ARIA
If an AI agent sends an email on your behalf, signs a contract, or moves your money — how do you prove you authorized it? How does the person on the other end know it's real? How do you stop it if something goes wrong?
Today, you can't. There is no standard way to verify who an agent is, who authorized it, what it's allowed to do, or whether it's been revoked. Every platform invents its own answer. None of them talk to each other. None of them survive the agent crossing an organizational boundary.
ARIA is the missing layer. An open protocol that gives every AI agent a verifiable, persistent, cryptographically-signed identity — anchored to the same DNS infrastructure that has governed the internet for 40 years.
The Protocol
ARIA is a six-layer composable protocol. Each layer builds on proven standards. No new cryptographic primitives. No new trust infrastructure. DNS is the root.
| Layer | Standard | Function |
|---|---|---|
| P1 Anchor | W3C DID Core / did:aria | Every agent gets a DID. Resolution: DNS TXT pointer + HTTPS AID endpoint. |
| P2 Certify | W3C VC Data Model 2.0 | Signed, portable, independently verifiable credentials. Offline-capable. |
| P3 Present | ATP / OAuth 2.0 + DPoP | How credentials are presented and evaluated. ATP handshake + MCP + A2A compatible. |
| P4 Protect | FIPS 204/203/205 + RFC 8032 | ML-DSA-65 + Ed25519 composite (AND). Post-quantum native. Sunset 2029-12-31. |
| P5 Revoke | StatusList 2021 + Trust Ledger | Real-time revocation. Append-only Trust Ledger. CAEP push notifications. |
| P6 Govern | TrustLayer Foundation A.C. | Nonprofit stewardship. Apache 2.0 + CC-BY-4.0. Anti-capture. Community governed. |
ARIA gives every agent a passport. The Agent Trust Protocol (ATP, §05) is customs — the handshake that happens when the agent arrives. The Trust Ledger (§09) is the permanent record of every credential lifecycle event — issuance, renewal, suspension, revocation, expiry, tombstone.
Trust Levels (L0–L3)
Four levels. From free self-service to HSM-bound enterprise compliance. Each level cryptographically distinct.
| Level | Requirements | Credential Expiry | Renewal |
|---|---|---|---|
| L0 | DID + keypair generation. No DNS, no human verification. 366-day credential. | 366 days | Auto |
| L1 | L0 + DNS verification. Automatic. 366-day credential. | 366 days | Auto (email) |
| L2 | L1 + DNS-over-HTTPS. 2-day review. CA/B Forum SC-081v3 aligned. | 200 days (CA/B SC-081v3) | Auto (DNS re-verify) |
| L3 | L2 + legal docs + admin approval. 2-3 weeks. 180-day credential. HSM recommended. | 180 days | Semi-auto (admin) |
DID Method: did:aria
Canonical method: did:aria. Compatibility bridge: did:web. Self-generated. Zero cost. No permission required to create.
DID operations: CREATE (generate keypair + AID; L1+ also creates DNS TXT record at _aria.<domain>), RESOLVE (DNS TXT lookup + HTTPS fetch + hash verify + signature verify), UPDATE (new AID at same endpoint, DNS hash updated), DEACTIVATE (DNS record removed OR StatusList bit flipped).
The AID Document
The Agent Identity Document (AID) is ARIA's core data structure — the passport. A W3C Verifiable Credential containing everything a counterparty needs to verify an agent's identity, authorization, and intent.
ARIA defines three identity roles — analogous to DNS registrant vs. admin contact:
| Role | Maps to | Description |
|---|---|---|
| Registrant | account_holder | Human who opens the account and accepts ToS. One registrant per account. |
| Principal | credentialSubject.principal | Legal entity or person in the AID. The authority behind the agent. |
| Account Admin | platform user | Manages AIDs day-to-day. May differ from registrant. Analogy: DNS registrant vs. admin contact. |
Agent Trust Protocol (ATP)
The Agent Trust Protocol defines what happens when an AI agent presents its credentials to a receiving system. A three-phase handshake — Declare, Evaluate, Admit — that binds the agent's identity and stated intent to the receiving system's published admission policy.
