name>
        <t>A client that claims conformance to this profile <bcp14>SHOULD</bcp14> treat <tt>actor_profile_required: true</tt> as an indication that delegated access for the resource requires <tt>act</tt>-carrying tokens (<xref target="protected-resource-metadata">Protected Resource Metadata</xref>), and adjust its grant selection or token request accordingly.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As described in <xref target="representation-and-policy">Representation and Policy</xref>, this document does not define a trust framework for proving that an actor identifier context is authoritative for an actor identifier, proving delegation approval, or validating subject-identifier translation.  Security for those decisions depends on deployment-specific policy and external agreements.</t>
      <section anchor="delegation-chain-integrity">
        <name>Delegation Chain Integrity and Trust</name>
        <t>An attacker who can inject or forge <tt>act</tt> claims can impersonate an arbitrary actor and exercise a subject's permissions without authorization.  The primary mitigation is to accept <tt>act</tt> claims only in tokens whose issuer is trusted to assert the delegated actor relationship.  RS implementations <bcp14>MUST</bcp14> validate the token signature before extracting actor claims, and <bcp14>MUST</bcp14> verify that the token issuer is trusted to convey the claims it carries.</t>
        <t>Because inner <tt>act</tt> objects are set by upstream ASes and not re-signed at each hop, the integrity of the entire delegation chain rests on the outermost token's signature.  Implementations <bcp14>SHOULD</bcp14> use short token lifetimes and <bcp14>MUST</bcp14> reject tokens whose <tt>exp</tt> has passed, regardless of chain depth.</t>
        <t>Inner <tt>act</tt> objects are prior-actor context under <xref target="carry-prior-actor-context">Carry Prior-Actor Context</xref>.  Security policies that rely on inner actor identities for access control are deployment-specific and generally lower-assurance than policies based on <tt>sub</tt> and the outermost <tt>act.sub</tt>.</t>
        <t>When a token crosses organizational boundaries, the receiving AS or RS <bcp14>MUST</bcp14> apply appropriate trust evaluation.  ASes performing Token Exchange <bcp14>MUST</bcp14> evaluate cross-domain delegation grants explicitly and <bcp14>SHOULD NOT</bcp14> grant cross-domain actors the same rights as same-domain actors absent an explicit trust decision that makes them equivalent.</t>
      </section>
      <section anchor="security-self-issued-grants">
        <name>Self-Issued Authorization Grants</name>
        <t>This section addresses self-issued JWT <em>authorization grants</em> (<xref target="jwt-assertion-grants">JWT Assertion Grants</xref>); it does not apply to RFC 7523 client assertions used as <tt>actor_token</tt> (<xref target="jwt-client-assertion-as-actor-token">JWT Client Assertion</xref>), where <tt>iss = sub = client_id</tt> is the conformant pattern defined by <xref target="RFC7523"/>.</t>
        <t>In a self-issued assertion grant, the acting entity is itself the JWT <tt>iss</tt> and directly asserts delegation to itself without any upstream AS having authenticated the actor or pre-validated the delegation relationship.  Self-issued authorization grants are outside the interoperable scope of this document and <bcp14>MUST</bcp14> be rejected by default (<xref target="jwt-assertion-grants-structure">JWT Assertion Grant Structure</xref>).  This section specifies the security controls that a deployment <bcp14>MUST</bcp14> independently establish when another specification or local policy explicitly enables self-issued authorization grant acceptance.</t>
        <t>Because no upstream AS vouches for the actor's identity or the delegation relationship, the receiving AS <bcp14>MUST NOT</bcp14> treat the self-asserted delegation claim alone as a sufficient authorization basis.  When a deployment enables self-issued authorization grants, the receiving AS <bcp14>MUST</bcp14> at minimum:</t>
        <ul spacing="normal">
          <li>
            <t>Validate the JWT signature using the key identified in the JWT header, obtained from a pre-registered or otherwise independently trusted source for the self-issuing party.</t>
          </li>
          <li>
            <t>Verify the <tt>exp</tt>, <tt>iat</tt>, and <tt>nbf</tt> claims per <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Reject assertions whose <tt>jti</tt> has already been accepted within the assertion's validity window to prevent replay.</t>
          </li>
          <li>
            <t>Verify proof of possession per the token-endpoint mechanism in use (DPoP per <xref target="RFC9449"/> or mTLS per <xref target="RFC8705"/>).</t>
          </li>
          <li>
            <t>Apply the actor-profile validation and proof-of-possession requirements in <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>.</t>
          </li>
          <li>
            <t>Establish the delegation relationship from an independent authorization basis such as a pre-registered grant, explicit consent record, or equivalent deployment-specific artifact.</t>
          </li>
        </ul>
        <t>In the absence of these controls, an attacker can self-assert an arbitrary (<tt>sub</tt>, <tt>act.sub</tt>) pair and bypass actor-profile authorization enforcement.  Deployments <bcp14>MUST</bcp14> confine self-issued authorization grants to within a single trust domain and <bcp14>MUST NOT</bcp14> propagate them across organizational boundaries.  This document defines no discovery or negotiation mechanism for self-issued authorization grant acceptance; any such mechanism is the responsibility of the enabling specification or local policy.</t>
      </section>
      <section anchor="security-assertion-replay">
        <name>Assertion Replay Prevention</name>
        <t>JWT assertion grants carrying <tt>act</tt> are higher-value replay targets than plain JWT assertions because a successful replay can establish an unauthorized delegation chain.  <xref target="RFC7523"/> recommends <tt>jti</tt> replay prevention as a <bcp14>SHOULD</bcp14>; this profile strengthens that requirement for non-sender-constrained grants as described in <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>.  Deployments that do not apply sender constraint <bcp14>MUST</bcp14> maintain a <tt>jti</tt> replay cache for the duration of each assertion's validity window.  Short assertion lifetimes (on the order of minutes) bound the required cache retention period.  Deployments using DPoP or mTLS sender constraint benefit from proof-of-possession as primary replay resistance; <tt>jti</tt> replay prevention remains <bcp14>RECOMMENDED</bcp14> as defense-in-depth for those paths.</t>
      </section>
      <section anchor="token-substitution">
        <name>Token Substitution</name>
        <t>An attacker who can present a token with a crafted <tt>sub_profile</tt> or delegation chain could attempt to escalate privileges.  ASes <bcp14>MUST</bcp14> validate inbound <tt>sub_profile</tt> values against the syntax requirements of this document, the applicable registry or deployment-specific allowed set where such checks are part of local policy, and the local policy applicable to the token they are issuing.  They <bcp14>MUST</bcp14> preserve unrecognized but syntactically valid values as required by <xref target="actor-object-structure">Actor Object Structure</xref>, and they <bcp14>MUST</bcp14> reject values that are malformed or disallowed by local policy.</t>
      </section>
      <section anchor="confused-deputy">
        <name>Confused Deputy</name>
        <t>A resource server that evaluates only the subject principal when an <tt>act</tt> claim is present is susceptible to a confused deputy attack: a malicious actor exploits a subject's pre-existing permissions without the subject's ongoing consent simply by presenting a token that names the subject in <tt>sub</tt>.  The mitigation is authorization of the (<tt>sub</tt>, outermost <tt>act.sub</tt>) pair before granting access.  Resource servers <bcp14>SHOULD</bcp14> implement such evaluation for delegated tokens under this document.</t>
      </section>
      <section anchor="actor-authorization-bypass">
        <name>Actor-Authorization Bypass</name>
        <t>A resource server that accepts delegated tokens but fails to enforce the (<tt>sub</tt>, outermost <tt>act.sub</tt>) relationship required by its local policy allows an attacker to bypass that policy by exploiting gaps in enforcement logic.  Resource servers that require actor authorization <bcp14>SHOULD</bcp14> apply that evaluation on every request path where delegated access is accepted, including introspection-based validation paths when used.  Deployments that signal delegated-token requirements with <tt>actor_profile_required: true</tt> <bcp14>SHOULD</bcp14> ensure that the documented request paths requiring delegated access are aligned with their actual enforcement behavior so that clients do not over-read the signal.</t>
