<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wahl-scim-agent-schema-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="TODO - Abbreviation">System for Cross-domain Identity Management: Agentic Identity Schema</title>
    <seriesInfo name="Internet-Draft" value="draft-wahl-scim-agent-schema-00"/>
    <author fullname="Mark Wahl">
      <organization>Microsoft</organization>
      <address>
        <email>mwahl@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="18"/>
    <area>Security</area>
    <workgroup>System for Cross-domain Identity Management</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>

<t>The System for Cross-domain Identity Management (SCIM) specifications
 are designed to make identity management in cloud-based applications
 and services easier.</t>
      <t>This document provides a platform-neutral schema for representing AI agents' identities in JSON
   format, enabling them to be transferred in the SCIM protocol to the service. This establishes an agentic identity so that an agent can subsequently be authenticated and authorized to interact with the service.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wahl-scim-agent-schema/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        System for Cross-domain Identity Management Working Group mailing list (<eref target="mailto:scim@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scim/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scim/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The SCIM protocol <xref target="RFC7644"/> and core schema <xref target="RFC7643"/> are widely implemented for provisioning records for users into services. The default schema for those user records includes attributes such as a person's name, their desired group memberships, and a password that the user. This enables a SCIM client to inform a SCIM server component of a service of a new user, so that user can be identified in and subsequently authenticated to the service. SCIM also enables lifecycle controls for the SCIM client to update and remove that user record in that service, and associate that user with groups, roles and entitlements.</t>
      <t>With the growth of agentic AI, agents will also need to be able to interact with services. Some services will require an agent to have identities represented in those services. The attributes of an agent identity in a SCIM server can be different from the attributes of a human user identity. Some services allow OAuth <xref target="RFC6749"/> protocols such as token exchange <xref target="RFC8693"/> for an agent's authentication to the service, without needing a shared secret credential between each agent and the service. However, similar to users, an agent's identity might have access rights in the service, represented through relationships of the agent's identity with groups, roles and entitlements in a service.</t>
      <t>As SCIM is familiar within the enterprise and agents often need the same lifecycle signals and group, role or entitlement memberships as users, defining a schema to transport agentic identities in the SCIM protocol simplifies deployment and enables subsequent authentication interactions, consistent controls for those agent's identities and access rights.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="scim-schema-for-agentic-identity">
      <name>SCIM Schema for Agentic Identity</name>
      <t>As an extension to SCIM schema, <xref target="RFC7643"/> sections 3.2 and 3.3, this specification includes one new resource type:</t>
      <ul spacing="normal">
        <li>
          <t>AgenticIdentity: A resource of this type represents an identity of an agent to the service. It includes attributes of an agentic identity needed to be known by a service, including <bcp14>OPTIONAL</bcp14> references to the agentic identity's group memberships, roles and entitlements.</t>
        </li>
      </ul>
      <t>Resources of this type are conveyed in the SCIM protocol <xref target="RFC7644"/> using JSON <xref target="RFC8259"/>. Extension schemas can be defined to extend this resource type, allowing additional attributes.</t>
      <section anchor="single-valued-attributes">
        <name>Single-valued Attributes</name>
        <t>The resource type AgenticIdentity has the following single-valued attributes. A SCIM server which implements the Agentic Identity schema <bcp14>MUST</bcp14> recognize these attributes.</t>
        <ul spacing="normal">
          <li>
            <t>active: A boolean value indicating the agentic identity's administrative status. If absent, then an agentic identity is assumed to be active. A SCIM client can indicate that an agentic identity is inactive by setting it to false. The definitive meaning of this attribute is determined by the SCIM server. Support for this attribute in a SCIM client is <bcp14>OPTIONAL</bcp14>.</t>
          </li>
          <li>
            <t>agenticApplicationId: The value of this attribute is a string with the id of an agentic application, that is assigned by the SCIM client, enabling correlation and reporting in the service for an agentic application that has multiple identities. The attribute <bcp14>MAY</bcp14> be included when the AgenticIdentity is created. The definitive meaning of this attribute is determined by the SCIM client. Support for this attribute in a SCIM client is <bcp14>OPTIONAL</bcp14>.</t>
          </li>
          <li>
            <t>description: The value of this attribute is a string with the agentic identity's human-readable description. Support for this attribute in a SCIM client is <bcp14>OPTIONAL</bcp14>.</t>
          </li>
          <li>
            <t>displayName: The value of this attribute is a string with the human-readable name of the agentic identity, suitable for display to end-users. Support for this attribute in a SCIM client is <bcp14>RECOMMENDED</bcp14>.</t>
          </li>
        </ul>
        <t>In addition, the AgenticIdentity also has the attributes "externalId", "id", "meta" and "schemas", as described in sections 3 and 3.1 of <xref target="RFC7643"/>.</t>
      </section>
      <section anchor="multi-valued-attributes">
        <name>Multi-valued Attributes</name>
        <t>The resource type AgenticIdentity has the following multi-valued attributes. A SCIM server which implements the Agentic Identity schema <bcp14>SHOULD</bcp14> recognize the attributes "entitlements", "groups", "owners" and "roles".  A SCIM server in a service that also supports OAuth token exchange <xref target="RFC8693"/> for agent authentication <bcp14>SHOULD</bcp14> recognize the attribute "oAuthClientIdentifiers".</t>
        <ul spacing="normal">
          <li>