ATP is to AI agent admission what DMARC (RFC 7489) is to email authentication: a DNS-published policy record that enables receiving systems to evaluate and enforce trust requirements.
Phase 1: Declare. The agent arrives carrying two payloads. Payload A is the AID — the passport. Payload B is the Intent Declaration — the customs form. A structured, machine-readable statement of WHY the agent is here. The intent declaration is cryptographically signed — making declared intent non-repudiable.
| Intent Field | Required | Description |
|---|---|---|
| purpose | MUST | Human-readable statement of operational purpose |
| action_requested | MUST | ARIA scope format (e.g. commerce.read) |
| principal_ref | MUST | Reference to the human or organization on whose behalf the agent acts |
| target_resource | SHOULD | Specific resource or endpoint the agent intends to access |
| dataUsage | SHOULD | W3C DPV purpose categories (dpv:TransactionManagement, etc.) |
| retention | SHOULD | Maximum data retention duration (ISO 8601, e.g. P90D) |
| constraints | MAY | Self-declared operational constraints |
| session_id | MAY | Unique session ID for correlating multiple interactions |
Phase 2: Evaluate. The receiving system evaluates the Declare payload against its published Agent Trust Policy (a DNS TXT record at _aria-policy.domain.com). Evaluation is deterministic. All checks local — zero added network round-trips.
Phase 3: Admit. The result is communicated via an ATP response code, queued for the Agent Interaction Log (future — see §09), and optionally reported to an aggregate endpoint.
| Code | Name | Meaning |
|---|---|---|
| ATP-200 | Admitted | Agent passed all policy checks |
| ATP-401 | Credential invalid | AID revoked, expired, or signature fails |
| ATP-403 | Trust insufficient | Agent trust level below policy minimum |
| ATP-406 | Scope mismatch | Missing required scopes or carries prohibited scopes |
| ATP-429 | Rate limited | Agent exceeded per-agent request cap |
| ATP-451 | Intent incomplete | Intent declaration missing required fields |
| ATP-460 | Qualifier missing | Base requirements met but conditional qualifier fails |
| ATP-462 | Delegation too deep | Delegation chain exceeds policy maximum depth |
Agent Trust Policy — the DNS record.
Enforcement modes — graduated adoption:
| Mode | Behavior | Use Case |
|---|---|---|
| monitor | Log everything. Admit all agents. Non-compliant agents flagged but not blocked. | First deployment. Turn on the lights. |
| warn | Admit all agents. Non-compliant agents receive warning header + logged. | Transition phase. Training wheels. |
| strict | Reject non-compliant agents. ATP error response. No access. | Full enforcement. Production security. |
Scopes & Authorization
Format: namespace:resource:action. 8 immutable standardized actions combined dynamically with admin-defined categories and resources.
| Action | Description |
|---|---|
| read | Query or retrieve data |
| write | Create or update data |
| delete | Remove data permanently |
| execute | Run a process or workflow |
| approve | Authorize a pending action |
| export | Extract data outside the system |
| subscribe | Register for ongoing notifications |
| delegate | Grant a subset of permissions to another agent |
Delegation & Human Approval
Authority flows from a human. Always. A person authorizes an agent. That agent may delegate to a sub-agent. At every hop, the chain is cryptographically signed, the scope can only narrow (never broaden), and the original human principal remains traceable. Maximum depth: 4 hops.
Graduated consent — three tiers: Pre-authorized (routine, low-risk), Categorical (approve once per category), Explicit (a human must approve this specific action). Human approval triggers are declared in the delegation chain and enforced at resolution time.
Credential Lifecycle
A person authorizes an agent on Tuesday. On Wednesday, that person resigns. On Thursday, the agent is still acting — with nobody behind it. ARIA's answer: no agent operates without a live human chain. Every AID must designate a successor principal. On principal change, the agent is suspended pending re-authorization.
