<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wahl-scim-agent-schema-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="SCIM Agent Schema">System for Cross-domain Identity Management: Agentic Identity Schema</title>
    <seriesInfo name="Internet-Draft" value="draft-wahl-scim-agent-schema-01"/>
    <author fullname="Mark Wahl">
      <organization>Microsoft</organization>
      <address>
        <email>mwahl@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="19"/>
    <area>Security</area>
    <workgroup>System for Cross-domain Identity Management</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>

<t>The System for Cross-domain Identity Management (SCIM) specifications
 are designed to make identity management in cloud-based applications
 and services easier.</t>
      <t>This document provides a platform-neutral schema for representing AI agents' identities in JSON
   format, enabling them to be transferred in the SCIM protocol to the service. This establishes an agentic identity so that an agent can subsequently be authenticated and authorized to interact with the service.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wahl-scim-agent-schema/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        System for Cross-domain Identity Management Working Group mailing list (<eref target="mailto:scim@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scim/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scim/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The SCIM protocol <xref target="RFC7644"/> and core schema <xref target="RFC7643"/> are widely implemented for provisioning records for users into services. The default schema for those user records includes attributes such as a person's name, their desired group memberships, and a password that the user. This enables a SCIM client to inform a SCIM server component of a service of a new user, so that user can be identified in and subsequently authenticated to the service. SCIM also enables lifecycle controls for the SCIM client to update and remove that user record in that service, and associate that user with groups, roles and entitlements.</t>
      <t>With the growth of agentic AI, agents will also need to be able to interact with services. Some services will require an agent to have identities represented in those services. The attributes of an agent identity in a SCIM server can be different from the attributes of a human user identity. Some services allow OAuth <xref target="RFC6749"/> protocols such as token exchange <xref target="RFC8693"/> for an agent's authentication to the service, without needing a shared secret credential between each agent and the service. However, similar to users, an agent's identity might have access rights in the service, represented through relationships of the agent's identity with groups, roles and entitlements in a service.</t>
      <t>As SCIM is familiar within the enterprise and agents often need the same lifecycle signals and group, role or entitlement memberships as users, defining a schema to transport agentic identities in the SCIM protocol simplifies deployment and enables subsequent authentication interactions, consistent controls for those agent's identities and access rights.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="scim-schema-for-agentic-identity">
      <name>SCIM Schema for Agentic Identity</name>
      <t>As an extension to SCIM schema, <xref target="RFC7643"/> sections 3.2 and 3.3, this specification includes one new resource type:</t>
      <ul spacing="normal">
        <li>
          <t>AgenticIdentity: A resource of this type represents an identity of an agent to the service. It includes attributes of an agentic identity needed to be known by a service, including <bcp14>OPTIONAL</bcp14> references to the agentic identity's group memberships, roles and entitlements.</t>
        </li>
      </ul>
      <t>Resources of this type are conveyed in the SCIM protocol <xref target="RFC7644"/> using JSON <xref target="RFC8259"/>. Extension schemas can be defined to extend this resource type, allowing additional attributes.</t>
      <section anchor="single-valued-attributes">
        <name>Single-valued Attributes</name>
        <t>The resource type AgenticIdentity has the following single-valued attributes. A SCIM server which implements the Agentic Identity schema <bcp14>MUST</bcp14> recognize these attributes.</t>
        <ul spacing="normal">
          <li>
            <t>active: A boolean value indicating the agentic identity's administrative status. If absent, then an agentic identity is assumed to be active. A SCIM client can indicate that an agentic identity is inactive by setting it to false. The definitive meaning of this attribute is determined by the SCIM server. Support for this attribute in a SCIM client is <bcp14>OPTIONAL</bcp14>.</t>
          </li>
          <li>
            <t>agenticApplicationId: The value of this attribute is a string with the id of an agentic application, that is assigned by the SCIM client, enabling correlation and reporting in the service for an agentic application that has multiple identities. The attribute <bcp14>MAY</bcp14> be included when the AgenticIdentity is created. The definitive meaning of this attribute is determined by the SCIM client. Support for this attribute in a SCIM client is <bcp14>OPTIONAL</bcp14>.</t>
          </li>
          <li>
            <t>description: The value of this attribute is a string with the agentic identity's human-readable description. Support for this attribute in a SCIM client is <bcp14>OPTIONAL</bcp14>.</t>
          </li>
          <li>
            <t>displayName: The value of this attribute is a string with the human-readable name of the agentic identity, suitable for display to end-users. Support for this attribute in a SCIM client is <bcp14>RECOMMENDED</bcp14>.</t>
          </li>
        </ul>
        <t>In addition, the AgenticIdentity also has the attributes "externalId", "id", "meta" and "schemas", as described in sections 3 and 3.1 of <xref target="RFC7643"/>.</t>
      </section>
      <section anchor="multi-valued-attributes">
        <name>Multi-valued Attributes</name>
        <t>The resource type AgenticIdentity has the following multi-valued attributes. A SCIM server which implements the Agentic Identity schema <bcp14>SHOULD</bcp14> recognize the attributes "entitlements", "groups", "owners" and "roles". A SCIM server in a service that also supports OAuth token exchange <xref target="RFC8693"/> for agent authentication <bcp14>SHOULD</bcp14> recognize the attribute "oAuthClientIdentifiers".</t>
        <ul spacing="normal">
          <li>
