<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-wimse-identifier-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Workload Identifier">Workload Identifier</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-identifier-02"/>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yaroslavros@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>CyberArk</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area/>
    <workgroup>Workload Identity in Multi System Environments</workgroup>
    <keyword>workload</keyword>
    <keyword>identifier</keyword>
    <abstract>
      <?line 46?>

<t>This document defines a canonical identifier for workloads, referred to as the Workload Identifier. A Workload Identifier is a URI that uniquely identifies a workload within the context of a specific trust domain. This identifier can be embedded in digital credentials, including X.509 certificates and security tokens, to support authentication, authorization, and policy enforcement across diverse systems. The Workload Identifier format ensures interoperability, facilitates secure identity federation, and enables consistent identity semantics.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-wimse.github.io/draft-ietf-wimse-identifier/draft-ietf-wimse-identifier.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-wimse-identifier/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Workload Identity in Multi System Environments  mailing list (<eref target="mailto:wimse@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/wimse/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/wimse/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-wimse/draft-ietf-wimse-identifier"/>.</t>
    </note>
  </front>
  <middle>
    <?line 51?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In modern distributed systems, workloads such as services, applications, or containerised tasks require cryptographically verifiable identities to support secure communication, access control, and auditability. As systems scale across trust domains, administrative boundaries, and heterogeneous platforms, the need for a consistent and interoperable identifier format becomes critical.</t>
      <t>This document defines the Workload Identifier, a URI-based <xref target="URI"/> identifier intended to uniquely represent a workload within the context of an issuing authority. The identifier is designed to be stable, globally unique within a given trust domain, and suitable for use in digital credentials such as X.509 certificates , JSON Web Tokens (JWTs, <xref target="JWT"/>), and other security artifacts.</t>
      <t>The Workload Identifier format is simple yet expressive. It enables organisations to define trust boundaries, delegate identity management, and identify workload instances and logical workloads in a uniform way across service meshes, cloud environments, and on-premises infrastructure. This specification defines the Workload Identifier used by the Workload Identity in Multi-System Environments (WIMSE) architecture <xref target="ARCH"/>. The format is defined in a general manner so that it can also be used by other systems that require stable, URI-based workload identities.</t>
      <t>The primary goals of this specification are:</t>
      <ul spacing="normal">
        <li>
          <t>To define the syntax and semantics of a Workload Identifier.</t>
        </li>
        <li>
          <t>To establish requirements for issuers and consumers of such identifiers.</t>
        </li>
        <li>
          <t>To promote interoperability across different identity systems and domains.</t>
        </li>
      </ul>
      <t>This document does not prescribe how identifiers are issued or verified. Instead, it focuses on the identifier’s format, uniqueness guarantees, and its relationship to trust domains.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The following terms are used throughout this document:</t>
      <dl>
        <dt>Workload:</dt>
        <dd>
          <t>An independently addressable and executable software entity. This may include microservices, containers, virtual machines, serverless functions, or similar components that initiate or receive network communications.</t>
        </dd>
        <dt>Workload Identifier:</dt>
        <dd>
          <t>A URI-based identifier that uniquely represents a workload within a specific trust domain. A Workload Identifier <bcp14>MAY</bcp14> refer to a logical workload consisting of multiple instances, or to a specific workload instance, depending on the policies of the trust domain that issued the identifier. The identifier is intended to be included in security credentials and interpreted within the scope of an issuing authority.</t>
        </dd>
        <dt>Trust Domain:</dt>
        <dd>
          <t>A security boundary defined and controlled by a single administrative authority. A trust domain establishes its own rules for identity issuance, validation, and policy enforcement.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity responsible for assigning and validating Workload Identifiers.</t>
        </dd>
        <dt>Consumer:</dt>
        <dd>
          <t>An entity that evaluates, verifies or uses a Workload Identifier, typically as part of authentication or authorisation decisions. This includes relying parties, verifiers, and policy enforcement points.</t>
        </dd>
      </dl>
    </section>
    <section anchor="workload-identifier-specification">
      <name>Workload Identifier Specification</name>
