| Internet-Draft | AAuth-R3 | April 2026 |
| Hardt | Expires 4 October 2026 | [Page] |
This document defines AAuth Rich Resource Requests (R3), an extension to the AAuth Protocol ([I-D.hardt-aauth-protocol]) that enables structured, vocabulary-based authorization for resource access. Resources publish R3 documents (content-addressed authorization definitions) and advertise vocabularies describing their operations. Agents request access using those vocabularies. Auth tokens carry granted operations in the same vocabulary format, enabling resources to enforce authorization directly from the token. R3 provides human-displayable context for consent decisions and content-addressed audit provenance via the r3_s256 hash in auth tokens.¶
Note: This section is to be removed before publishing as an RFC.¶
This document is part of the AAuth specification family. Source for this draft and an issue tracker can be found at https://github.com/dickhardt/AAuth.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 4 October 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Status: Exploratory Draft¶
The AAuth Protocol ([I-D.hardt-aauth-protocol]) defines resource tokens as the mechanism by which resources declare what authorization is needed to access them, and scope strings as the primary way to express what operations are available. Scopes are sufficient for simple, well-known access patterns but are limited in three respects:¶
Human comprehension. Scope strings like calendar:write are not self-describing to users or auth agents making approval decisions.¶
Machine precision. Scopes do not express which specific operations are being authorized or distinguish operations that need per-call approval.¶
Audit completeness. Scopes do not identify which specific version of an authorization definition was in effect at the time of approval.¶
R3 addresses these by introducing:¶
{::boilerplate bcp14-tagged}¶
r3_uri): A URI identifying an R3 document. Included in a resource token.¶
r3_s256): A SHA-256 hash of the R3 document, base64url-encoded without padding. Included alongside r3_uri in the resource token and the auth token.¶
Resources advertise their supported vocabularies in well-known metadata. Each vocabulary maps to an API description format that agents already know how to discover and parse.¶
R3 extends the /.well-known/aauth-resource.json document defined in AAuth Protocol ([I-D.hardt-aauth-protocol]):¶
{
"resource": "https://calendar.example.com",
"resource_token_endpoint": "https://calendar.example.com/aauth/token",
"r3_vocabularies": {
"urn:aauth:vocabulary:mcp": "https://calendar.example.com/mcp",
"urn:aauth:vocabulary:openapi": "https://calendar.example.com/openapi.json"
}
}
¶
r3_vocabularies (OPTIONAL). A JSON object mapping vocabulary URIs to their discovery endpoints. Keys MUST be vocabulary URIs from the urn:aauth:vocabulary: namespace for standard vocabularies defined in this document, or third-party URI namespaces for proprietary vocabularies. Values are vocabulary-specific discovery endpoints (the MCP server URL, the OpenAPI spec URL, the gRPC reflection endpoint, etc.). A resource MAY advertise multiple vocabularies simultaneously.¶
This document defines seven standard vocabularies. Third parties MAY define additional vocabularies using their own URI namespaces. Each vocabulary defines: the vocabulary URI, the structure of operation requests, how the resource maps operations to R3 documents, and the discovery endpoint.¶
Standard vocabularies use the urn:aauth:vocabulary: namespace.¶
urn:aauth:vocabulary:mcp)
For resources that expose an MCP server. The discovery endpoint is the MCP server URL. Agents discover available tool names via MCP tool discovery.¶
Each operation entry contains:¶
tool (REQUIRED). The MCP tool name as advertised by the MCP server's tool discovery.¶
{
"vocabulary": "urn:aauth:vocabulary:mcp",
"operations": [
{ "tool": "create_calendar_event" },
{ "tool": "modify_calendar_event" }
]
}
¶
urn:aauth:vocabulary:openapi)