            <t>entitlements: A list of entitlements for the agentic identity that represent a thing the agentic identity has. This attribute is analogous to the "entitlements" attribute of a user as described in section 4.1.2 of <xref target="RFC7643"/>.</t>
          </li>
          <li>
            <t>groups: A list of groups to which the agentic identity belongs, either through direct membership, through nested groups, or dynamically calculated. This attribute is analogous to the "groups" attribute of a user as described in section 4.1.2 of <xref target="RFC7643"/>.</t>
          </li>
          <li>
            <t>oAuthClientIdentifiers: Each value of the attribute is a complex type that describes the OAuth parameters of an agentic identity, for agentic identities that will be authenticating to a service using OAuth token exchange <xref target="RFC8693"/>. Support for this attribute is <bcp14>OPTIONAL</bcp14>. This attribute has six string-valued sub-attributes.
            </t>
            <ul spacing="normal">
              <li>
                <t>audiences: The values of this sub-attribute <bcp14>MAY</bcp14> be present. They are included by the SCIM server in a POST, GET or other response. The format of each value is defined as that of the "aud" claim of section 4.1.3 of <xref target="RFC7519"/>.</t>
              </li>
              <li>
                <t>clientId: The value of this sub-attribute is a client identifier, as described of section 2.2 of <xref target="RFC6749"/>. It is returned by the SCIM server. They are included by the SCIM server in a POST, GET or other response.</t>
              </li>
              <li>
                <t>description: An <bcp14>OPTIONAL</bcp14> human-readable string that further describes the oAuth client identity.</t>
              </li>
              <li>
                <t>issuer: The identity of the identity provider of the agent. The format of the value is defined as that of "iss" claim of section 4.1.1 of <xref target="RFC7519"/>.</t>
              </li>
              <li>
                <t>name: A human-readable name for the OAuth client identity that will be be used by the agent.</t>
              </li>
              <li>
                <t>subject: The identifier of the agent within the identity provider. The format of the value is defined as that of the "sub" claim of section 4.1.2 of <xref target="RFC7519"/>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>owners: A list of the responsible parties for an agentic identity. Each value is a complex type that allows referencing the "id" attribute of a user, a group or other resource already known to the SCIM server. Each value has the following three string sub-attributes.
            </t>
            <ul spacing="normal">
              <li>
                <t>value:  The "id" of the SCIM resource representing the an owner of an agentic identity. <bcp14>RECOMMENDED</bcp14>.</t>
              </li>
              <li>
                <t>$ref:  The URI of the SCIM resource representing an owner of an agentic identity. <bcp14>RECOMMENDED</bcp14>.</t>
              </li>
              <li>
                <t>displayName:  The displayName of the agentic identity's owner. This attribute is <bcp14>OPTIONAL</bcp14>, and mutability is "readOnly".</t>
              </li>
            </ul>
          </li>
          <li>
            <t>roles: A list of roles for the agentic identity. This attribute is analogous to the "roles" attribute of a user as described in section 4.1.2 of <xref target="RFC7643"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="agenticidentity-resource-schema">
        <name>AgenticIdentity Resource Schema</name>
        <t>The AgenticIdentity resource type is for Agentic identity resources. The schema for AgenticIdentity is identified using the following schema URI: "urn:ietf:params:scim:schemas:core:2.0:AgenticIdentity".</t>
        <t>The following is a non-normative example of the SCIM schema representation of an agentic identity in JSON format. Long URL values have been trimmed for formatting.</t>
        <sourcecode type="json"><![CDATA[
  {
   "schemas":[
     "urn:ietf:params:scim:schemas:core:2.0:AgenticIdentity"
   ],
   "id": "95cfaafb-0827-4c60-8236-523ad04b3cba",
   "agenticApplicationId":"8bb1afd8-ae68-40cf-8d53-c7f39ad3d0db",
   "displayName":"Agent for tour guides",
   "externalId":"67890",
   "oAuthClientIdentifiers":[
     {
         "audiences":["https://api.example.com"],
         "issuer":"https://oidc.example.com",
         "name":"an agent",
         "subject":"agent",
         "description":"An agent",
         "clientId": "c002"
     }
    ],
   "groups":[
    {
      "value": "e9e30dba-f08f-4109-8486-d5c6a331660a",
      "$ref":"https://example.com/v2/Groups/e9e...-d5c6a331660a",
      "display": "Tour Guides"
    },
    {
      "value": "9ce138e5-7296-4e3a-94a0-1ea8ce6d6aff",
      "$ref": "https://example.com/v2/Groups/9ce1...-1ea8ce6d6aff",
      "display": "Agentic identities"
    }
    ],
   "meta": {
     "resourceType":"AgenticIdentity"
   }
  }
]]></sourcecode>
      </section>
      <section anchor="updates-to-existing-schema">
        <name>Updates to Existing Schema</name>
        <t>To allow an agentic identity to be a member of a group, this memo augments the definition of the "members" attribute of <xref target="RFC7643"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>allow the referenceTypes of the members "$ref" sub-attribute to also refer to an AgenticIdentity</t>
          </li>
          <li>
            <t>allow the canonicalValues of the members "type" sub-attribute to also allow for "AgenticIdentity"</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operations-on-an-agentic-identity">
      <name>Operations on an Agentic Identity</name>
      <t>A SCIM client and SCIM server exchange agentic identity resources using the SCIM protocol of section 3 of <xref target="RFC7644"/>. Support for bulk operations, as described in section 3.7 of <xref target="RFC7644"/> is <bcp14>OPTIONAL</bcp14>. How the SCIM client authenticates to the SCIM server and is authorized by the SCIM server to perform protocol operations for agentic identities is outside the scope of this document.</t>
      <t>The following is a non-normative example of a SCIM client using two SCIM operations, to create an agentic identity record in the SCIM server and then add the agentic identity to a group, and then using a SCIM operation to remove that agentic identity from the SCIM server.</t>
      <artwork><![CDATA[
SCIM                                                     SCIM
client                                                 server