      </section>
      <section anchor="client-identity-delegation">
        <name>Client Identity and Delegation</name>
        <t>Client identity, such as <tt>client_id</tt>, <tt>azp</tt>, or authenticated client context, is widely used in deployed systems as an authorization input.  Under this document, those values remain auxiliary client-identity signals, while the outermost <tt>act.sub</tt> is the explicit delegated-actor signal when present.  The following normative rules apply:</t>
        <ul spacing="normal">
          <li>
            <t>When <tt>act</tt> is present, interoperable processing <bcp14>SHOULD</bcp14> use it as the explicit delegated-actor signal rather than substituting <tt>client_id</tt>, <tt>azp</tt>, or other client-identity signals.  Deployments that rely on such substitution are outside the interoperable scope of this profile.</t>
          </li>
          <li>
            <t>When a single <tt>client_id</tt> registration fronts multiple distinct acting entities (for example, an agent orchestration platform executing requests on behalf of different agent instances), <tt>client_id</tt> alone does not identify the runtime actor.  Each such request <bcp14>SHOULD</bcp14> carry <tt>act.sub</tt> identifying the specific acting principal.</t>
          </li>
          <li>
            <t>During token issuance, <tt>client_id</tt> and <tt>azp</tt> <bcp14>MUST NOT</bcp14> be rewritten to represent delegation state that belongs in <tt>act</tt>; see <xref target="jwt-access-token-propagation">JWT Access Token Output</xref> for propagation rules.</t>
          </li>
          <li>
            <t>When both explicit (<tt>act.sub</tt>) and implicit (<tt>client_id</tt>, <tt>azp</tt>) signals are present and local policy expects them to identify the same party, implementations <bcp14>SHOULD</bcp14> apply trusted local mapping rules and either reconcile the identifiers or treat them as distinct according to local policy.</t>
          </li>
          <li>
            <t>When a protected resource or authorization path enforces explicit delegation under this profile, implementations <bcp14>MUST NOT</bcp14> downgrade to non-<tt>act</tt> processing solely because another token-acquisition path or legacy policy input remains available.</t>
          </li>
        </ul>
        <t>The detailed migration rules and transition patterns are defined in <xref target="migration-implicit-explicit">Migrating from Implicit to Explicit Delegation</xref>.</t>
      </section>
      <section anchor="subprofile-trust">
        <name><tt>sub_profile</tt> Trust</name>
        <t>The <tt>sub_profile</tt> claim is asserted by the token issuer and is only as trustworthy as that issuer.  Resource servers <bcp14>MUST NOT</bcp14> trust <tt>sub_profile</tt> values in tokens issued by untrusted parties.  Resource server operators <bcp14>SHOULD</bcp14> configure a list of accepted entity-type profiles per trust domain.</t>
      </section>
      <section anchor="subject-namespace-translation">
        <name>Subject Namespace Translation</name>
        <t>Federated deployments sometimes need to re-express <tt>sub</tt> when a token crosses a trust-domain boundary and the issuer uses a different subject-identifier namespace.  This document therefore permits an AS or TTS to translate <tt>sub</tt> only to re-express the same underlying subject in a different namespace, as described in <xref target="jwt-access-token-propagation">JWT Access Token Output</xref> and <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>.</t>
        <t>This document does not define an interoperable mechanism for proving, conveying, or independently verifying subject equivalence across namespaces.  A translated <tt>sub</tt> is therefore authoritative only within the trust context of the issuer that performed the translation.  It does not, by itself, create portable proof that the original and translated identifiers are equivalent, and it does not define a general cross-token correlation mechanism across trust domains.</t>
        <t>Subject-namespace translation is a high-assurance operation.  An issuer <bcp14>MUST NOT</bcp14> translate <tt>sub</tt> unless local policy establishes that the original and translated identifiers refer to the same underlying subject.  Trust to perform that mapping is separate from trust to sign tokens and <bcp14>SHOULD</bcp14> be established explicitly.</t>
        <t>A receiving AS or RS that relies only on the issued token <bcp14>MAY</bcp14> evaluate the translated <tt>sub</tt> as the subject in the issuer's namespace.  A receiving AS or RS that needs proof that the translated subject is equivalent to an upstream subject <bcp14>MUST</bcp14> obtain additional evidence outside this profile, such as another specification, an identity-chain mechanism, or an explicit trust agreement.  If such proof is required and cannot be established, the AS or RS <bcp14>SHOULD</bcp14> reject the token rather than treat the translated <tt>sub</tt> as advisory.</t>
        <t>Deployments that need portable proof of subject equivalence across namespaces, or independently verifiable subject-mapping evidence, require another specification or companion profile; such a mechanism is outside the scope of this document.</t>
      </section>
      <section anchor="presenter-binding">
        <name>Presenter Binding</name>
        <t>Without top-level presenter proof of possession, a leaked token can be replayed by any party.</t>
        <ul spacing="normal">
          <li>
            <t>The RS <bcp14>SHOULD</bcp14> require the presenter-proof mechanism appropriate to the token type and deployment for the top-level <tt>cnf.jkt</tt> or other top-level confirmation information.  For example, JWT access tokens commonly use DPoP or mTLS, while Transaction Tokens can use the workload proof mechanism defined by their deployment profile.</t>
          </li>
          <li>
            <t>Deployments that use sender-constrained tokens for delegated access <bcp14>SHOULD</bcp14> apply that protection to the current presenter to reduce delegation-token theft risk.</t>
          </li>
        </ul>
        <t>This document does not define per-hop actor-key provenance within the delegation chain.  Deployments that need stronger assurance for prior-hop provenance <bcp14>MUST</bcp14> use an additional mechanism outside the scope of this document, such as signed hop receipts, transparency-log-based recording, or another future extension; they <bcp14>MUST NOT</bcp14> overload <tt>act.iss</tt> or redefine nested <tt>act</tt> semantics to carry that provenance.  Companion profiles that supply such mechanisms <bcp14>MUST</bcp14> follow <xref target="companion-profile-extensibility">Companion Profiles and Extension Points</xref>.</t>
      </section>
      <section anchor="delegation-depth-limits">
        <name>Delegation Depth Limits</name>
        <t>Unbounded delegation chains increase attack surface and complicate policy evaluation.  Depth support and interoperability requirements are defined in <xref target="delegation-chains">Delegation Chains</xref>.  Implementations that encounter chains exceeding their configured local maximum <bcp14>MUST</bcp14> reject the token to prevent denial-of-service through chain parsing.</t>
      </section>
      <section anchor="actor-identity-rotation">
        <name>Actor Identity Rotation</name>
        <t>The canonical actor identifier under this profile is the (<tt>act.iss</tt>, <tt>act.sub</tt>) pair.  Deployments <bcp14>SHOULD</bcp14> choose <tt>act.sub</tt> to be a durable, stable identifier independent of ephemeral key material.  In particular, deployments <bcp14>SHOULD NOT</bcp14> use a JWK thumbprint or other key-derived value as <tt>act.sub</tt>; doing so silently changes the actor identity on every key rotation, which can break delegation grants and policy bindings that reference the prior identifier.  Key rotation (replacing the DPoP key or mTLS certificate bound to an actor) does not require changing <tt>act.sub</tt> when the identifier is key-independent.</t>
        <t>When <tt>act.sub</tt> itself must change (for example, because an agent instance is replaced, a workload is renamed, or an actor identifier namespace migrates), existing delegation grants and issued tokens continue to reference the old identifier.  Deployments <bcp14>MUST</bcp14> explicitly re-establish delegation grants for the new identity; the old grants do not automatically transfer.  Outstanding tokens issued under the old identity remain valid until their <tt>exp</tt> time; short token lifetimes bound the exposure window during the transition.</t>
      </section>
      <section anchor="delegation-revocation">
        <name>Delegation Revocation</name>
        <t>The revocation-related requirements in this section are limited to how this profile interacts with already-issued tokens and refresh behavior.</t>