For resources that expose an OpenAPI-described HTTP API. The discovery endpoint is the OpenAPI specification URL. Agents discover available operations by fetching and parsing the spec.¶
Each operation entry contains:¶
operationId (REQUIRED). The operationId as defined in the OpenAPI specification.¶
{
"vocabulary": "urn:aauth:vocabulary:openapi",
"operations": [
{ "operationId": "createEvent" },
{ "operationId": "updateEvent" }
]
}
¶
urn:aauth:vocabulary:grpc)
For resources that expose a gRPC server. The discovery endpoint is the gRPC server reflection endpoint (supporting grpc.reflection.v1.ServerReflection) or a hosted .proto file URL.¶
Each operation entry contains:¶
method (REQUIRED). The fully qualified gRPC method name in the form package.ServiceName/MethodName.¶
{
"vocabulary": "urn:aauth:vocabulary:grpc",
"operations": [
{ "method": "calendar.CalendarService/CreateEvent" },
{ "method": "calendar.CalendarService/UpdateEvent" }
]
}
¶
urn:aauth:vocabulary:graphql)
For resources that expose a GraphQL API. The discovery endpoint is the GraphQL endpoint. Agents discover available operations via GraphQL introspection (__schema query).¶
Each operation entry contains:¶
operation (REQUIRED). The GraphQL operation name. MUST be a named query, mutation, or subscription.¶
type (REQUIRED). One of query, mutation, or subscription.¶
{
"vocabulary": "urn:aauth:vocabulary:graphql",
"operations": [
{ "operation": "CreateCalendarEvent", "type": "mutation" },
{ "operation": "GetCalendarEvents", "type": "query" }
]
}
¶
urn:aauth:vocabulary:asyncapi)
For resources that expose an event-driven interface described by AsyncAPI. The discovery endpoint is the AsyncAPI specification URL.¶
Each operation entry contains:¶
operationId (REQUIRED). The operationId as defined in the AsyncAPI specification.¶
action (REQUIRED). One of send or receive.¶
{
"vocabulary": "urn:aauth:vocabulary:asyncapi",
"operations": [
{ "operationId": "publishCalendarUpdate", "action": "send" },
{ "operationId": "receiveCalendarEvent", "action": "receive" }
]
}
¶
urn:aauth:vocabulary:wsdl)
For resources that expose a SOAP/WSDL-described web service. The discovery endpoint is the WSDL document URL.¶
Each operation entry contains:¶
operation (REQUIRED). The operation name as defined in the WSDL portType or binding.¶
service (OPTIONAL). The WSDL service name, for disambiguation when multiple services expose the same operation name.¶
{
"vocabulary": "urn:aauth:vocabulary:wsdl",
"operations": [
{ "operation": "CreateCalendarEvent", "service": "CalendarService" }
]
}
¶
urn:aauth:vocabulary:odata)
For resources that expose an OData service. The discovery endpoint is the OData service root URL. Agents discover entity sets, functions, and actions via the $metadata document.¶
Each operation entry contains:¶
operation (REQUIRED). An entity set name, a bound function (EntitySet/FunctionName), or a bound action (EntitySet/ActionName).¶
methods (OPTIONAL). An array of HTTP methods for entity set CRUD (e.g., ["GET", "POST"]). Omitted for bound functions and actions.¶
{
"vocabulary": "urn:aauth:vocabulary:odata",
"operations": [
{ "operation": "Events", "methods": ["GET", "POST", "PATCH"] },
{ "operation": "Events/SendCancellation" }
]
}
¶
When an agent wants to acquire a resource token proactively, before making an API call rather than waiting for a 401, it calls the resource_token_endpoint with an r3_operations parameter describing what it intends to do in the resource's vocabulary.¶
POST /aauth/token HTTP/1.1
Host: calendar.example.com
Content-Type: application/json
Signature-Input: sig=("@method" "@authority" "@path" "signature-key");created=1741824000
Signature: sig=:...signature bytes...:
Signature-Key: sig=jwt;jwt="eyJhbGc..."
{
"r3_operations": {
"vocabulary": "urn:aauth:vocabulary:openapi",
"operations": [
{ "operationId": "createEvent" },
{ "operationId": "updateEvent" }
]
}
}
¶
r3_operations (REQUIRED). An object containing:¶
The resource maps the declared operations to an appropriate R3 document and returns a signed resource token:¶
{
"resource_token": "eyJhbGciOiJFUzI1NiJ9..."