      POST /AgenticIdentities
      { "displayName":"Agent for tour guides", ...}
      --------------------------------------------->
      201 Created
      { "id": "95c...", ...}
      <---------------------------------------------

      PATCH /Groups/acbf...-9b4da3f908ce
      { "Operations":[ {"op":"add", "path":"members", ... }]}
      --------------------------------------------->
      200 OK
      <---------------------------------------------

   ...
      DELETE /AgenticIdentities/95c...
      --------------------------------------------->
      204 No Content
      <---------------------------------------------

]]></artwork>
      <section anchor="agentic-identity-creation">
        <name>Agentic Identity Creation</name>
        <t>To inform a service of an agent's identity, a SCIM client sends a POST request containing a "AgenticIdentity" to the "/AgenticIdentities" endpoint. The POST request <bcp14>MUST</bcp14> include the following attributes "schemas" and <bcp14>MAY</bcp14> include the following attributes "externalId", "active", "agenticApplicationId", "description", "displayName", "entitlements", "oAuthClientIdentifiers", "owners", "roles".</t>
        <t>In response, a SCIM server signals successful creation with an HTTP status code 201 (Created) and returns a representation of the resource created. The response <bcp14>MUST</bcp14> include the following attributes "id", and "meta". In addition, if the request included the "oAuthClientIdentifiers" attribute, then values of the "issuer", "name" and "subject" sub-attributes <bcp14>MUST</bcp14> be included by the SCIM client in each attribute value, and the response <bcp14>MUST</bcp14> include the "oAuthClientIdentifiers" attribute.</t>
      </section>
      <section anchor="agentic-identity-retrieval">
        <name>Agentic Identity Retrieval</name>
        <t>A SCIM client can retrieve an agentic identity resource using the patterns shown in <xref target="RFC7644"/> section 3.4.</t>
      </section>
      <section anchor="agentic-identity-updates">
        <name>Agentic Identity Updates</name>
        <t>An agentic identity resource's attributes can be modified by a SCIM client using the patterns shown in <xref target="RFC7644"/> section 3.5.</t>
        <t>If the "oAuthClientIdentifiers" attribute is supplied by a SCIM client in a PUT or PATCH request to update an AgenticIdentity, then values of the "issuer", "name" and "subject" sub-attributes <bcp14>MUST</bcp14> be included by the SCIM client in each attribute value.</t>
      </section>
      <section anchor="update-group-membership-of-an-agentic-identity">
        <name>Update Group Membership of an Agentic Identity</name>
        <t>A group membership of an agentic identity can be changed by a SCIM client updating the "members" of the group to add, remove or replace the agentic identity as one of the values. The following is an example representation of a PATCH request for a group to add an agentic identity as a member, showing the basic JSON structure (non-normative):</t>
        <artwork><![CDATA[
   PATCH /Groups/acbf3ae7-8463-...-9b4da3f908ce