Every ARIA credential exists in exactly one of six states:
| State | Meaning | Transitions | Reversible? |
|---|---|---|---|
| active | Credential valid. Agent operating normally. | Can become: suspended, revoked, expired | Starting state |
| suspended | Temporarily paused. Principal change, investigation, or policy violation. | Can become: active (reinstated) or revoked | Yes |
| revoked | Permanently invalidated. Compromise, termination, or breach. | Terminal state | No. Ever. |
| expired | Credential TTL exceeded. Must renew to resume. | Can become: active (after renewal) | Yes (renewal) |
| tombstoned | Organization dissolved or acquired. Permanent archive. | Terminal state | No |
| superseded | Replaced by a new credential. Old DID permanently points to new one (301 redirect pattern). | Terminal state. Pointer to successor. | No |
Mandatory credential expiry: 366 days (L0/L1), 200 days (L2, per CA/B Forum SC-081v3), 180 days (L3).
Revocation & Trust Ledger
If an agent is compromised, ARIA can kill its credentials globally in under 60 seconds. The mechanism: W3C StatusList2021 — flip one bit, the credential is revoked worldwide.
The Trust Ledger is the permanent, append-only, SHA-256 hash-chained record of every credential lifecycle event: issuance, renewal, suspension, revocation, expiry, and tombstone. 7-year minimum retention. Modeled on Certificate Transparency (RFC 9162).
A Trust Record is a single entry in the Trust Ledger. One lifecycle event, one Trust Record.
Post-Quantum Cryptography
ARIA treats PQC as foundational. Built in from day one, not retrofitted. The Harvest-Now-Decrypt-Later (HNDL) threat makes retroactive protection critical.
| Algorithm | NIST Standard | Usage | Security Level |
|---|---|---|---|
| ML-DSA-65 | FIPS 204 | Primary signing for all AIDs | Level 3 (AES-192) |
| ML-KEM-768 | FIPS 203 | Session key establishment | Level 3 |
| SLH-DSA | FIPS 205 | Long-lived registry records | Conservative (hash-based) |
| Ed25519 | RFC 8032 | Composite classical (AND with ML-DSA) | Classical backward compat |
Authentication & Key Recovery
| Factor | Mechanism | Verified By |
|---|---|---|
| 1. Domain control | DNS TXT @ _aria.<domain> | ARIA resolver |
| 2. Crypto signature | ML-DSA + Ed25519 composite | Any counterparty (offline capable) |
| 3. Chain integrity | Full delegation chain linked | Each hop independently |
| 4. Liveness | StatusList2021 | Cached list, no ARIA call needed |
MCP Integration
MCP handles connectivity. ARIA handles identity. ATP handles admission. Three protocols composing without competing.
| # | Surface | How It Works |
|---|---|---|
| 1 | ATP transport binding | ARIA AID + intent in MCP tool call metadata (aria.aid + aria.intent) |
| 2 | Trust level discovery | MCP servers declare minimum trust level per tool |
| 3 | ARIA as MCP tool | aria_verify: native identity check callable from any MCP client |
| 4 | Cross-org calls | Identity layer MCP assumes but does not supply |
| 5 | Scope alignment | 8 standardized actions mirror MCP tool patterns |
| 6 | Delegation chains | End-to-end accountability in multi-tool flows |
| 7 | DPoP (RFC 9449) | Token bound to specific agent, prevents theft/replay |
Enterprise Integration
SCIM lifecycle bridge for agent provisioning/deprovisioning. OIDC bridge for existing IAM. AuthZEN PEP/PDP compatibility. GNAP (RFC 9635) delegation compatibility. SP 800-207 Zero Trust alignment.
ARIA Resolver API: RESTful HTTPS at api.aria.bar. SDK: TypeScript (live — @aria-registry/verify). Python, Go [PLANNED — Q2 2026].