}
¶
The resource token contains r3_uri and r3_s256 identifying the R3 document that covers the requested operations. The resource's internal mapping from operations to R3 documents is opaque to the agent.¶
An R3 document is a JSON object published by the resource at a URI. It describes the authorization semantics for a class of access: what operations are covered (in vocabulary format), what the access means in human terms, and what consequences it carries.¶
The document MUST be served over HTTPS. The resource MUST require a valid HTTP Message Signature on requests to R3 document URIs, and MUST reject requests that are not signed by the resource's AS. Agents cannot fetch R3 documents.¶
{
"type": "urn:example:calendar:write",
"version": "2",
"vocabulary": "urn:aauth:vocabulary:mcp",
"operations": [
{ "tool": "create_calendar_event" },
{ "tool": "modify_calendar_event" }
],
"display": {
"summary": "Create and modify events on your work calendar",
"implications": "Meetings can be scheduled or rescheduled. Existing events can be modified.",
"data_accessed": "Event titles, times, attendees, and descriptions in the work calendar",
"irreversible": "Sent meeting invitations cannot be unsent"
}
}
¶
type (REQUIRED). A URI identifying the class of authorization. SHOULD be a namespaced URI under the resource's authority.¶
version (RECOMMENDED). A string identifying the version of this authorization type definition. The combination of URI + SHA-256 hash provides content-addressing independent of this field; version is for human readability.¶
vocabulary (REQUIRED). The vocabulary URI identifying how operations are expressed. MUST match one of the vocabularies the resource advertises in r3_vocabularies.¶
operations (REQUIRED). An array of operations covered by this R3 document, using the vocabulary-specific structure defined in {{mcp-vocabulary}} through {{odata-vocabulary}}. This is the same format used in the agent's r3_operations request and in the auth token's r3_granted and r3_conditional claims.¶
display (RECOMMENDED). Human-readable descriptions of the consequences of granting this access. The resource describes what it does, not what the agent intends:¶
summary (REQUIRED if display present). A short plain-language description suitable for a consent UI or auth agent.¶
implications (OPTIONAL). Side effects of granting this access: emails sent, records modified, costs incurred.¶
data_accessed (OPTIONAL). What data becomes visible to the caller.¶
irreversible (OPTIONAL). Plain-language description of actions that cannot be undone.¶
The R3 hash (r3_s256) is computed as the SHA-256 hash of the canonical JSON serialization ([RFC8785]) of the R3 document, base64url-encoded without padding.¶
The r3_s256 hash is the document's identity, not the URI. The AS caches documents by hash. If a resource updates the document at the same URI, existing auth tokens still reference the previous hash (which the AS has cached). New resource tokens reference the new hash. This enables:¶
R3 extends the resource token defined in AAuth Protocol ([I-D.hardt-aauth-protocol]) (a JWT with typ: resource+jwt) with two additional payload claims. When a resource includes R3 information, it MUST include both.¶
Base claims (from AAuth Protocol):
- iss: Resource URL
- dwk: aauth-resource.json
- aud: Auth server URL
- jti: Unique token identifier
- agent: Agent identifier
- agent_jkt: JWK Thumbprint of the agent's signing key
- iat: Issued at timestamp
- exp: Expiration timestamp
- scope: Requested scopes (optional)¶
R3 extension claims:
- r3_uri (REQUIRED for R3): The URI where the AS can fetch the R3 document. The AS authenticates itself using an HTTP Message Signature.
- r3_s256 (REQUIRED for R3): The SHA-256 hash of the R3 document at r3_uri, base64url-encoded without padding.¶
{
"typ": "resource+jwt",
"alg": "ES256",
"kid": "resource-key-1"
}
¶
{
"iss": "https://calendar.example.com",
"dwk": "aauth-resource.json",
"aud": "https://as.example.com",
"jti": "rt-8f3a2b",
"agent": "assistant@agent.example",
"agent_jkt": "NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs",
"r3_uri": "https://calendar.example.com/r3/a1b2c3d4",
"r3_s256": "aBcDeFgHiJkLmNoPqRsTuVwXyZ0123456789abcd",
"iat": 1741824000,
"exp": 1741824300
}
¶
Resource tokens MAY include both scope (as defined in AAuth Protocol ([I-D.hardt-aauth-protocol])) and R3 claims. When both are present, the AS MUST enforce both independently.¶
When the AS receives a resource token containing r3_uri and r3_s256, it MUST:¶
r3_uri. The AS MAY use a cached copy if the cache entry was stored with the same r3_s256 value.¶
r3_s256. If the hashes do not match, the AS MUST reject the resource token.¶
r3_uri and r3_s256 in its audit log alongside the token issuance event, the agent identifier, and the timestamp.¶
display section when presenting the authorization request to a human approver or auth agent, and the operations section for policy evaluation.¶
r3_uri, r3_s256, r3_granted, and (if applicable) r3_conditional in the issued auth token.¶
R3 extends the auth token defined in AAuth Protocol ([I-D.hardt-aauth-protocol]) (a JWT with typ: auth+jwt) with claims for audit provenance and vocabulary-based grants. The resource can enforce authorization directly from these claims.¶
Base claims (from AAuth Protocol):
- iss: Auth server URL
- dwk: aauth-issuer.json
- aud: Resource URL
- jti: Unique token identifier
- agent: Agent identifier
- cnf: Confirmation claim with jwk containing the agent's public key
- iat: Issued at timestamp
- exp: Expiration timestamp
- sub: User identifier (conditional)
- scope: Authorized scopes (conditional)¶
R3 extension claims:
- r3_uri (REQUIRED for R3): The URI of the R3 document that was in effect at approval time.