        <t>Token revocation (<xref target="RFC7009"/>) applies to individual tokens but does not revoke an underlying delegation relationship or invalidate already-issued downstream tokens in a delegation chain.  When Alice revokes her delegation to an agent, access tokens already issued to downstream actors remain valid until their <tt>exp</tt> time.  Short token lifetimes are the primary mitigation; see <xref target="RFC9700"/> for general access token lifetime guidance.</t>
        <t>The AS <bcp14>SHOULD</bcp14> refuse to issue new tokens for a (subject, actor) pair when it has authoritative knowledge that the delegation relationship has been revoked.  Implementations <bcp14>MUST NOT</bcp14> use delegation chain depth as a rationale for skipping revocation checks.</t>
        <t>When a deployment uses long-lived delegated refresh behavior, revocation of the delegation relationship may take effect later than it would in a model that requires re-presentation of a current upstream delegation artifact at each token request.  This document does not standardize refresh-token revocation or revalidation policy; deployments should account for that tradeoff explicitly.</t>
        <t>The internal mechanism by which an AS tracks delegation state (whether a formal registry, a consent store, a policy engine, or another form) is a deployment and product decision outside the scope of this document.  Resource servers in security-sensitive deployments may use token introspection (<xref target="RFC7662"/>, <xref target="token-introspection">Token Introspection</xref>) when request-time revocation state is needed, or may rely on short token lifetimes; the choice of revocation strategy is deployment-specific.</t>
      </section>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>Delegation chains can reveal sensitive information about user behavior, enterprise topology, software suppliers, and internal tool composition. Issuers therefore <bcp14>SHOULD</bcp14> disclose only the actor information needed by the relying party for authorization, audit, or policy enforcement.</t>
      <t>Cross-domain deployments <bcp14>SHOULD</bcp14> prefer stable but non-reassigned identifiers and <bcp14>SHOULD</bcp14> consider pairwise identifiers for human subjects when a globally correlatable identifier is not required by the use case.</t>
      <t>When the same logical entity can appear in different identifier namespaces, such as <tt>azp</tt>, <tt>req_wl</tt>, and <tt>act.sub</tt>, issuers and relying parties <bcp14>SHOULD</bcp14> use explicit issuer scoping and locally trusted mapping rules rather than string equality alone to determine whether those identifiers refer to the same entity.</t>
      <t>Issuers <bcp14>SHOULD</bcp14> minimize disclosure of prior actors by audience and token-design decisions made before issuance.  Once an issuer chooses to preserve a delegation chain in a token under this profile, it <bcp14>SHOULD</bcp14> preserve the validated chain intact for that token.  If local privacy requirements would require omitting a chain element that would otherwise be security-relevant to the recipient's evaluation, the issuer <bcp14>SHOULD</bcp14> reject the request rather than silently truncating the chain.</t>
      <t>The <tt>txn</tt> claim in Transaction Tokens (<xref target="I-D.ietf-oauth-transaction-tokens"/>) is a stable, globally unique identifier shared across all tokens in a single business transaction.  When Transaction Tokens cross organizational boundaries, <tt>txn</tt> enables cross-domain correlation of all service calls within a transaction by any party that observes multiple tokens.  Cross-domain propagation and lifetime rules for <tt>txn</tt> are governed by <xref target="I-D.ietf-oauth-transaction-tokens"/>; deployments <bcp14>SHOULD</bcp14> consult that specification's privacy guidance when propagating Transaction Tokens across trust-domain boundaries.  This document notes that <tt>txn</tt> values, like other stable identifiers, should be treated as sensitive in contexts where cross-domain correlation of user activity is not required or authorized.</t>
      <t>The <tt>act.sub_profile</tt> claim discloses the entity type of the actor, including values such as <tt>ai_agent</tt> that reveal that a request is being made by an automated agent on behalf of the subject.  In some jurisdictions or deployment contexts, this disclosure may be legally significant or may reveal sensitive information about user behavior and tool composition that should not flow across trust-domain boundaries.  Issuers <bcp14>SHOULD</bcp14> consider audience-specific disclosure constraints when including <tt>act.sub_profile</tt> in cross-domain tokens, and <bcp14>SHOULD</bcp14> omit or suppress actor entity-type values when the recipient does not require them for authorization, audit, or policy enforcement.</t>
      <t>The <tt>req_wl</tt> claim in Transaction Tokens can also expose sensitive information about internal workload topology and service composition.  Transaction Token Services <bcp14>SHOULD</bcp14> disclose <tt>req_wl</tt> only to relying parties that need that information for authorization, audit, or policy enforcement, and <bcp14>SHOULD</bcp14> avoid propagating internal-only workload identifiers across trust-domain boundaries unless such disclosure is explicitly required by the deployment.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="iana-oauth-uri">
        <name>OAuth URI Registration</name>
        <t>This document requests IANA to register the following value in the "OAuth URI" registry:</t>
        <ul spacing="normal">
          <li>
            <t>URN: <tt>urn:ietf:params:oauth:grant-profile:actor-profile</tt></t>
          </li>
          <li>
            <t>Common Name: OAuth Actor Profile for Delegation</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="authorization-server-metadata">Authorization Server Metadata</xref> of this document</t>
          </li>
        </ul>
      </section>
      <section anchor="oauth-authorization-server-metadata-registry">
        <name>OAuth Authorization Server Metadata Registry</name>
        <t>This document requests IANA to register the following values in the "OAuth Authorization Server Metadata" registry (<xref target="RFC8414"/>):</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: <tt>actor_profile_token_exchange</tt></t>
          </li>
          <li>
            <t>Metadata Description: JSON object advertising coarse Token Exchange capabilities for requests in which actor-profile processing can apply</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="authorization-server-metadata">Authorization Server Metadata</xref> of this document</t>
          </li>
        </ul>
      </section>
      <section anchor="oauth-protected-resource-metadata-registry">
        <name>OAuth Protected Resource Metadata Registry</name>
        <t>This document requests IANA to register the following values in the "OAuth Protected Resource Metadata" registry (<xref target="RFC9728"/>):</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: <tt>actor_profile_required</tt></t>
          </li>
          <li>
            <t>Metadata Description: Boolean indicating whether the RS advertises that delegated requests for this resource are expected to provide actor-profile information conforming to this document's semantics</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="protected-resource-metadata">Protected Resource Metadata</xref> of this document</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-error-codes">
        <name>OAuth Error Registry</name>
        <t>This document requests IANA to register the following value in the "OAuth Extensions Error Registry" (<xref section="11.4" sectionFormat="comma" target="RFC6749"/>):</t>
        <ul spacing="normal">
          <li>
            <t>Error Name: <tt>actor_unauthorized</tt></t>
          </li>
          <li>
            <t>Error Usage Location: Token endpoint response, resource server response</t>
          </li>
          <li>
            <t>Related Protocol Extension: OAuth Actor Profile for Delegation</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="actor-profile-error-responses">Error Responses</xref> of this document</t>
          </li>
        </ul>
      </section>
      <section anchor="oauth-token-introspection-response-registry">
        <name>OAuth Token Introspection Response Registry</name>
        <t>This document requests IANA to register the following value in the "OAuth Token Introspection Response" registry (<xref section="3.3" sectionFormat="comma" target="RFC7662"/>):</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>chain_complete</tt></t>
          </li>
          <li>
            <t>Claim Description: Boolean indicating whether the <tt>act</tt> delegation chain in the introspection response is complete.  When <tt>false</tt>, one or more inner <tt>act</tt> chain entries have been omitted from the response for privacy reasons.  When absent, the chain <bcp14>SHOULD</bcp14> be treated as complete unless local policy or deployment context indicates otherwise.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="token-introspection">Token Introspection</xref> of this document</t>