Commerce Integration
ARIA is the agent identity layer that commerce protocols reference but do not define.
| Layer | Protocol | ARIA Role |
|---|---|---|
| Discovery | Shopify UCP | Trust signal for agent ranking |
| Checkout | Stripe ACP / SPTs | Identity gate before payment token |
| Payments | Visa TAP | Verified identity for agent vetting |
| Micropayments | x402 (USDC/Coinbase) | Agent identity for autonomous spend |
| Communication | Google A2A | Verified Agent Card identity anchor |
| Tools | Anthropic MCP | Cross-org identity layer |
A2A Identity Bridge
Google's A2A protocol lets agents discover and communicate with each other. But A2A's own roadmap lists "formalize authorization in AgentCard" as an open TODO. ARIA fills this gap.
| A2A Component | Without ARIA | With ARIA |
|---|---|---|
| Agent Card | Self-declared, no verification | AID reference with L0–L3 trust level |
| Discovery | Agent found, identity unknown | Agent found, identity verified via did:aria |
| Authorization | Open TODO on GitHub | Scopes enforced from AID delegation chain |
| Revocation | Not addressed | StatusList2021 check before interaction |
| Cross-org trust | No mechanism | Full delegation chain tracing back to human principal |
Integration Map
| Layer | Protocol | ARIA's Role |
|---|---|---|
| Commerce Checkout | Visa TAP / Mastercard Agent Pay | Verified agent identity BEFORE issuing payment credentials |
| Agent Communication | Google A2A | Verified identity embedded in Agent Cards |
| Commerce Protocol | Stripe ACP / SPTs | Legal entity verification for B2B + regulated commerce |
| Micropayments | x402 (USDC/Coinbase) | Agent identity for autonomous spend authorization |
| Tool Connection | Anthropic MCP | Cross-org identity layer MCP doesn't supply |
| Agent Discovery | Shopify UCP | Trust signal for agent ranking. UCP Level 3 = ARIA L2+ |
| Internal Workload | SPIFFE/SPIRE | External-facing bridge when agents cross org boundaries |
| Bot Authentication | Cloudflare Web Bot Auth | Identity content that HTTP signatures transport |
| Auth Framework | IETF AIMS (WIMSE+OAuth) | Cross-org identity + authorization |
| Identity Standards | OIDF AIIM CG | Candidate protocol for OIDF recommendation |
| Enterprise IAM | SCIM / IPSIE / AuthZEN | Lifecycle bridge for agent provisioning/deprovisioning |
| Cloud Identity | Microsoft Entra Agent ID | Cross-org portable identity outside Azure trust domain |
| Cloud Identity | AWS Bedrock AgentCore | Cross-org portable identity outside AWS trust domain |
| Access Control | NGAC / GNAP (RFC 9635) | Delegation chain maps to GNAP multi-party model |
| Token Security | NISTIR 8587 | DPoP binding prevents token theft/replay |
| Credential Issuance | OpenID4VCI / OpenID4VP | VC issuance and presentation compatible with OIDF specs |
| Trust Infrastructure | vLEI (GLEIF) | L2/L3 accepts vLEI as legal entity attestation |
| Agent Interop | FIPA ACL | ARIA credential headers embeddable in FIPA messages |
| Governance Framework | ToIP Metamodel | TLF governance maps to ToIP four-layer trust stack |
Compliance Rosetta Stone
How ARIA maps to every regulatory framework, identity standard, and commercial ecosystem.
| ARIA Level | Verification | SP 800-63-4 | AAL | EU AI Act | vLEI / GLEIF | TLS Equivalent |
|---|---|---|---|---|---|---|
| L0 Anchored | DID + keypair | IAL1 | AAL1 | Risk mapping | No equivalent | DV certificate |
| L1 Identified | DNS verification (auto) | IAL1+ | AAL1 | Risk mapping | LEI (org identifier) | OV certificate |
| L2 Certified | DNS TXT via DoH (auto) | IAL2 | AAL2 | Risk mapping | vLEI — accepted | EV certificate |
| L3 Sovereign | Legal docs + admin | IAL3 | AAL3 | Risk mapping | vLEI + Qualified vLEI | Beyond EV |
EU AI Act — 5-obligation mapping:
| Article | ARIA Mapping |
|---|---|
| Article 9 (Risk management) | ARIA trust levels provide risk-proportional identity |
| Article 13 (Human oversight) | HITL tiers map directly (see §07) |
| Article 52 (Transparency) | AID declares principal, scopes, intent |
| Article 61 (Post-market monitoring) | Trust Ledger provides audit trail |
| Article 72 (Penalties) | L2/L3 verification demonstrates compliance effort |
Security Architecture
Agent spoofing prevention: cryptographic identity replaces self-reported user-agent strings. Cross-cloud identity fabric: ARIA DIDs resolve identically across AWS/GCP/Azure.