- r3_s256 (REQUIRED for R3): The SHA-256 hash of that R3 document.
- r3_granted (REQUIRED for R3): Operations the AS fully authorized. The resource serves these immediately.
- r3_conditional (OPTIONAL): Operations authorized in principle but requiring per-call approval based on the specific parameters the agent provides.¶
{
"typ": "auth+jwt",
"alg": "ES256",
"kid": "as-key-1"
}
¶
{
"iss": "https://as.example.com",
"dwk": "aauth-issuer.json",
"aud": "https://calendar.example.com",
"jti": "at-9d4c1e",
"agent": "assistant@agent.example",
"sub": "user:alice@example.com",
"cnf": { "jwk": { "kty": "OKP", "crv": "Ed25519", "x": "NzbLsXh8uDCcd..." } },
"r3_uri": "https://calendar.example.com/r3/a1b2c3d4",
"r3_s256": "aBcDeFgHiJkLmNoPqRsTuVwXyZ0123456789abcd",
"r3_granted": {
"vocabulary": "urn:aauth:vocabulary:mcp",
"operations": [
{ "tool": "list_calendar_events" },
{ "tool": "modify_calendar_event" }
]
},
"r3_conditional": {
"vocabulary": "urn:aauth:vocabulary:mcp",
"operations": [
{ "tool": "create_calendar_event" }
]
},
"iat": 1741824000,
"exp": 1741824900
}
¶
r3_uri and r3_s256 provide audit provenance: a permanent, verifiable record of which R3 document was in effect at approval time. The AS can verify the R3 document by fetching r3_uri and checking r3_s256.¶
r3_granted and r3_conditional use the same vocabulary-specific operation format as the R3 document's operations field and the agent's r3_operations request:¶
vocabulary (REQUIRED). The vocabulary URI.¶
operations (REQUIRED). An array of operations using the vocabulary-specific structure. The AS MAY narrow the grant to fewer operations than defined in the R3 document.¶
The distinction: r3_granted operations are fully authorized and the resource serves them. r3_conditional operations require the resource to challenge when the agent actually calls, including the specific parameters from the agent's API request in the resource token. The AS then evaluates those concrete parameters before issuing a per-call auth token.¶
The resource matches each incoming API call against the auth token claims:¶
r3_granted: serve the request.¶
r3_conditional: return AAuth-Requirement with a resource token containing the actual parameters the agent provided. The AS evaluates the specific call.¶
No token introspection or R3 document fetch is needed at enforcement time. The resource uses the vocabulary it already understands.¶
When r3_operations was not used (the agent received the resource token via a 401 rather than the resource token endpoint), the AS populates r3_granted and r3_conditional based on the operations defined in the R3 document and its own policy. The AS decides which operations to grant outright and which to make conditional.¶
The AS MUST authenticate itself when fetching r3_uri using an HTTP Message Signature as defined in AAuth Headers ([I-D.hardt-aauth-headers]). The resource MUST reject requests not signed by its AS.¶
This prevents agents from fetching R3 documents by following the r3_uri they carry in the resource token. Since a resource has exactly one AS, the resource only needs to recognize signatures from that AS. The agent opacity property (agents carry the hash of a document they cannot read) depends on this restriction.¶
The AS MUST verify r3_s256 against the fetched document before using it. Failure to verify allows a resource to serve different content than what was hashed in the resource token.¶
The AS MUST write audit log entries atomically with token issuance. An auth token issued without a corresponding audit log entry creates an undetectable gap in the observability record. Implementations SHOULD use transactional writes or equivalent mechanisms.¶
For all vocabularies, the resource MUST validate declared operations against its authoritative definition (MCP tool list, OpenAPI spec, .proto file, GraphQL schema, AsyncAPI spec, WSDL document, or OData $metadata) before issuing a resource token.¶
Resources MUST enforce r3_granted and r3_conditional claims in auth tokens. Operations in r3_granted define fully authorized access. Operations in r3_conditional MUST trigger an AAuth-Requirement before being served. The resource MUST reject API calls that do not match an operation in either claim.¶