          </li>
        </ul>
      </section>
      <section anchor="jwt-claims-registry">
        <name>JWT Claims Registry</name>
        <t>This document does not request independent JWT Claims Registry entries for the <tt>act</tt> object sub-claims (<tt>iss</tt>, <tt>sub_profile</tt>, and any extension claims) it defines or profiles.  These values appear only within the JSON object value of the <tt>act</tt> claim, which is already registered in the JWT Claims Registry by <xref target="RFC8693"/>.  Sub-object keys within a registered claim are scoped to that claim's JSON object and do not require separate top-level registry entries.</t>
      </section>
      <section anchor="iana-token-types">
        <name>OAuth Token Type Registry</name>
        <t>This document makes no independent requests to the "OAuth Token Type" registry for <tt>urn:ietf:params:oauth:token-type:txn_token</tt>.  That URI is defined and registered by <xref target="I-D.ietf-oauth-transaction-tokens"/>.  Its inclusion as a defined value for <tt>actor_profile_token_exchange.requested_token_types_supported</tt> in <xref target="authorization-server-metadata">Authorization Server Metadata</xref> is contingent on the progression of <xref target="I-D.ietf-oauth-transaction-tokens"/>.</t>
      </section>
      <section anchor="iana-entity-profiles">
        <name>OAuth Entity Profiles Registry</name>
        <t>This document makes no independent requests to the "OAuth Entity Profiles" registry.  It normatively depends on the "Actor Profile" usage location, the <tt>actor</tt> array in <tt>entity_profiles_supported</tt>, and the registration of <tt>user</tt>, <tt>service</tt>, and <tt>ai_agent</tt> with that usage location, all of which are defined and requested by <xref target="I-D.mora-oauth-entity-profiles"/>.  The IANA actions for those entries are contingent on the progression of <xref target="I-D.mora-oauth-entity-profiles"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6750" target="https://www.rfc-editor.org/info/rfc6750" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6750.xml">
          <front>
            <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6750"/>
          <seriesInfo name="DOI" value="10.17487/RFC6750"/>
        </reference>
        <reference anchor="RFC7009" target="https://www.rfc-editor.org/info/rfc7009" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7009.xml">
          <front>
            <title>OAuth 2.0 Token Revocation</title>
            <author fullname="T. Lodderstedt" initials="T." role="editor" surname="Lodderstedt"/>
            <author fullname="S. Dronia" initials="S." surname="Dronia"/>
            <author fullname="M. Scurtescu" initials="M." surname="Scurtescu"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document proposes an additional endpoint for OAuth authorization servers, which allows clients to notify the authorization server that a previously obtained refresh or access token is no longer needed. This allows the authorization server to clean up security credentials. A revocation request will invalidate the actual token and, if applicable, other tokens based on the same authorization grant.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7009"/>
          <seriesInfo name="DOI" value="10.17487/RFC7009"/>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7519.xml">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7517" target="https://www.rfc-editor.org/info/rfc7517" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7517.xml">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC7521" target="https://www.rfc-editor.org/info/rfc7521" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7521.xml">
          <front>
            <title>Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="Y. Goland" initials="Y." surname="Goland"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification provides a framework for the use of assertions with OAuth 2.0 in the form of a new client authentication mechanism and a new authorization grant type. Mechanisms are specified for transporting assertions during interactions with a token endpoint; general processing rules are also specified.</t>
              <t>The intent of this specification is to provide a common framework for OAuth 2.0 to interwork with other identity systems using assertions and to provide alternative client authentication mechanisms.</t>
              <t>Note that this specification only defines abstract message flows and processing rules. In order to be implementable, companion specifications are necessary to provide the corresponding concrete instantiations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7521"/>
          <seriesInfo name="DOI" value="10.17487/RFC7521"/>
        </reference>
        <reference anchor="RFC7523" target="https://www.rfc-editor.org/info/rfc7523" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7523.xml">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7523"/>
          <seriesInfo name="DOI" value="10.17487/RFC7523"/>
        </reference>
        <reference anchor="RFC8705" target="https://www.rfc-editor.org/info/rfc8705" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8705.xml">
          <front>
            <title>OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes OAuth client authentication and certificate-bound access and refresh tokens using mutual Transport Layer Security (TLS) authentication with X.509 certificates. OAuth clients are provided a mechanism for authentication to the authorization server using mutual TLS, based on either self-signed certificates or public key infrastructure (PKI). OAuth authorization servers are provided a mechanism for binding access tokens to a client's mutual-TLS certificate, and OAuth protected resources are provided a method for ensuring that such an access token presented to it was issued to the client presenting the token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8705"/>
          <seriesInfo name="DOI" value="10.17487/RFC8705"/>
        </reference>
        <reference anchor="RFC7662" target="https://www.rfc-editor.org/info/rfc7662" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7662.xml">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800" target="https://www.rfc-editor.org/info/rfc7800" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7800.xml">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8414" target="https://www.rfc-editor.org/info/rfc8414" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8414.xml">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC9728" target="https://www.rfc-editor.org/info/rfc9728" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9728.xml">
          <front>
            <title>OAuth 2.0 Protected Resource Metadata</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <author fullname="A. Parecki" initials="A." surname="Parecki"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client or authorization server can use to obtain the information needed to interact with an OAuth 2.0 protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9728"/>
          <seriesInfo name="DOI" value="10.17487/RFC9728"/>
        </reference>
        <reference anchor="RFC8693" target="https://www.rfc-editor.org/info/rfc8693" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8693.xml">
          <front>
            <title>OAuth 2.0 Token Exchange</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
            <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8693"/>
          <seriesInfo name="DOI" value="10.17487/RFC8693"/>
        </reference>
        <reference anchor="RFC9068" target="https://www.rfc-editor.org/info/rfc9068" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9068.xml">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens</title>
            <author fullname="V. Bertocci" initials="V." surname="Bertocci"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>This specification defines a profile for issuing OAuth 2.0 access tokens in JSON Web Token (JWT) format. Authorization servers and resource servers from different vendors can leverage this profile to issue and consume access tokens in an interoperable manner.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9068"/>
          <seriesInfo name="DOI" value="10.17487/RFC9068"/>
        </reference>
        <reference anchor="RFC8707" target="https://www.rfc-editor.org/info/rfc8707" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8707.xml">
          <front>
            <title>Resource Indicators for OAuth 2.0</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document specifies an extension to the OAuth 2.0 Authorization Framework defining request parameters that enable a client to explicitly signal to an authorization server about the identity of the protected resource(s) to which it is requesting access.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8707"/>
          <seriesInfo name="DOI" value="10.17487/RFC8707"/>
        </reference>