Prompt Injection Defense
ARIA's contribution is not prompt injection prevention (model layer) but damage containment through identity infrastructure:
| Defense Layer | Mechanism | ARIA Section |
|---|---|---|
| Scope containment | Agent cannot exceed declared scopes even if prompt-injected | §06 Scopes |
| Delegation ceiling | Compromised agent cannot escalate beyond delegated authority | §07 Delegation |
| Rapid revocation | Compromised agent credentials revoked globally in minutes | §09 Revocation |
| Intent mismatch | Declared intent vs. actual actions enables anomaly detection | §05 ATP |
| Audit trail | Complete cryptographic record for incident response | §20 Audit |
| Trust policy | Receiving systems enforce minimum trust + scope via ATP | §05 ATP |
Auditing & Non-Repudiation
Every credential lifecycle event produces a Trust Record in the Trust Ledger. Non-repudiation binding: every entry includes the delegation chain snapshot at time of action.
| Event | What Is Logged | Retention |
|---|---|---|
| Issuance | DID, trust level, issuing authority, delegation chain, timestamp | 7 years |
| Verification | Verifying party, result, trust level at time of check | 7 years |
| Revocation | Revoking authority, reason code, cascade scope | 7 years |
| State change | Previous state, new state, triggering event, authority | 7 years |
| Delegation | Delegating DID, receiving DID, scope granted, depth, approval config | 7 years |
Privacy & Data Governance
ARIA agent identity metadata is organizational, not personal. Agent DIDs identify software entities, not individual humans. The principal identity is held by TLF under data controller obligations.
GDPR tension: the right to erasure (Article 17) conflicts with the Trust Ledger's append-only immutability. Proposed resolution: Trust Ledger entries can be "redacted" — the event record remains but personally identifiable fields are replaced with a redaction marker.
Offline & QR Verification
ARIA credentials are self-contained, cryptographically complete, verifiable without network connectivity. A verifier with a cached public key and StatusList can validate any AID entirely offline. QR presentation enables physical-world agent verification.
Versioning & Compatibility
Semantic versioning (major.minor). Minor changes (1.x) backward-compatible. Major changes (vN.0) introduce breaking changes. TLF supports all credentials under supported major versions for minimum 36 months. API: v1 endpoints guaranteed stable 5 years minimum.
Advanced Patterns
Multi-principal agents: separate AIDs per principal context. Model provenance: modelAttestation for EU AI Act. Robotic identity: same framework, L3 HSM binds to specific hardware. SPIFFE bridge: ARIA L2+ wraps SPIFFE SVID with cross-org verification.
Governance
TrustLayer Foundation A.C. is the independent nonprofit that stewards the ARIA protocol, issues credentials, maintains the Trust Ledger, and governs the open standard.
Licensing: Apache 2.0 (code) + CC-BY-4.0 (documentation). Independent Technical Steering Committee: 7 members — 3 civil society/academia, 2 industry, 1 government liaison, 1 developing-nation representative. Decisions by rough consensus (IETF model). All deliberations public.
Trust Seals
Trust Seals are optional attestations embedded in the AID's attestations field. They are referenced by ATP qualify= rules. L2+ required (Education: L1+). [NOT YET IMPLEMENTED — qualify= evaluation deferred beyond v1.0]
| Category | Seals | Minimum Level |
|---|---|---|
| Sector | Healthcare, Finance, Government, Legal, Education | L2 (Education: L1+) |
| Compliance | SOC2, ISO 27001, ISO 42001, PCI-DSS, EU AI Act, HIPAA | L2+ |
| Capability | HSM-bound keys, Offline-capable, Multi-agent orchestrator | L2+ |
Trust Seals are NOT trust levels. They are supplementary qualifications that enable sector-specific policy enforcement via ATP qualify= rules. Example: qualify=sector:healthcare>iso27001
Apache 2.0 (code) + CC-BY-4.0 (documentation) · Copyright 2026 TrustLayer Foundation A.C.