This document requests registration of the following JWT claims in the IANA JSON Web Token Claims registry:¶
| Claim | Description | Reference |
|---|---|---|
r3_uri
|
R3 document URI | This document |
r3_s256
|
R3 document SHA-256 hash | This document |
r3_granted
|
Fully authorized operations in vocabulary format | This document |
r3_conditional
|
Conditionally authorized operations requiring per-call approval | This document |
This specification establishes the AAuth R3 Vocabulary Registry. The initial contents are:¶
| Vocabulary URI | Interface Type | Reference |
|---|---|---|
urn:aauth:vocabulary:mcp
|
MCP server | This document |
urn:aauth:vocabulary:openapi
|
HTTP/REST | This document |
urn:aauth:vocabulary:grpc
|
gRPC | This document |
urn:aauth:vocabulary:graphql
|
GraphQL | This document |
urn:aauth:vocabulary:asyncapi
|
Event-driven | This document |
urn:aauth:vocabulary:wsdl
|
SOAP/WSDL | This document |
urn:aauth:vocabulary:odata
|
OData | This document |
New values may be registered following the Specification Required policy ([RFC8126]).¶
Note: This section is to be removed before publishing as an RFC.¶
This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in [RFC7942]. The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.¶
There are currently no known implementations.¶
Note: This section is to be removed before publishing as an RFC.¶
The author would like to thank reviewers for their feedback.¶
OAuth 2.0 Rich Authorization Requests ([RFC9396]) defines authorization_details as a structured extension to authorization requests. RAR is a natural reference point for this work. R3 deliberately does not use or profile RAR for the following reasons:¶
Directionality. RAR is client-declared: the agent constructs authorization_details and sends it to the AS. The agent defines what it wants. R3 is resource-declared: the resource defines what access it provides and signs that definition. The agent cannot modify or reframe it. This is the opposite directionality, and the security properties depend on it.¶
Agent opacity. In R3, the R3 document is fetched by the AS directly from the resource, restricted to AS-only access. The agent carries a hash of a document it cannot read. RAR has no equivalent because the client constructs the authorization details and necessarily knows their content.¶
Content addressing. R3 uses a content-addressed URI plus SHA-256 hash to pin the exact authorization semantics in effect at approval time. An auth token carrying r3_uri and r3_s256 is a permanent, verifiable record. RAR carries no equivalent versioning or integrity guarantee.¶
Audit trail. The AS records r3_uri in its audit log, creating a durable reference to the exact R3 document version. This is not possible with RAR's inline authorization_details structure.¶
RAR and R3 are complementary. RAR remains appropriate for client-declared authorization detail. R3 addresses the resource-declared case that RAR was not designed for.¶
| Vocabulary URI | Interface Type | Operation Identifier | Discovery Mechanism |
|---|---|---|---|
urn:aauth:vocabulary:mcp
|
MCP server | Tool name | MCP tool discovery |
urn:aauth:vocabulary:openapi
|
HTTP/REST |
operationId
|
OpenAPI spec URL |
urn:aauth:vocabulary:grpc
|
gRPC |
package.Service/Method
|
Server reflection or .proto URL |
urn:aauth:vocabulary:graphql
|
GraphQL | Operation name | GraphQL introspection |
urn:aauth:vocabulary:asyncapi
|
Event-driven |
operationId
|
AsyncAPI spec URL |
urn:aauth:vocabulary:wsdl
|
SOAP/WSDL | Operation name | WSDL document URL |
urn:aauth:vocabulary:odata
|
OData | Entity set or bound operation |
$metadata URL |
| Property | RAR ([RFC9396]) | R3 |
|---|---|---|
| Who declares | Client (agent) | Resource |
| Direction | Client -> AS | Resource -> AS (via agent carrier) |
| Agent visibility | Agent constructs the detail | Agent carries opaque token |
| Versioning | None | Content-addressed URI + hash |
| Audit trail | Inline in request |
r3_uri recorded by AS |
| Human display | Not specified |
display section in R3 document |
| Irreversibility signal | Not specified |
display.irreversible field |