        <reference anchor="RFC9449" target="https://www.rfc-editor.org/info/rfc9449" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9449.xml">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-transaction-tokens" target="https://datatracker.ietf.org/doc/html/draft-ietf-oauth-transaction-tokens-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-oauth-transaction-tokens.xml">
          <front>
            <title>Transaction Tokens</title>
            <author fullname="Atul Tulshibagwale" initials="A." surname="Tulshibagwale">
              <organization>CrowdStrike</organization>
            </author>
            <author fullname="George Fletcher" initials="G." surname="Fletcher">
              <organization>Practical Identity LLC</organization>
            </author>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>Defakto Security</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>Transaction Tokens (Txn-Tokens) are designed to maintain and propagate user identity, workload identity and authorization context throughout the Call Chain within a trusted domain during the processing of external requests (e.g. such as API calls) or requests initiated internally within the trust domain. Txn-Tokens ensure that this context is preserved throughout the Call Chain thereby enhancing security and consistency in complex, multi-service architectures.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-transaction-tokens-08"/>
        </reference>
        <reference anchor="I-D.ietf-wimse-workload-creds" target="https://datatracker.ietf.org/doc/html/draft-ietf-wimse-workload-creds-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-wimse-workload-creds.xml">
          <front>
            <title>WIMSE Workload Credentials</title>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>Defakto Security</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="3" month="November" year="2025"/>
            <abstract>
              <t>The WIMSE architecture defines authentication and authorization for software workloads in a variety of runtime environments, from the most basic ones up to complex multi-service, multi-cloud, multi- tenant deployments. This document defines the credentials that workloads use to represent their identity. They can be used in various protocols to authenticate workloads to each other. To use these credentials, workloads must provide proof of possession of the associated private key material, which is covered in other documents. This document focuses on the credentials alone, independent of the proof-of- possession mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-workload-creds-00"/>
        </reference>
        <reference anchor="I-D.ietf-wimse-wpt" target="https://datatracker.ietf.org/doc/html/draft-ietf-wimse-wpt-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-wimse-wpt.xml">
          <front>
            <title>WIMSE Workload Proof Token</title>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>Defakto Security</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>The WIMSE architecture defines authentication and authorization for software workloads in a variety of runtime environments, from basic deployments to complex multi-service, multi-cloud, multi-tenant systems. This document specifies the Workload Proof Token (WPT), a mechanism for workloads to prove possession of the private key associated with a Workload Identity Token (WIT). The WPT is a signed JWT that binds the workload's authentication to a specific HTTP request, providing application-level proof of possession for workload-to-workload communication. This specification is designed to work alongside the WIT credential format defined in draft-ietf- wimse-workload-creds and can be combined with other WIMSE protocols in multi-hop call chains.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-wpt-01"/>
        </reference>
        <reference anchor="I-D.mora-oauth-entity-profiles" target="https://www.ietf.org/archive/id/draft-mora-oauth-entity-profiles-01.txt">
          <front>
            <title>OAuth Entity Profiles</title>
            <author fullname="Sreyantha Chary Mora">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Pamela Dingle">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Karl McGuinness">
              <organization>Independent</organization>
            </author>
            <date year="2026" month="April" day="17"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9493" target="https://www.rfc-editor.org/info/rfc9493" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9493.xml">
          <front>
            <title>Subject Identifiers for Security Event Tokens</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="M. Scurtescu" initials="M." surname="Scurtescu"/>
            <author fullname="P. Jain" initials="P." surname="Jain"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>Security events communicated within Security Event Tokens may support a variety of identifiers to identify subjects related to the event. This specification formalizes the notion of Subject Identifiers as structured information that describes a subject and named formats that define the syntax and semantics for encoding Subject Identifiers as JSON objects. It also establishes a registry for defining and allocating names for such formats as well as the JSON Web Token (JWT) "sub_id" Claim.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9493"/>
          <seriesInfo name="DOI" value="10.17487/RFC9493"/>
        </reference>
        <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6749.xml">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC9700" target="https://www.rfc-editor.org/info/rfc9700" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9700.xml">
          <front>
            <title>Best Current Practice for OAuth 2.0 Security</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="A. Labunets" initials="A." surname="Labunets"/>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <date month="January" year="2025"/>
            <abstract>
              <t>This document describes best current security practice for OAuth 2.0. It updates and extends the threat model and security advice given in RFCs 6749, 6750, and 6819 to incorporate practical experiences gathered since OAuth 2.0 was published and covers new threats relevant due to the broader application of OAuth 2.0. Further, it deprecates some modes of operation that are deemed less secure or even insecure.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="240"/>
          <seriesInfo name="RFC" value="9700"/>
          <seriesInfo name="DOI" value="10.17487/RFC9700"/>
        </reference>
        <reference anchor="I-D.parecki-oauth-jwt-dpop-grant" target="https://datatracker.ietf.org/doc/html/draft-parecki-oauth-jwt-dpop-grant-01">
          <front>
            <title>JWT Authorization Grants with DPoP</title>
            <author fullname="Aaron Parecki">
              <organization>Okta</organization>
            </author>
            <date year="2026" month="January" day="30"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-oauth-identity-chaining" target="https://datatracker.ietf.org/doc/html/draft-ietf-oauth-identity-chaining-10" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-oauth-identity-chaining.xml">
          <front>
            <title>OAuth Identity and Authorization Chaining Across Domains</title>
            <author fullname="Arndt Schwenkschuster"/>
            <author fullname="Pieter Kasselmann"/>
            <author fullname="Kelley Burgin"/>
            <author fullname="Mike Jenkins"/>
            <author fullname="Brian Campbell"/>
            <author fullname="Aaron Parecki"/>
            <date day="24" month="April" year="2026"/>
            <abstract>
              <t>This specification defines a mechanism to preserve identity and
   authorization information across trust domains that use the OAuth 2.0
   Framework.</t>
              <t>Discussion Venues</t>
              <t>This note is to be removed before publishing as an RFC.</t>
              <t>Discussion of this document takes place on the Web Authorization
   Protocol Working Group mailing list (oauth@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/oauth/.</t>
              <t>Source for this draft and an issue tracker can be found at
   https://github.com/oauth-wg/oauth-identity-chaining.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-identity-chaining-10"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-identity-assertion-authz-grant" target="https://www.ietf.org/archive/id/draft-ietf-oauth-identity-assertion-authz-grant-03.txt">
          <front>
            <title>Identity Assertion JWT Authorization Grant</title>
            <author fullname="Aaron Parecki">
              <organization>Okta</organization>
            </author>
            <author fullname="Karl McGuinness">
              <organization>Independent</organization>
            </author>
            <author fullname="Brian Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date year="2026" month="April" day="22"/>