            <t>entitlements: A list of entitlements for the agentic identity that represent a thing the agentic identity has. This attribute is analogous to the "entitlements" attribute of a user as described in section 4.1.2 of <xref target="RFC7643"/>.</t>
          </li>
          <li>
            <t>groups: A list of groups to which the agentic identity belongs, either through direct membership, through nested groups, or dynamically calculated. This attribute is analogous to the "groups" attribute of a user as described in section 4.1.2 of <xref target="RFC7643"/>.</t>
          </li>
          <li>
            <t>oAuthClientIdentifiers: Each value of the attribute is a complex type that describes the OAuth parameters of an agentic identity, for agentic identities that will be authenticating to a service using OAuth token exchange <xref target="RFC8693"/>. Support for this attribute is <bcp14>OPTIONAL</bcp14>. This attribute has six string-valued sub-attributes.
            </t>
            <ul spacing="normal">
              <li>
                <t>audiences: The values of this sub-attribute <bcp14>MAY</bcp14> be present. They are included by the SCIM server in a POST, GET or other response.  The format of each value is defined as that of the "aud" claim of section 4.1.3 of <xref target="RFC7519"/>.</t>
              </li>
              <li>
                <t>clientId: The value of this sub-attribute is a client identifier, as described of section 2.2 of <xref target="RFC6749"/>. It is returned by the SCIM server. They are included by the SCIM server in a POST, GET or other response.</t>
              </li>
              <li>
                <t>description: An <bcp14>OPTIONAL</bcp14> human-readable string that further describes the oAuth client identity.</t>
              </li>
              <li>
                <t>issuer: The identity of the identity provider of the agent. The format of the value is defined as that of "iss" claim of section 4.1.1 of <xref target="RFC7519"/>.</t>
              </li>
              <li>
                <t>name: A human-readable name for the OAuth client identity that will be be used by the agent.</t>
              </li>
              <li>
                <t>subject: The identifier of the agent within the identity provider. The format of the value is defined as that of the "sub" claim of section 4.1.2 of <xref target="RFC7519"/>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>owners: A list of the responsible parties for an agentic identity. Each value is a complex type that allows referencing the "id" attribute of a user, a group or other resource already known to the SCIM server. Each value has the following three string sub-attributes.
            </t>
            <ul spacing="normal">
              <li>
                <t>value:  The "id" of the SCIM resource representing the an owner of an agentic identity. <bcp14>RECOMMENDED</bcp14>.</t>
              </li>
              <li>
                <t>$ref:  The URI of the SCIM resource representing an owner of an agentic identity. <bcp14>RECOMMENDED</bcp14>.</t>
              </li>
              <li>
                <t>displayName:  The displayName of the agentic identity's owner.  This attribute is <bcp14>OPTIONAL</bcp14>, and mutability is "readOnly".</t>
              </li>
            </ul>
          </li>
          <li>
            <t>roles: A list of roles for the agentic identity. This attribute is analogous to the "roles" attribute of a user as described in section 4.1.2 of <xref target="RFC7643"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="agenticidentity-resource-schema">
        <name>AgenticIdentity Resource Schema</name>
        <t>The AgenticIdentity resource type is for Agentic identity resources.  The schema for AgenticIdentity is identified using the following schema URI: "urn:ietf:params:scim:schemas:core:2.0:AgenticIdentity".</t>
        <t>The following is a non-normative example of the SCIM schema representation of an agentic identity in JSON format. Long URL values have been trimmed for formatting.</t>
        <sourcecode type="json"><![CDATA[
  {
   "schemas":[
     "urn:ietf:params:scim:schemas:core:2.0:AgenticIdentity"
   ],
   "id": "95cfaafb-0827-4c60-8236-523ad04b3cba",
   "agenticApplicationId":"8bb1afd8-ae68-40cf-8d53-c7f39ad3d0db",
   "displayName":"Agent for tour guides",
   "externalId":"67890",
   "oAuthClientIdentifiers":[
     {
         "audiences":["https://api.example.com"],
         "issuer":"https://oidc.example.com",
         "name":"an agent",
         "subject":"agent",
         "description":"An agent",
         "clientId": "c002"
     }
    ],
   "groups":[
    {
      "value": "e9e30dba-f08f-4109-8486-d5c6a331660a",
      "$ref":"https://example.com/v2/Groups/e9e...-d5c6a331660a",
      "display": "Tour Guides"
    },
    {
      "value": "9ce138e5-7296-4e3a-94a0-1ea8ce6d6aff",
      "$ref": "https://example.com/v2/Groups/9ce1...-1ea8ce6d6aff",
      "display": "Agentic identities"
    }
    ],
   "meta": {
     "resourceType":"AgenticIdentity"
   }
  }
]]></sourcecode>
      </section>
      <section anchor="updates-to-existing-schema">
        <name>Updates to Existing Schema</name>
        <t>To allow an agentic identity to be a member of a group, this memo augments the definition of the "members" attribute of <xref target="RFC7643"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>allow the referenceTypes of the members "$ref" sub-attribute to also refer to an AgenticIdentity</t>
          </li>
          <li>
            <t>allow the canonicalValues of the members "type" sub-attribute to also allow for "AgenticIdentity"</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operations-on-an-agentic-identity">
      <name>Operations on an Agentic Identity</name>
      <t>A SCIM client and SCIM server exchange agentic identity resources using the SCIM protocol of section 3 of <xref target="RFC7644"/>. Support for bulk operations, as described in section 3.7 of <xref target="RFC7644"/> is <bcp14>OPTIONAL</bcp14>. How the SCIM client authenticates to the SCIM server and is authorized by the SCIM server to perform protocol operations for agentic identities is outside the scope of this document.</t>
      <t>The following is a non-normative example of a SCIM client using two SCIM operations, to create an agentic identity record in the SCIM server and then add the agentic identity to a group, and then using a SCIM operation to remove that agentic identity from the SCIM server.</t>
      <artwork><![CDATA[
SCIM                                                     SCIM
client                                                 server