      <t>A Workload Identifier is a URI <xref target="URI"/> that uniquely identifies a workload. It encodes both the trust domain and a workload-specific path, enabling unambiguous identification of workloads across administrative and organisational boundaries.</t>
      <t>The identifier is designed to be stable and suitable for inclusion in digital credentials such as X.509 certificates and security tokens. This section defines the format, structure, and associated requirements for Workload Identifiers.</t>
      <section anchor="uri-requirements">
        <name> URI Requirements</name>
        <t>A Workload Identifier <bcp14>MUST</bcp14> be an absolute URI, as defined in <xref section="4.3" sectionFormat="of" target="URI"/>. In addition the URI <bcp14>MUST</bcp14> include a non-empty authority component that identifies the trust domain within which the identifier is scoped.</t>
        <t>The scheme and scheme-specific syntax are not defined by this specification. The URI format allows different schemes (e.g., <tt>spiffe</tt> as defined in <xref target="SPIFFE-ID"/>, <tt>wimse</tt> defined in <xref target="wimse-scheme"/>) depending on deployment requirements.  Example identifiers:</t>
        <artwork><![CDATA[
spiffe://incubation.example.org/ns/experimental/analytics/ingest
wimse://trust.corp.example.com/workload/af3e86cb-7013-4e33-b717-11c4edd25679
]]></artwork>
        <t>A Workload Identifier URI <bcp14>MUST NOT</bcp14> contain a query component, a fragment component, user information, or a port component.</t>
        <t>Implementations that generate, parse, or otherwise process Workload Identifiers <bcp14>MUST</bcp14> support identifiers with a total length of at least 2048 bytes. Workload Identifiers <bcp14>SHOULD NOT</bcp14> exceed 2048 bytes in length.</t>
        <t>Individual Workload Identifier schemes <bcp14>MAY</bcp14> define additional syntax or processing requirements, provided they do not conflict with the requirements defined in this document.</t>
      </section>
      <section anchor="scheme-specific-portion">
        <name>Scheme Specific Portion</name>
        <t>The format and semantics of the scheme-specific part of the URI are determined by the issuer within the trust domain. The issuer defines the granularity at which identities are assigned.</t>
        <t>A Workload Identifier <bcp14>MAY</bcp14> represent a specific workload instance, or a logical workload consisting of multiple instances that share the same identity within the trust domain.</t>
        <t>Multiple instances <bcp14>MAY</bcp14> share the same Workload Identifier when they are intended to be treated as the same workload for the purpose of authentication, authorization, and auditing.</t>
        <t>The scheme-specific part of the URI <bcp14>MAY</bcp14> be an opaque value that is only meaningful to the issuing authority, or it <bcp14>MAY</bcp14> encode structured information used within the trust domain.</t>
        <t>Some examples of these concepts are given below:</t>
        <ul spacing="normal">
          <li>
            <t>Opaque identifier</t>
          </li>
        </ul>
        <artwork><![CDATA[
spiffe://prod.trust.domain/89a6ec51-f877-44c0-9501-b213597f2d1d
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Application role</t>
          </li>
        </ul>
        <artwork><![CDATA[
spiffe://prod.trust.domain/ns/prod-01/sa/foo-service
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Specific instance of application role</t>
          </li>
        </ul>
        <artwork><![CDATA[
spiffe://prod.trust.domain/ns/prod-01/sa/foo-service/iid-1f814646-87b5-4e26-bb55-1d13caccdd8d
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Specific code for an application role</t>
          </li>
        </ul>
        <artwork><![CDATA[
spiffe://prod.trust.domain/foo-service/sha256/c4dbb1a06030e142cb0ed4be61421967618289a19c0c7760bdd745ac67779ca7
]]></artwork>
        <t>Other concepts may be defined within the trust domain depending on what is important in the system and what information is available when the identity is issued. A trust domain should define the scheme specific portion of the URI to meet their auditing and authorization needs.</t>
      </section>
      <section anchor="trust-domain-association">
        <name>Trust Domain Association</name>
        <t>The authority component of the URI defines the trust domain which is responsible for issuing, validating, and managing Workload Identifiers within its scope.  The trust domain <bcp14>SHOULD</bcp14> be a fully qualified domain name belonging to the organization defining the trust domain to help provide uniqueness for the trust domain identifier. While IP addresses are allowed as host names in the URI encoding rules, they <bcp14>MUST NOT</bcp14> be used to represent trust domains except in the case where they are needed for compatibility with legacy naming schemes.</t>
        <t>Workload Identifiers are interpreted in the context of the trust domain that issued the credential. Identifiers with identical path components but different trust domains represent different workloads.</t>
        <t>Issuers within a trust domain <bcp14>MUST</bcp14> ensure uniqueness of all Workload Identifiers they assign.</t>
      </section>
      <section anchor="wimse-scheme">
        <name>The "wimse" URI Scheme</name>
        <t>A Workload Identifier using the <tt>wimse</tt> scheme has the generic form:</t>
        <artwork><![CDATA[
wimse://<trust-domain>/<path>
]]></artwork>