          </front>
        </reference>
        <reference anchor="OpenID.Core" target="https://openid.net/specs/openid-connect-core-1_0.html">
          <front>
            <title>OpenID Connect Core 1.0</title>
            <author>
              <organization>OpenID Foundation</organization>
            </author>
            <date year="2014" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="OpenID.Federation" target="https://openid.net/specs/openid-federation-1_0.html">
          <front>
            <title>OpenID Federation 1.0</title>
            <author>
              <organization>OpenID Foundation</organization>
            </author>
            <date year="2024" month="May" day="01"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1752?>

<section anchor="appendix-service-to-service">
      <name>Service-to-Service Delegation Example</name>
      <t>This appendix gives a non-AI example of the actor profile in a same-domain service-to-service delegation flow.  A payroll batch processor acts on behalf of a human payroll administrator to call a payroll API; the payroll API then exchanges that access token for an internal Transaction Token used to write an audit record.</t>
      <section anchor="scenario">
        <name>Scenario</name>
        <table>
          <thead>
            <tr>
              <th align="left">Party</th>
              <th align="left">Identifier</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Payroll Administrator</td>
              <td align="left">
                <tt>https://idp.example.com/users/pat</tt></td>
            </tr>
            <tr>
              <td align="left">Enterprise AS</td>
              <td align="left">
                <tt>https://as.example.com</tt></td>
            </tr>
            <tr>
              <td align="left">Payroll Batch Processor</td>
              <td align="left">
                <tt>https://services.example.com/payroll-batch</tt></td>
            </tr>
            <tr>
              <td align="left">Payroll API</td>
              <td align="left">
                <tt>https://services.example.com/payroll-api</tt></td>
            </tr>
            <tr>
              <td align="left">Audit TTS</td>
              <td align="left">
                <tt>https://tts.example.com</tt></td>
            </tr>
            <tr>
              <td align="left">Audit Service</td>
              <td align="left">
                <tt>https://internal.example.com/audit</tt></td>
            </tr>
          </tbody>
        </table>
        <t>The batch processor is an OAuth client and also the acting service.  The client registration remains identified by <tt>client_id</tt>; the acting service is represented explicitly in <tt>act.sub</tt>.</t>
      </section>
      <section anchor="access-token">
        <name>Access Token</name>
        <t>The Enterprise AS issues a JWT access token for the Payroll API:</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "https://as.example.com",
  "sub": "https://idp.example.com/users/pat",
  "sub_profile": "user",
  "client_id": "payroll-batch-client",
  "aud": "https://services.example.com/payroll-api",
  "scope": "payroll:run",
  "cnf": { "jkt": "SvcJKT-123" },
  "act": {
    "sub": "https://services.example.com/payroll-batch",
    "iss": "https://as.example.com",
    "sub_profile": "service"
  }
}
]]></sourcecode>
        <t>This is a single-hop actor object: <tt>act</tt> is present, but it contains no nested <tt>act</tt>.  <tt>sub</tt> identifies the payroll administrator, while <tt>act.sub</tt> identifies the service exercising that administrator's authorization.</t>
      </section>
      <section anchor="transaction-token-1">
        <name>Transaction Token</name>
        <t>After processing the payroll request, the Payroll API exchanges the inbound access token at the Audit TTS to call the internal Audit Service.  The Payroll API is the requesting workload (<tt>req_wl</tt>).  The TTS validates the inbound delegation chain, preserves it as an inner <tt>act</tt>, and adds a new outermost actor for the Payroll API:</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "https://tts.example.com",
  "sub": "https://idp.example.com/users/pat",
  "sub_profile": "user",
  "req_wl": "https://services.example.com/payroll-api",
  "aud": "https://internal.example.com/audit",
  "scope": "audit:create",
  "txn": "550e8400-e29b-41d4-a716-446655440099",
  "cnf": { "jkt": "ApiJKT-456" },
  "act": {
    "sub": "https://services.example.com/payroll-api",
    "iss": "https://as.example.com",
    "sub_profile": "service",
    "act": {
      "sub": "https://services.example.com/payroll-batch",
      "iss": "https://as.example.com",
      "sub_profile": "service"
    }
  }
}
]]></sourcecode>
        <t>The subject remains the payroll administrator.  The new outermost actor is the Payroll API (the workload presenting the exchange request), and the preserved inner actor is the payroll batch processor.  This example demonstrates that the profile applies equally to non-AI service delegation and to transformations from a single-hop actor object into a multi-hop delegation chain.</t>
      </section>
    </section>
    <section anchor="appendix-cross-domain">
      <name>Cross-Domain AI Agent Flow: ID Token to Transaction Token</name>
      <t>This appendix traces a single user request across two trust domains, highlighting the actor-profile claim structures and processing requirements specific to this document.  Standard validation steps (JWT signature verification, sender-constrained access token proof, Transaction Token presenter proof, and Token Exchange mechanics) are delegated to the underlying token specifications and deployment profile.</t>
      <t>All claim values, JKT thumbprints, and domain names are synthetic.</t>
      <section anchor="scenario-and-parties">
        <name>Scenario and Parties</name>
        <t>Alice's travel-assistant agent authenticates to the Enterprise IdP AS to obtain an ID Token.  The agent then performs a Token Exchange at the same AS to obtain the ID-JAG.  The ID-JAG is then presented to the Travel Provider AS using the JWT bearer grant, as described in <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>.  The agent exchanges the ID-JAG for an access token at the Travel Provider AS and calls the Booking Tool API.  The Booking Tool exchanges the access token for a Transaction Token to call an internal inventory service.</t>
        <artwork><![CDATA[
Enterprise domain                 Travel Provider domain
────────────────────────────      ──────────────────────────────────────
Alice
  │ (1) authenticates
  ▼
Enterprise IdP AS ─► ID Token
  │ (2) Token Exchange (ID Token → ID-JAG)
  ▼
Enterprise IdP AS ─► ID-JAG
                       │ (3) JWT Bearer Grant (ID-JAG → AT)
                       └─────────────────► Travel Provider AS ─► AT
                                                                   │
                                            Travel Assistant ◄─────┘
                                                 │ (4) Access Token + DPoP
                                                 ▼
                                            Booking Tool API (RS)
                                                 │ (5) Token Exchange (AT → Transaction Token)
                                                 ▼
                                            Travel Provider TTS ─► Transaction Token
                                                 │ (6) Transaction Token + WIMSE proof
                                                 ▼
                                            Inventory Service (RS)
]]></artwork>
        <table>
          <thead>
            <tr>
              <th align="left">Party</th>
              <th align="left">Identifier</th>
              <th align="left">Trust Domain</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Alice</td>
              <td align="left">
                <tt>https://idp.enterprise.example/users/alice</tt></td>
              <td align="left">Enterprise</td>
            </tr>
            <tr>
              <td align="left">Enterprise IdP AS</td>
              <td align="left">
                <tt>https://as.enterprise.example</tt></td>
              <td align="left">Enterprise</td>
            </tr>
            <tr>
              <td align="left">Travel Assistant</td>
              <td align="left">
                <tt>https://agents.enterprise.example/travel-assistant</tt></td>
              <td align="left">Enterprise</td>
            </tr>
            <tr>
              <td align="left">Travel Provider AS</td>
              <td align="left">
                <tt>https://as.travel-provider.example</tt></td>
              <td align="left">Travel Provider</td>
            </tr>
            <tr>
              <td align="left">Travel Provider TTS</td>
              <td align="left">
                <tt>https://tts.travel-provider.example</tt></td>
              <td align="left">Travel Provider</td>
            </tr>
            <tr>
              <td align="left">Booking Tool</td>