      POST /AgenticIdentities
      { "displayName":"Agent for tour guides", ...}
      --------------------------------------------->
      201 Created
      { "id": "95c...", ...}
      <---------------------------------------------

      PATCH /Groups/acbf...-9b4da3f908ce
      { "Operations":[ {"op":"add", "path":"members", ... }]}
      --------------------------------------------->
      200 OK
      <---------------------------------------------

   ...
      DELETE /AgenticIdentities/95c...
      --------------------------------------------->
      204 No Content
      <---------------------------------------------

]]></artwork>
      <section anchor="agentic-identity-creation">
        <name>Agentic Identity Creation</name>
        <t>To inform a service of an agent's identity, a SCIM client sends a POST request containing a "AgenticIdentity" to the "/AgenticIdentities" endpoint. The POST request <bcp14>MUST</bcp14> include the following attributes "schemas" and <bcp14>MAY</bcp14> include the following attributes "externalId", "active", "agenticApplicationId", "description", "displayName", "entitlements", "oAuthClientIdentifiers", "owners", "roles".</t>
        <t>In response, a SCIM server signals successful creation with an HTTP status code 201 (Created) and returns a representation of the resource created. The response <bcp14>MUST</bcp14> include the following attributes "id", and "meta". In addition, if the request included the "oAuthClientIdentifiers" attribute, then values of the "issuer", "name" and "subject" sub-attributes <bcp14>MUST</bcp14> be included by the SCIM client in each attribute value, and the response <bcp14>MUST</bcp14> include the "oAuthClientIdentifiers" attribute.</t>
      </section>
      <section anchor="agentic-identity-retrieval">
        <name>Agentic Identity Retrieval</name>
        <t>A SCIM client can retrieve an agentic identity resource using the patterns shown in <xref target="RFC7644"/> section 3.4.</t>
      </section>
      <section anchor="agentic-identity-updates">
        <name>Agentic Identity Updates</name>
        <t>An agentic identity resource's attributes can be modified by a SCIM client using the patterns shown in <xref target="RFC7644"/> section 3.5.</t>
        <t>If the "oAuthClientIdentifiers" attribute is supplied by a SCIM client in a PUT or PATCH request to update an AgenticIdentity, then values of the "issuer", "name" and "subject" sub-attributes <bcp14>MUST</bcp14> be included by the SCIM client in each attribute value.</t>
      </section>
      <section anchor="update-group-membership-of-an-agentic-identity">
        <name>Update Group Membership of an Agentic Identity</name>
        <t>A group membership of an agentic identity can be changed by a SCIM client updating the "members" of the group to add, remove or replace the agentic identity as one of the values. The following is an example representation of a PATCH request for a group to add an agentic identity as a member, showing the basic JSON structure (non-normative):</t>
        <artwork><![CDATA[
   PATCH /Groups/acbf3ae7-8463-...-9b4da3f908ce

