RFC-0019: AIAM-1 — Identity and Access Management for AI Agents

RFC: RFC-0019
Status: Draft
Version: 0.1.0
Created: 2026-04-10
Updated: 2026-04-10
Author: Kenneth Tannenbaum, AEGIS Initiative
Repository: aegis-governance
Target milestone: Q2 2026
Supersedes: None
Superseded by: None


Summary

This RFC introduces AIAM-1, a normative specification for identity and access management for AI agents (aIAM). AIAM-1 defines composite identity claims, structured intent assertions, Intent-Bound Access Control (IBAC), capability composition governance, delegation principal chains, session governance boundaries, tamper-evident attestation, and kill-switch revocation — the full set of IAM primitives required to govern autonomous AI agents as a distinct actor class. AIAM-1 is designed to be implemented independently of the AEGIS governance runtime while integrating cleanly with AGP-1, ATX-1, ATM-1, and GFN-1 when deployed within the AEGIS ecosystem.


Motivation

Existing identity and access management frameworks were built for two actor classes: humans and service accounts. AI agents are a third actor class that violates the assumptions underlying both — their identity is durable but their intent is not, their authorization cannot be static because their goals shift within a single session, and accountability cannot rest on the agent itself.

The AEGIS specification family currently has no normative definition for agent identity, intent, or delegation:

The Agents of Chaos study (Shapira et al., 2026) [12] documented production failures that AIAM-1 directly addresses:

AIAM-1 makes these failure modes structurally addressable through composite identity, IBAC, and principal chains.


Guide-Level Explanation

AIAM-1 introduces three concepts that are new to the AEGIS specification family:

1. Composite Identity

An AIAM-1 identity claim is a four-dimensional composite: model provenance (what model?), orchestration layer (what framework?), goal context (what purpose?), and principal (whose accountability?). This is the rich backing record that an AGP-1 actor.id resolves to. AGP-1 doesn’t change — AIAM-1 gives it depth.

2. Intent-Bound Access Control (IBAC)

IBAC evaluates every authorization decision as a function of three inputs: identity, action, and intent context. This is a categorical extension of RBAC (which asks “what role?”) and ABAC (which asks “what attributes?”). IBAC asks “why are you doing this, right now, in this context?” — making intent a first-class input to every authorization decision.

IBAC generalizes prior models: an RBAC policy is an IBAC triple with wildcard intent. Organizations can adopt IBAC incrementally.

3. Principal Chains

When Agent A delegates to Agent B, the delegation creates an explicit, attested link in an accountability chain. Authority narrows monotonically down the chain. The principal at the top (always a human, organization, or legal entity) remains accountable for all actions taken anywhere in the chain. Principal chains are what make multi-agent delegation auditable.

What Changes for AEGIS Developers


Reference-Level Explanation

The full AIAM-1 specification is a 12-chapter document suite located at aiam/:

ChapterFileContent
IndexAEGIS_AIAM1_INDEX.mdSuite overview, terminology, AEGIS integration map
IdentityAEGIS_AIAM1_IDENTITY.mdFour-dimensional composite identity model
IntentAEGIS_AIAM1_INTENT.mdStructured intent claims, goal alignment validation
AuthorityAEGIS_AIAM1_AUTHORITY.mdIBAC formal definition, policy format, decision flow
CapabilitiesAEGIS_AIAM1_CAPABILITIES.mdComposition governance, non-transitivity
DelegationAEGIS_AIAM1_DELEGATION.mdPrincipal chains, monotonic narrowing, depth limits
SessionsAEGIS_AIAM1_SESSIONS.mdFour-dimensional governance boundaries
AttestationAEGIS_AIAM1_ATTESTATION.mdAction-level tamper-evident records
RevocationAEGIS_AIAM1_REVOCATION.mdKill-switch, delegation cascade
InteroperabilityAEGIS_AIAM1_INTEROPERABILITY.mdOAuth 2.1, OIDC, SCIM, SAML mappings
Threat ModelAEGIS_AIAM1_THREAT_MODEL.mdSeven threat classes, ATX-1 cross-references
ConformanceAEGIS_AIAM1_CONFORMANCE.md80+ requirement checklist

JSON schemas for AIAM-1 are currently located at aegis-core/schemas/aiam/. Shared cross-repository contracts are canonically owned by aegis/schemas/; AIAM-specific schemas in this repository should be treated as governance-owned extension artifacts until they are promoted into the canonical shared schema set.

The position paper is located at docs/position-papers/aiam/AIAM-1-position-paper-v0.1.md.


Drawbacks

  1. Complexity. AIAM-1 adds 80+ normative requirements. Organizations with simple single-agent deployments may find the full specification disproportionate to their governance needs. Mitigation: future versions may define constrained conformance profiles.

  2. Intent claim overhead. Every action must carry a structured intent claim. For high-frequency agents (thousands of actions per minute), intent claim generation and validation add latency and storage. The performance impact is not yet characterized.

  3. Intent spoofing is an open problem. AIAM-1 provides detection mechanisms but cannot guarantee that intent claims correspond to actual reasoning. This is a fundamental limitation of governing opaque probabilistic systems, not a design flaw, but it bounds what IBAC can guarantee.

  4. No existing implementations. AIAM-1 v0.1 is a specification without a reference implementation. Until implementations exist, conformance claims are theoretical.

  5. Policy language not standardized. AIAM-1 does not mandate a specific IBAC policy language. This flexibility may create interoperability challenges across implementations. Candidate languages (Rego, Cedar, XACML) are identified for evaluation in v0.2.


Alternatives Considered

  1. Extend AGP-1 directly. Rather than creating a new specification, identity and intent primitives could be added to AGP-1. Rejected because: AIAM-1 is designed to be standalone (implementable without AEGIS), which AGP-1 extensions could not be. Additionally, the scope of identity + intent + delegation + session + attestation + revocation would bloat AGP-1 beyond its governance-protocol focus.

  2. Adopt an existing aIAM standard. No existing standard addresses AI agent IAM as a distinct problem. OAuth 2.1, OIDC, SCIM, and XACML were designed for humans and service accounts. AIAM-1 interoperates with all of them but addresses a fundamentally different actor class.

  3. ABAC with agent-specific attributes. Extend ABAC to include agent-relevant attributes (model version, framework, etc.) without introducing intent as a first-class input. Rejected because: ABAC without intent cannot distinguish between two identical actions taken for different purposes — the exact failure mode that Agents of Chaos documented.


Compatibility

AIAM-1 adoption is opt-in. The specification enriches AGP-1 when present but does not require it.


Open Questions

  1. Intent claim verifiability (fundamental research question).
  2. Policy language standardization (Rego, Cedar, XACML evaluation).
  3. Cross-organization delegation (bilateral trust primitives).
  4. AIAM-1 identity claim ↔ GFN-1 DID integration binding.
  5. Constrained conformance profiles for edge/IoT deployments.
  6. Reference implementation timeline and target language.

Implementation Notes

Implementation guidance is provided in the AIAM-1 Specification Suite. Reference implementation is deferred to the aegis-core runtime roadmap.


Success Criteria

  1. Identity claims are verifiable at the governance gateway without external round-trips.
  2. Intent-Bound Access Control decisions complete within the AGP-1 SLO budget.
  3. Principal chain delegation is auditable end-to-end through the governance event log.

References


AEGIS™ | “Capability without constraint is not intelligence”™
AEGIS Initiative — AEGIS Operations LLC