AEGIS AIAM-1: Conformance

Document: AIAM-1/Conformance (/identity/conformance/)
Version: 0.1 (Draft)
Part of: AEGIS Identity & Access Management for AI Agents
Last Updated: April 10, 2026


1. Purpose

This chapter defines the conformance requirements for AIAM-1, including the conformance checklist, conformance statement format, and guidance for implementations claiming AIAM-1 conformance.


2. Conformance Profiles

2.1 AIAM-1 v0.1 Profile

AIAM-1 v0.1 defines a single conformance profile: Full Conformance. A conformant implementation satisfies all MUST and MUST NOT requirements across all normative documents in the AIAM-1 specification suite.

Future versions MAY define additional profiles:

These are not specified in v0.1.


3. Conformance Checklist

The following checklist enumerates all MUST and MUST NOT requirements from the AIAM-1 specification suite. A conformant implementation satisfies all items marked MUST and violates no items marked MUST NOT.

3.1 Identity (/identity/identity/)

IDRequirementType
AIAM1-ID-001Represent agent identity as four-dimensional composite (model provenance, orchestration, goal context, principal)MUST
AIAM1-ID-002Each dimension independently verifiableMUST
AIAM1-ID-003Each dimension independently revocableMUST
AIAM1-ID-010Model provenance includes model_family, model_version, model_attestationMUST
AIAM1-ID-011Model attestation verifiable without weight accessMUST
AIAM1-ID-012Model change triggers identity claim reissuanceMUST
AIAM1-ID-020Orchestration layer includes runtime, framework, framework_versionMUST
AIAM1-ID-030Goal context includes goal_id, purpose, scopeMUST
AIAM1-ID-031Goal context sufficiently specific to distinguish instantiationsMUST
AIAM1-ID-040Principal identifies accountable human, org, or legal entityMUST
AIAM1-ID-041Accountability not delegated to agent or model provider; no principal = no identity claimMUST
AIAM1-ID-042Multiple principals require separate, independently verifiable/revocable claimsMUST
AIAM1-ID-050Identity claims cryptographically signed by verifiable issuing authorityMUST
AIAM1-ID-051Identity claims have defined validity period; no expiration = rejectMUST
AIAM1-ID-052Identity claims revocable at any timeMUST
AIAM1-ID-053Revocation within propagation latency guaranteeMUST
AIAM1-ID-054Identity lifecycle events produce attestation recordsMUST

3.2 Intent (/identity/intent/)

IDRequirementType
AIAM1-INT-001Every action carries an intent claim; no intent = unauthorizedMUST
AIAM1-INT-002Intent claim structured (intent_id, goal_ref, action_ref, reasoning_summary, expected_outcome, dependency_refs, timestamp)MUST
AIAM1-INT-003Intent claims produced at moment of action; timestamp within toleranceMUST
AIAM1-INT-004Reasoning summary structured (trigger, selection_rationale)MUST
AIAM1-INT-010Intent validated against goal context (goal_ref match, scope, constraints)MUST
AIAM1-INT-011Mismatched goal_ref → DENYMUST
AIAM1-INT-020Intent claims preserved in attestation recordsMUST
AIAM1-INT-021Intent claims immutable after productionMUST
AIAM1-INT-022Intent claims retained for attestation retention periodMUST
AIAM1-INT-030Sub-agents produce own intent claims; reference parent via dependency_refsMUST
AIAM1-INT-031Sub-agent intent independently valid against sub-agent’s own identityMUST
AIAM1-INT-050Intent claims not reusable across action proposals; reject reused action_refMUST NOT reuse

3.3 Authority / IBAC (/identity/authority/)

IDRequirementType
AIAM1-AUTH-001Authority policies as (identity, action, intent) triplesMUST
AIAM1-AUTH-002Patterns support exact match, wildcard, set membership, negation, prefixMUST
AIAM1-AUTH-010Policies machine-readableMUST
AIAM1-AUTH-011Policy evaluation deterministic; no LLM or non-deterministic inputMUST
AIAM1-AUTH-012Defined policy evaluation order (first-match or most-specific)MUST
AIAM1-AUTH-013Default deny; no matching policy → DENYMUST
AIAM1-AUTH-014Conflicting decisions: DENY > ESCALATE > REQUIRE_CONFIRMATION > ALLOWMUST
AIAM1-AUTH-020Policy changes within bounded propagation latencyMUST
AIAM1-AUTH-021Policy changes produce attestation recordsMUST
AIAM1-AUTH-022Policies version-controlled; historical state reconstructableMUST
AIAM1-AUTH-023Policy authorship governed; agents cannot modify their own policiesMUST
AIAM1-AUTH-024Mixed delegated + independent authority evaluated as composed action (CAP-010)MUST
AIAM1-AUTH-030External trust scores do not override IBAC decisionsMUST NOT