   { "schemas":
       ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
     "Operations":[
       {
        "op":"add",
        "path":"members",
        "value":[
         {
           "display": "Agent for tour guides",
           "$ref":
   "https://example.com/v2/AgenticIdentities/95cfaafb...4b3cba",
           "value": "95cfaafb-0827-4c60-8236-523ad04b3cba"
         }
        ]
       }
     ]
   }
]]></artwork>
      </section>
      <section anchor="agentic-identity-deletion">
        <name>Agentic Identity Deletion</name>
        <t>A SCIM client can retrieve an agentic identity resource using the patterns shown in <xref target="RFC7644"/> section 3.6.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>SCIM data is intended to be exchanged using the SCIM protocol. It is important when handling data to implement the security considerations outlined in Section 7 of <xref target="RFC7644"/>.</t>
      <t>When the agentic identity is intended to be used in subsequent OAuth interactions, the guidance from section 10 of <xref target="RFC6749"/> also applies, and when it is intended to be used with OAuth token exchange interactions, the guidance from section 5 of <xref target="RFC8693"/> also applies.</t>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>The text of this privacy section is derived from the corresponding privacy section of <xref target="RFC7643"/>.</t>
        <t>Information should be shared on an as-needed basis. A SCIM client
   should limit information to what it believes a SCIM server
   requires, and a SCIM server should only accept information
   it needs. Clients and servers should take into
   consideration that sensitive information is being conveyed across
   technical (e.g., protocol and applications), administrative (e.g.,
   organizational, corporate), and jurisdictional boundaries. In
   particular, information security and privacy must be considered.</t>
        <t>Security service level agreements for the handling of these
   attributes are beyond the scope of this document but are to be
   carefully considered by implementers and deploying organizations.</t>
        <t>Please see the Privacy Considerations section of <xref target="RFC7644"/> for more
   protocol-specific considerations regarding the handling of SCIM
   information.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-schema">
        <name>New Schema</name>
        <t>When published as an RFC, the IANA is requested to add the following to the "SCIM Schema URIs for Data Resources" established in <xref target="RFC7643"/>:</t>
        <table>
          <name>SCIM Schema URI for Agentic Identity</name>
          <thead>
            <tr>
              <th align="left">Schema URI</th>
              <th align="left">Name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">urn:ietf:params:scim:schemas:core: 2.0:AgenticIdentity</td>
              <td align="left">Agentic Identity Resource</td>
              <td align="left">This memo, section 3</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7643">
          <front>
            <title>System for Cross-domain Identity Management: Core Schema</title>
            <author fullname="P. Hunt" initials="P." role="editor" surname="Hunt"/>
            <author fullname="K. Grizzle" initials="K." surname="Grizzle"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The System for Cross-domain Identity Management (SCIM) specifications are designed to make identity management in cloud-based applications and services easier. The specification suite builds upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. Its intent is to reduce the cost and complexity of user management operations by providing a common user schema and extension model as well as binding documents to provide patterns for exchanging this schema using HTTP.</t>
              <t>This document provides a platform-neutral schema and extension model for representing users and groups and other resource types in JSON format. This schema is intended for exchange and use with cloud service providers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7643"/>
          <seriesInfo name="DOI" value="10.17487/RFC7643"/>
        </reference>
        <reference anchor="RFC7644">
          <front>
            <title>System for Cross-domain Identity Management: Protocol</title>
            <author fullname="P. Hunt" initials="P." role="editor" surname="Hunt"/>
            <author fullname="K. Grizzle" initials="K." surname="Grizzle"/>
            <author fullname="M. Ansari" initials="M." surname="Ansari"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The System for Cross-domain Identity Management (SCIM) specification is an HTTP-based protocol that makes managing identities in multi-domain scenarios easier to support via a standardized service. Examples include, but are not limited to, enterprise-to-cloud service providers and inter-cloud scenarios. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. SCIM's intent is to reduce the cost and complexity of user management operations by providing a common user schema, an extension model, and a service protocol defined by this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7644"/>
          <seriesInfo name="DOI" value="10.17487/RFC7644"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8693">
          <front>
            <title>OAuth 2.0 Token Exchange</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
            <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8693"/>
          <seriesInfo name="DOI" value="10.17487/RFC8693"/>
        </reference>
      </references>
    </references>
    <?line 296?>

<section anchor="changes-from-earlier-versions">
      <name>Changes From Earlier Versions</name>
      <ul spacing="normal">
        <li>
          <t>Changes in -01: Added missing page header and table labels; no protocol or data model changes.</t>
        </li>
        <li>
          <t>-00: Initial revision.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The editor would like to acknowledge the contribution and work of the
  authors of the SCIM RFCs <xref target="RFC7643"/> and <xref target="RFC7644"/> and of other SCIM Internet-Drafts, the participants of the IETF SCIM WG, and the SCIM Community.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