   { "schemas":
       ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
     "Operations":[
       {
        "op":"add",
        "path":"members",
        "value":[
         {
           "display": "Agent for tour guides",
           "$ref":
   "https://example.com/v2/AgenticIdentities/95cfaafb...4b3cba",
           "value": "95cfaafb-0827-4c60-8236-523ad04b3cba"
         }
        ]
       }
     ]
   }
]]></artwork>
      </section>
      <section anchor="agentic-identity-deletion">
        <name>Agentic Identity Deletion</name>
        <t>A SCIM client can retrieve an agentic identity resource using the patterns shown in <xref target="RFC7644"/> section 3.6.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>SCIM data is intended to be exchanged using the SCIM protocol. It is important when handling data to implement the security considerations outlined in Section 7 of <xref target="RFC7644"/>.</t>
      <t>When the agentic identity is intended to be used in subsequent OAuth interactions, the guidance from section 10 of <xref target="RFC6749"/> also applies, and when it is intended to be used with OAuth token exchange interactions, the guidance from section 5 of <xref target="RFC8693"/> also applies.</t>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>The text of this privacy section is derived from the corresponding privacy section of <xref target="RFC7643"/>.</t>
        <t>Information should be shared on an as-needed basis. A SCIM client
   should limit information to what it believes a SCIM server
   requires, and a SCIM server should only accept information
   it needs. Clients and servers should take into
   consideration that sensitive information is being conveyed across
   technical (e.g., protocol and applications), administrative (e.g.,
   organizational, corporate), and jurisdictional boundaries. In
   particular, information security and privacy must be considered.</t>
        <t>Security service level agreements for the handling of these
   attributes are beyond the scope of this document but are to be
   carefully considered by implementers and deploying organizations.</t>
        <t>Please see the Privacy Considerations section of <xref target="RFC7644"/> for more
   protocol-specific considerations regarding the handling of SCIM
   information.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-schema">
        <name>New Schema</name>
        <t>When published as an RFC, the IANA is requested to add the following addition to the "SCIM Schema URIs for Data Resources" established in <xref target="RFC7643"/>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">URN</th>
              <th align="left">Name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">urn:ietf:params:scim:schemas:core: 2.0:AgenticIdentity</td>
              <td align="left">AgenticIdentity</td>
              <td align="left">This memo, section 3</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7643">
          <front>
            <title>System for Cross-domain Identity Management: Core Schema</title>
            <author fullname="P. Hunt" initials="P." role="editor" surname="Hunt"/>
            <author fullname="K. Grizzle" initials="K." surname="Grizzle"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The System for Cross-domain Identity Management (SCIM) specifications are designed to make identity management in cloud-based applications and services easier. The specification suite builds upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. Its intent is to reduce the cost and complexity of user management operations by providing a common user schema and extension model as well as binding documents to provide patterns for exchanging this schema using HTTP.</t>
              <t>This document provides a platform-neutral schema and extension model for representing users and groups and other resource types in JSON format. This schema is intended for exchange and use with cloud service providers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7643"/>
          <seriesInfo name="DOI" value="10.17487/RFC7643"/>
        </reference>
        <reference anchor="RFC7644">
          <front>
            <title>System for Cross-domain Identity Management: Protocol</title>
            <author fullname="P. Hunt" initials="P." role="editor" surname="Hunt"/>
            <author fullname="K. Grizzle" initials="K." surname="Grizzle"/>
            <author fullname="M. Ansari" initials="M." surname="Ansari"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The System for Cross-domain Identity Management (SCIM) specification is an HTTP-based protocol that makes managing identities in multi-domain scenarios easier to support via a standardized service. Examples include, but are not limited to, enterprise-to-cloud service providers and inter-cloud scenarios. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. SCIM's intent is to reduce the cost and complexity of user management operations by providing a common user schema, an extension model, and a service protocol defined by this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7644"/>
          <seriesInfo name="DOI" value="10.17487/RFC7644"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8693">
          <front>
            <title>OAuth 2.0 Token Exchange</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
            <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8693"/>
          <seriesInfo name="DOI" value="10.17487/RFC8693"/>
        </reference>
      </references>
    </references>
    <?line 295?>

<section anchor="changes-from-earlier-versions">
      <name>Changes From Earlier Versions</name>
      <t>This is the initial revision.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The editor would like to acknowledge the contribution and work of the
  authors of the SCIM RFCs <xref target="RFC7643"/> and <xref target="RFC7644"/> and of other SCIM Internet-Drafts, the participants of the IETF SCIM WG, and the SCIM Community.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