3.4 Capabilities (/identity/capabilities/)

IDRequirementType
AIAM1-CAP-001Capabilities explicitly granted; no grants = no actionsMUST
AIAM1-CAP-002Grants include grant_id, capability_id, grantee, scope, issued_at, expires_at, issued_byMUST
AIAM1-CAP-003Grants time-bounded; expired = nonexistentMUST
AIAM1-CAP-004Grants individually revocableMUST
AIAM1-CAP-010Composition treated as governed operationMUST
AIAM1-CAP-011Non-transitivity: auth(A) + auth(B) ≠ auth(A-then-B)MUST
AIAM1-CAP-012At least one composition governance mechanism implementedMUST
AIAM1-CAP-020Constraints enforced at every capability exerciseMUST
AIAM1-CAP-021Constraint violation → DENY (not advisory)MUST
AIAM1-CAP-030Composition evaluation over at least the current sessionMUST

3.5 Delegation (/identity/delegation/)

IDRequirementType
AIAM1-DEL-001Delegation as explicit principal chainMUST
AIAM1-DEL-002Each agent identifies its principalMUST
AIAM1-DEL-003Top principal remains accountableMUST
AIAM1-DEL-004Principal chain obscuration structurally impossibleMUST
AIAM1-DEL-010Delegated authority narrows monotonicallyMUST
AIAM1-DEL-012Independent grants still recorded in principal chainMUST
AIAM1-DEL-020Maximum delegation chain depth defined and publishedMUST
AIAM1-DEL-021Agents at max depth cannot delegate furtherMUST
AIAM1-DEL-022Sub-agent instantiation is a governed actionMUST
AIAM1-DEL-023Delegation records include delegator, delegatee, capabilities, scope, purpose, expiry, cascade_on_revocationMUST
AIAM1-DEL-024Revocation cascade mandatory by default for downstream delegated authorityMUST
AIAM1-DEL-025Cascade opt-out (cascade_on_revocation: false) permitted with attestation, justification, and policy governanceMAY (with MUST conditions)

3.6 Sessions (/identity/sessions/)

IDRequirementType
AIAM1-SES-001Sessions as first-class governance boundariesMUST
AIAM1-SES-002Sessions bounded by four dimensions (goal, time, capabilities, accountability)MUST
AIAM1-SES-003Session record includes session_id, agent_id, goal_ref, started_at, expires_at, capability_envelope, principal_chain, statusMUST
AIAM1-SES-010Actions outside active session → unauthorizedMUST
AIAM1-SES-011Session terminates on first of: goal completion, time expiry, capability exhaustion, explicit revocationMUST
AIAM1-SES-012Session termination: deny subsequent actions, produce attestation, revoke scoped delegationsMUST
AIAM1-SES-004Maximum session duration published; SHOULD NOT exceed 24h without compensating controlsMUST
AIAM1-SES-005Sessions not renewable; extension requires new session with new attestationMUST NOT renew
AIAM1-SES-020No silent session escalationMUST NOT
AIAM1-SES-021Exceeding session boundaries requires new session with new authorizationMUST

3.7 Attestation (/identity/attestation/)

IDRequirementType
AIAM1-ATT-001Every action produces attestation record (including denials)MUST
AIAM1-ATT-002Record includes: attestation_id, timestamp, identity, intent, action, decision, rationale, principal_chain, session_ref, capabilities, enforcement_layer, chain_hash, signatureMUST
AIAM1-ATT-010Records tamper-evidentMUST
AIAM1-ATT-011Records hash-chained (SHA-256)MUST
AIAM1-ATT-012Chain integrity verifiable at any timeMUST
AIAM1-ATT-013Records append-only; no delete/modify/overwriteMUST NOT modify
AIAM1-ATT-020Records signed by enforcement layerMUST
AIAM1-ATT-021Signature covers all fieldsMUST
AIAM1-ATT-022Supports Ed25519, ECDSA P-256, or RSA-2048MUST (at least one)
AIAM1-ATT-023Algorithm negotiation and key rotation without invalidating historical chainsSHOULD
AIAM1-ATT-030Retention policy defined and publishedMUST
AIAM1-ATT-031Retention minimum 1 yearMUST
AIAM1-ATT-031aReferenced claims retained for attestation retention periodMUST
AIAM1-ATT-032Attestation is primary accountability surface; no substitution with agent logsMUST NOT substitute
AIAM1-ATT-040Attestation failure → DENY action (fail-closed)MUST

3.8 Revocation (/identity/revocation/)

IDRequirementType
AIAM1-REV-001Pre-action revocation; revoked = unusable for uncommitted actionsMUST
AIAM1-REV-002Propagation latency guarantee defined and publishedMUST
AIAM1-REV-002aKill-switch propagation MUST NOT exceed 60 secondsMUST NOT exceed
AIAM1-REV-003Propagation measurable and auditableMUST
AIAM1-REV-010Revocation operations governed by IBACMUST
AIAM1-REV-011Revocation produces attestation recordsMUST
AIAM1-REV-012Revocation idempotentMUST
AIAM1-REV-020Kill-switch available (agent, principal chain, session targeting)MUST
AIAM1-REV-022Kill-switch highest priority; non-deferrableMUST
AIAM1-REV-023Kill-switch produces CRITICAL attestationMUST
AIAM1-REV-030Revocation cascade evaluated for downstream delegationsMUST
AIAM1-REV-031Delegated capabilities from revoked source are revokedMUST
AIAM1-REV-032Independent grants unaffected by upstream revocationMUST NOT revoke
AIAM1-REV-033Cascade propagates to full chain depthMUST