              <td align="left">
                <tt>https://tools.travel-provider.example/booking-tool</tt></td>
              <td align="left">Travel Provider</td>
            </tr>
            <tr>
              <td align="left">Inventory Service</td>
              <td align="left">
                <tt>https://internal.travel-provider.example/inventory</tt></td>
              <td align="left">Travel Provider</td>
            </tr>
          </tbody>
        </table>
        <t>Presenter key bindings:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Principal</th>
              <th align="left">JWK Thumbprint (jkt)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Travel Assistant</td>
              <td align="left">
                <tt>AgentJKT-NzbLsXh8uDCcd7MN</tt></td>
            </tr>
            <tr>
              <td align="left">Booking Tool</td>
              <td align="left">
                <tt>ToolJKT-0ZcOCORZNYy9ZhHi</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="capability-discovery-preflight">
        <name>Capability Discovery (Preflight)</name>
        <t>The agent consults the Travel Provider AS metadata (<xref target="metadata-and-discovery">Metadata and Discovery</xref>) as an advisory compatibility check before initiating the flow:</t>
        <sourcecode type="json"><![CDATA[
{
  "issuer": "https://as.travel-provider.example",
  "grant_types_supported": [
    "urn:ietf:params:oauth:grant-type:jwt-bearer",
    "urn:ietf:params:oauth:grant-type:token-exchange"
  ],
  "authorization_grant_profiles_supported": [
    "urn:ietf:params:oauth:grant-profile:id-jag",
    "urn:ietf:params:oauth:grant-profile:actor-profile"
  ],
  "actor_profile_token_exchange": {
    "subject_token_types_supported": [
      "urn:ietf:params:oauth:token-type:jwt"
    ],
    "actor_token_types_supported": [
      "urn:ietf:params:oauth:token-type:jwt"
    ],
    "requested_token_types_supported": [
      "urn:ietf:params:oauth:token-type:access_token",
      "urn:ietf:params:oauth:token-type:txn_token"
    ]
  },
  "entity_profiles_supported": {
    "subject": ["user", "ai_agent"],
    "actor":   ["user", "ai_agent", "service"]
  }
}
]]></sourcecode>
        <t>The agent confirms that its <tt>sub_profile</tt> (<tt>ai_agent</tt>) is in <tt>entity_profiles_supported.actor</tt>, that ID-JAG and actor-profile grants are advertised in <tt>authorization_grant_profiles_supported</tt>, and that the planned input/output token types appear in <tt>actor_profile_token_exchange</tt>.  These signals are coarse compatibility indicators only; the agent proceeds because the advertised capabilities cover its planned path.</t>
      </section>
      <section anchor="step-1-user-authentication-id-token">
        <name>Step 1: User Authentication (ID Token)</name>
        <t>Alice authenticates to the Enterprise IdP AS, which issues an ID Token.  An ID Token implicitly identifies a user; the entity type is not carried in a <tt>sub_profile</tt> claim and is established by the AS in subsequent issued tokens (Step 2):</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "https://as.enterprise.example",
  "sub": "https://idp.enterprise.example/users/alice",
  "aud": "https://agents.enterprise.example/travel-assistant",
  "exp": 1743379200,
  "iat": 1743375600
}
]]></sourcecode>
      </section>
      <section anchor="step-2-enterprise-token-exchange-id-token-to-id-jag">
        <name>Step 2: Enterprise Token Exchange (ID Token to ID-JAG)</name>
        <t>The agent presents Alice's ID Token as <tt>subject_token</tt> in a Token Exchange request to the Enterprise IdP AS, requesting an ID-JAG (<xref target="I-D.ietf-oauth-identity-assertion-authz-grant"/>).  The agent's RFC 7523 client assertion serves as both <tt>client_assertion</tt> (for client authentication) and <tt>actor_token</tt> (for actor identity), per <xref target="jwt-client-assertion-as-actor-token">JWT Client Assertion</xref>.  The Enterprise IdP AS authenticates the client, verifies the ID Token audience matches that client, and uses local delegation policy to construct the issued ID-JAG:</t>
        <artwork><![CDATA[
POST /token HTTP/1.1
Host: as.enterprise.example
Content-Type: application/x-www-form-urlencoded
DPoP: <AgentJKT-proof>

grant_type=urn%3Aietf%3Aparams%3Aoauth%3Agrant-type%3Atoken-exchange
&subject_token=<alice-id-token>
&subject_token_type=urn%3Aietf%3Aparams%3Aoauth%3Atoken-type%3Aid_token
&requested_token_type=urn%3Aietf%3Aparams%3Aoauth%3Atoken-type%3Aid-jag
&audience=https%3A%2F%2Fas.travel-provider.example%2F
&resource=https%3A%2F%2Fas.travel-provider.example
&scope=booking%3Acreate
&client_id=https%3A%2F%2Fagents.enterprise.example%2Ftravel-assistant
&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer
&client_assertion=<travel-assistant-client-assertion>
&actor_token=<travel-assistant-client-assertion>
&actor_token_type=urn%3Aietf%3Aparams%3Aoauth%3Atoken-type%3Ajwt
]]></artwork>
        <t>The Enterprise IdP AS applies scope reduction and validates the client-bound proof-of-possession according to RFC 9449.  In this example, it binds the issued ID-JAG to the key demonstrated in the DPoP proof, validates the shared JWT under both the client-authentication and <tt>actor_token</tt> rules for RFC 7523 client assertions, determines from local policy that the authenticated client is the delegated actor for Alice in this flow, and issues the ID-JAG as a JWT output of Token Exchange with the delegation chain established per <xref target="actor-profile">Actor Profile for Delegation</xref>:</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "https://as.enterprise.example",
  "sub": "https://idp.enterprise.example/users/alice",
  "sub_profile": "user",
  "client_id": "https://agents.enterprise.example/travel-assistant",
  "azp": "https://agents.enterprise.example/travel-assistant",
  "aud": "https://as.travel-provider.example/token",
  "jti": "ent-idj-20260401-001",
  "exp": 1743379200,
  "iat": 1743375600,
  "scope": "booking:create",
  "cnf": { "jkt": "AgentJKT-NzbLsXh8uDCcd7MN" },
  "act": {
    "sub": "https://agents.enterprise.example/travel-assistant",
    "iss": "https://as.enterprise.example",
    "sub_profile": "ai_agent"
  }
}
]]></sourcecode>
        <t>The <tt>act</tt> object records the agent as the authorized actor.  The <tt>client_id</tt> and <tt>azp</tt> values identify the OAuth client used in the exchange, while <tt>act.sub</tt> identifies the delegated actor.  In this example those identifiers are the same URI, so the shared RFC 7523 client assertion and <tt>actor_token</tt> remain conformant with <xref target="RFC7523"/> while still making the actor explicit in the issued token.  The top-level <tt>cnf.jkt</tt> is set to <tt>AgentJKT</tt> because the agent is the current presenter at this stage.</t>
      </section>
      <section anchor="step-3-agent-exchanges-id-jag-for-access-token-at-travel-provider-as">
        <name>Step 3: Agent Exchanges ID-JAG for Access Token at Travel Provider AS</name>
        <t>The agent presents the ID-JAG as a JWT Bearer authorization grant (<xref target="RFC7523"/>) to the Travel Provider AS, which processes it as an ID-JAG per <xref target="I-D.ietf-oauth-identity-assertion-authz-grant"/> with the actor-profile rules in <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>:</t>
        <artwork><![CDATA[
POST /token HTTP/1.1
Host: as.travel-provider.example
Content-Type: application/x-www-form-urlencoded
DPoP: <AgentJKT-proof>

grant_type=urn%3Aietf%3Aparams%3Aoauth%3Agrant-type%3Ajwt-bearer
&assertion=<id-jag>
&scope=booking%3Acreate
]]></artwork>
        <t>The Travel Provider AS performs actor-profile processing per <xref target="jwt-assertion-grants-processing">Authorization Grant Processing</xref>: it verifies the request's DPoP proof against the top-level <tt>cnf.jkt</tt> in the inbound ID-JAG and checks that <tt>act.sub_profile</tt> (<tt>ai_agent</tt>) is permitted as an actor for the requested scope under local policy.  It issues an access token preserving the delegation chain:</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "https://as.travel-provider.example",
  "sub": "https://idp.enterprise.example/users/alice",
  "sub_profile": "user",
  "client_id": "https://agents.enterprise.example/travel-assistant",
  "azp": "https://agents.enterprise.example/travel-assistant",
  "aud": "https://api.travel-provider.example",
  "jti": "tp-at-20260401-001",
  "exp": 1743379200,
  "iat": 1743375600,
  "scope": "booking:create",
  "cnf": { "jkt": "AgentJKT-NzbLsXh8uDCcd7MN" },
  "act": {
    "sub": "https://agents.enterprise.example/travel-assistant",
    "iss": "https://as.enterprise.example",
    "sub_profile": "ai_agent"
  }
}
]]></sourcecode>
        <t>Alice's <tt>sub</tt> and <tt>sub_profile</tt> are preserved verbatim from the ID-JAG (<xref target="jwt-access-token-propagation">JWT Access Token Output</xref>).  The Travel Provider AS does not translate or substitute the enterprise subject identifier.  The <tt>client_id</tt> and <tt>azp</tt> values reflect the OAuth client identity from the request context (the same agent URI appears in both the inbound ID-JAG and the outbound access token because the agent is both the asserting client and the actor in this flow), but they do not replace <tt>act.sub</tt> as the authoritative delegated-actor identifier.</t>