3.9 Interoperability (/identity/interoperability/)

IDRequirementType
AIAM1-IOP-001OAuth 2.1 / OIDC authentication without requiring IdP to understand AIAM-1MUST
AIAM1-IOP-003Token mapping from AIAM-1 claims to JWT claimsMUST
AIAM1-IOP-004Custom claims use aiam_ prefixMUST
AIAM1-IOP-005JWT valid without AIAM-1 claims for non-AIAM resource serversMUST
AIAM1-IOP-010Capabilities SHOULD map to OAuth 2.1 scopesSHOULD
AIAM1-IOP-011OAuth scopes conflicting with AIAM-1 grants: AIAM-1 registry authoritativeMUST NOT exercise unauthorized scope
AIAM1-IOP-050Interop mappings do not compromise AIAM-1 primitive integrityMUST NOT compromise
AIAM1-IOP-051Governance gateway is authoritative for IBAC; interop protocols are complementaryMUST

3.10 Threat Model (/identity/threat-model/)

IDRequirementType
AIAM1-TM-001Address all eight threat classes; identify defenses and residual riskMUST
AIAM1-TM-003Trust scores and security decisions not collapsed into single metricMUST NOT collapse

4. Conformance Statement Format

AIAM1-CONF-001. An implementation claiming AIAM-1 v0.1 conformance MUST publish a conformance statement containing:

SectionContentRequired
Implementation identityName, version, vendorMUST
AIAM-1 versionSpecification version claimedMUST
Conformance profile”Full Conformance” (v0.1 only profile)MUST
Requirement satisfactionFor each MUST/MUST NOT requirement: satisfied, not satisfied, or not applicable (with rationale)MUST
DeviationsFor any unsatisfied requirement: rationale and compensating controlsMUST (if any)
SHOULD complianceFor each SHOULD requirement: implemented or not (with rationale if not)SHOULD
Implementation notesAdditional context on implementation choices (e.g., policy language, crypto algorithms, propagation latency guarantee value)SHOULD
DateDate of conformance assessmentMUST
AssessorWho performed the assessment (self or third-party)SHOULD

AIAM1-CONF-002. Conformance statements MUST reference the specification version and MUST be updated when the implementation changes materially.

AIAM1-CONF-003. Conformance statements MUST be publicly accessible to relying parties that need to evaluate whether an implementation meets AIAM-1 requirements.


5. Testing and Validation

AIAM1-CONF-010. AIAM-1 v0.1 does not define a normative test suite. A companion test suite is planned for v0.2.

AIAM1-CONF-011. In the interim, conformant implementations SHOULD publish their own validation methodology, including:

AIAM1-CONF-012. Third-party conformance assessment is RECOMMENDED but not required for v0.1.

Honesty note: v0.1 self-attested conformance is a known limitation. Implementations claiming conformance without third-party assessment SHOULD be treated by relying parties as indicative rather than authoritative. A self-attested conformance statement means “we believe we satisfy these requirements and are willing to document that belief publicly.” It does not mean “an independent party has verified our claim.” A normative test suite is committed for v0.2; until it exists, the gap between self-attestation and verified conformance is real and should be acknowledged by both implementers and relying parties.


6. Conformance Profile Roadmap

6.1 Full Conformance (v0.1 — defined)

The only profile defined in v0.1. Satisfies all MUST and MUST NOT requirements across all chapters.

6.2 Research / Individual Profile (v0.2 — planned)

A lightweight profile for individual researchers, students, and personal-agent operators. ID-041 (“no principal = no identity claim”) is operationally painful for a researcher running a personal agent — the researcher is both operator and principal, and the full composite identity machinery is disproportionate to their governance needs.

The Research / Individual Profile is not defined in v0.1 but is named here as a commitment: AIAM-1 is not enterprise-only by accident. v0.2 will specify a conformance profile that relaxes composite identity requirements for single-user, non-delegating deployments while preserving attestation, revocation, and session governance. The exact relaxations are deferred to v0.2.

6.3 Federation Profile (v0.2 — planned)

For deployments participating in cross-organization agent governance. Will require cross-organization delegation primitives (DELEGATION §3.5) and GFN-1 integration.


7. Version Compatibility

AIAM1-CONF-030. Conformance is version-specific. An implementation conformant to AIAM-1 v0.1 is not automatically conformant to future versions. Each version requires its own conformance assessment.

AIAM1-CONF-031. Future AIAM-1 versions SHOULD maintain backward compatibility with v0.1 conformant implementations where feasible. Breaking changes MUST be documented in the version’s changelog with migration guidance.


AEGIS™ | “Capability without constraint is not intelligence”™
AEGIS Initiative — AEGIS Operations LLC