      </section>
      <section anchor="step-4-agent-calls-booking-tool-api">
        <name>Step 4: Agent Calls Booking Tool API</name>
        <t>The agent presents the access token with a DPoP proof:</t>
        <artwork><![CDATA[
POST /bookings HTTP/1.1
Host: api.travel-provider.example
Authorization: DPoP <tp-access-token>
DPoP: <AgentJKT-proof>
Content-Type: application/json

{"origin": "SFO", "destination": "NYC", "depart": "2026-04-15"}
]]></artwork>
        <t>The Booking Tool RS applies authorization of the (<tt>sub</tt>, outermost <tt>act.sub</tt>) pair (<xref target="resource-server-processing">Resource Server Processing</xref>): it evaluates Alice (<tt>sub</tt>, <tt>sub_profile: user</tt>) together with the Travel Assistant (<tt>act.sub</tt>, <tt>sub_profile: ai_agent</tt>) for the requested operation.  The <tt>act.sub_profile</tt> value is checked against <tt>entity_profiles_supported.actor</tt> per <xref target="authorization-server-metadata">Authorization Server Metadata</xref>.</t>
      </section>
      <section anchor="step-5-booking-tool-exchanges-access-token-for-transaction-token">
        <name>Step 5: Booking Tool Exchanges Access Token for Transaction Token</name>
        <t>The Booking Tool cannot reuse the received access token for internal calls: it is sender-constrained to <tt>AgentJKT</tt>, which the Booking Tool does not possess.  It requests a Transaction Token from the TTS.  In this example, the TTS receives the Booking Tool's WIMSE Workload Identity Token (WIT) as the Token Exchange <tt>actor_token</tt> and validates a Workload Proof Token (WPT).  The WIT identifies the Booking Tool and carries its confirmation key, while the WPT proves possession of that key and binds the request to the accompanying access token:</t>
        <artwork><![CDATA[
POST /token HTTP/1.1
Host: tts.travel-provider.example
Content-Type: application/x-www-form-urlencoded
Workload-Proof-Token: <tool-wpt-with-wth-and-ath>

grant_type=urn%3Aietf%3Aparams%3Aoauth%3Agrant-type%3Atoken-exchange
&subject_token=<tp-access-token>
&subject_token_type=urn%3Aietf%3Aparams%3Aoauth%3Atoken-type%3Aaccess_token
&actor_token=<booking-tool-wit>
&actor_token_type=urn%3Aietf%3Aparams%3Aoauth%3Atoken-type%3Ajwt
&requested_token_type=urn%3Aietf%3Aparams%3Aoauth%3Atoken-type%3Atxn_token
&audience=https%3A%2F%2Ftravel-provider.example
&scope=inventory%3Acheck
&rctx={"req_ip":"198.51.100.42"}
]]></artwork>
        <t>The WIT is therefore the JWT <tt>actor_token</tt> defined by this profile, while the WPT provides the accompanying proof of possession required by the workload-credential profile.</t>
        <t>The TTS applies actor-profile processing per <xref target="transaction-token-output-rules">Transaction Token Output Rules</xref>: it preserves <tt>sub</tt> and <tt>sub_profile</tt> from the <tt>subject_token</tt>, sets <tt>req_wl</tt> to the authenticated Booking Tool, and creates a new outermost <tt>act</tt> object for the Booking Tool while nesting the <tt>subject_token</tt>'s existing <tt>act</tt> claim beneath it.  In this WIMSE-based deployment, the underlying Transaction Token mechanism also binds the issued token to the Booking Tool's presenter key (<tt>ToolJKT</tt>) identified in the WIT confirmation claim:</t>
        <sourcecode type="json"><![CDATA[
{
  "iss": "https://tts.travel-provider.example",
  "sub": "https://idp.enterprise.example/users/alice",
  "sub_profile": "user",
  "scope": "inventory:check",
  "req_wl": "https://tools.travel-provider.example/booking-tool",
  "aud": "https://travel-provider.example",
  "jti": "txn-tok-20260401-001",
  "txn": "550e8400-e29b-41d4-a716-446655440001",
  "exp": 1743375750,
  "iat": 1743375650,
  "tctx": {
    "action": "check-availability",
    "origin": "SFO",
    "destination": "NYC",
    "depart": "2026-04-15"
  },
  "rctx": { "req_ip": "198.51.100.42" },
  "cnf": { "jkt": "ToolJKT-0ZcOCORZNYy9ZhHi" },
  "act": {
    "sub": "https://tools.travel-provider.example/booking-tool",
    "iss": "https://as.travel-provider.example",
    "sub_profile": "service",
    "act": {
      "sub": "https://agents.enterprise.example/travel-assistant",
      "iss": "https://as.enterprise.example",
      "sub_profile": "ai_agent"
    }
  }
}
]]></sourcecode>
        <t>The presenter binding rotates at this step: <tt>cnf.jkt</tt> is now <tt>ToolJKT</tt> because the Booking Tool is the current presenter.</t>
      </section>
      <section anchor="step-6-booking-tool-calls-inventory-service">
        <name>Step 6: Booking Tool Calls Inventory Service</name>
        <artwork><![CDATA[
GET /inventory?origin=SFO&dest=NYC&depart=2026-04-15 HTTP/1.1
Host: internal.travel-provider.example
Txn-Token: <txn-token>
Workload-Identity-Token: <booking-tool-wit>
Workload-Proof-Token: <tool-wpt-with-wth-and-tth>
]]></artwork>
        <t>The Inventory Service validates the WIT and WPT per the WIMSE specifications, then applies authorization of the (<tt>sub</tt>, outermost <tt>act.sub</tt>) pair (<xref target="resource-server-processing">Resource Server Processing</xref>): Alice (<tt>sub</tt>) governs data access policy (e.g., travel tier), and the Booking Tool (<tt>act.sub</tt>) is the authorized internal workload for that request.  The <tt>req_wl</tt> claim provides consistent TTS workload context for the same service in this example.  The nested <tt>act.act.sub</tt> (the Travel Assistant) is carried as prior delegation context and is not evaluated for access control at this internal tier, consistent with the guidance on inner actors in <xref target="actor-authorization">Actor Authorization</xref>.</t>
      </section>
      <section anchor="summary-of-token-transformations">
        <name>Summary of Token Transformations</name>
        <table>
          <thead>
            <tr>
              <th align="left">Step</th>
              <th align="left">Token</th>
              <th align="left">sub</th>
              <th align="left">req_wl</th>
              <th align="left">act.sub (outermost)</th>
              <th align="left">act.act.sub (nested)</th>
              <th align="left">cnf.jkt</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">ID Token</td>
              <td align="left">Alice</td>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">ID-JAG</td>
              <td align="left">Alice</td>
              <td align="left"> </td>
              <td align="left">Travel Assistant</td>
              <td align="left"> </td>
              <td align="left">AgentJKT</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">Access Token</td>
              <td align="left">Alice</td>
              <td align="left"> </td>
              <td align="left">Travel Assistant</td>
              <td align="left"> </td>
              <td align="left">AgentJKT</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">(API call)</td>
              <td align="left">Alice</td>
              <td align="left"> </td>
              <td align="left">Travel Assistant</td>
              <td align="left"> </td>
              <td align="left">AgentJKT</td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">Transaction Token</td>
              <td align="left">Alice</td>
              <td align="left">Booking Tool</td>
              <td align="left">Booking Tool</td>
              <td align="left">Travel Assistant</td>
              <td align="left">ToolJKT</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">(internal call)</td>
              <td align="left">Alice</td>
              <td align="left">Booking Tool</td>
              <td align="left">Booking Tool</td>
              <td align="left">Travel Assistant</td>
              <td align="left">ToolJKT</td>
            </tr>
          </tbody>
        </table>
        <t>Key observations:</t>
        <ul spacing="normal">
          <li>
            <t>In this example, <tt>sub</tt> (Alice) is unchanged across all trust domains and token transformations.</t>
          </li>
          <li>
            <t>The presenter-binding key rotates once, at Step 5 when the TTS re-binds the Transaction Token to the Booking Tool's key.</t>
          </li>
          <li>
            <t>At Step 5 the TTS creates a new outermost <tt>act</tt> for the Booking Tool and nests the prior <tt>act</tt> chain beneath it.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author thanks the OAuth Working Group for the foundational work on Token Exchange (RFC 8693), JWT-formatted access tokens (RFC 9068), DPoP (RFC 9449), and Transaction Tokens, upon which this document builds. The motivating use cases for this work emerged from the deployment of AI agent systems that require cross-domain delegation with explicit delegation chains and carried-forward delegation state within the trust model of the issuing domains.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