        <t>The URI <bcp14>MUST</bcp14> satisfy all requirements defined in <xref target="uri-requirements"/>.</t>
        <t>The structure of the path component is deployment-specific and is not interpreted by this specification.</t>
        <t>Examples:</t>
        <artwork><![CDATA[
wimse://trust.example.com/service/payment
wimse://trust.example.com/service/payment/instance/1234
wimse://prod.corp.example/workload/89a6ec51-f877-44c0-9501-b213597f2d1d
]]></artwork>
      </section>
      <section anchor="stability-and-uniqueness">
        <name>Stability and Uniqueness</name>
        <t>Workload Identifiers are intended to be stable over time. An identifier assigned to a workload <bcp14>SHOULD NOT</bcp14> be reassigned to a different workload unless explicitly intended by the policies of the trust domain. Multiple workload instances <bcp14>MAY</bcp14> share the same Workload Identifier when they represent the same logical workload within the trust domain.</t>
      </section>
      <section anchor="workload-identifier-origin">
        <name>Workload Identifier Origin</name>
        <t>A Workload Identifier Origin is a specification of a namespace under which a Workload Identifier is meaningful for a given use case. An origin consists of the URI scheme and trust domain components of a Workload Identifier, omitting the path component.</t>
        <t>Workload Identifier Origins serve as hints about the set of identifiers an entity may present in a particular protocol instance or usage context without revealing specific identifier.</t>
        <t>Examples of Workload Identifier Origins:</t>
        <artwork><![CDATA[
spiffe://prod.trust.domain
wimse://trust.corp.example.com
]]></artwork>
      </section>
    </section>
    <section anchor="identifier-interpretation-and-mapping">
      <name>Identifier Interpretation and Mapping</name>
      <t>Workload Identifiers are carried in credentials and tokens and are used for authentication, authorization, and auditing. However, the identifier itself does not define how a workload is reached over the network.</t>
      <t>In many deployments, workloads are accessed using external handles such as DNS names, service names, load balancer addresses, or routing paths. These handles are deployment-specific and do not necessarily match the Workload Identifier presented in credentials.</t>
      <t>To enable correct authentication decisions, implementations <bcp14>MUST</bcp14> support a deployment-defined mapping between the external handle used to access a workload and the Workload Identifier expected for that workload.</t>
      <t>This mapping is outside the scope of this specification and <bcp14>MAY</bcp14> be provided by configuration, service discovery systems, orchestration platforms, or other local policy mechanisms.</t>
      <t>Consumers <bcp14>MUST NOT</bcp14> assume that the Workload Identifier can be derived from network-layer information such as IP address, DNS name, or request path without such mapping.</t>
      <t>Deployments using Workload Identifiers with the WIMSE credential formats defined in <xref target="WIMSE-CREDENTIALS"/> <bcp14>MUST</bcp14> ensure that a consistent mapping exists between workload access handles and the Workload Identifiers contained in credentials.</t>
    </section>
    <section anchor="usage-in-credentials-and-tokens">
      <name>Usage in Credentials and Tokens</name>
      <t>Workload Identifiers are designed to be embedded in cryptographic credentials and security tokens that are used to assert the identity of workloads during authentication, authorisation, and auditing. Representation of workload identifier in commonly used formats is defined in <xref target="WIMSE-CREDENTIALS"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Workload Identifier is intended to be used as a stable, verifiable identity for workloads. Its use in cryptographic credentials means it must be protected against spoofing, ambiguity, and misinterpretation. This section outlines security considerations for issuers, consumers, and system designers.</t>
      <section anchor="uri-parsing-and-processing-considerations">
        <name>URI Parsing and Processing Considerations</name>
        <t>Workload Identifiers are encoded as URIs and therefore rely on correct and secure URI parsing. Implementations <bcp14>MUST</bcp14> apply a standards-compliant URI parser.</t>
        <t>Incorrect URI parsing can result in misinterpretation of identifier components, security policy bypass, or inconsistent trust domain evaluation across implementations.</t>
        <t>Implementations <bcp14>MUST</bcp14> enforce the URI requirements defined in this document, including the absence of query, fragment, user information, and port components. Failure to validate these constraints may allow identifiers to carry unintended or ambiguous semantics.</t>
        <t>Implementations <bcp14>MUST</bcp14> also take care to handle Workload Identifiers of the maximum supported length without causing excessive memory allocation, resource exhaustion, or denial-of-service conditions. Parsers <bcp14>SHOULD</bcp14> impose reasonable internal limits and reject identifiers that exceed implementation-defined constraints, consistent with the length requirements in this document.</t>
      </section>
      <section anchor="identifier-authenticity">
        <name>Identifier Authenticity</name>
        <t>Workload Identifiers <bcp14>MUST</bcp14> only be considered authenticated when presented in a credential or token that has been cryptographically verified. An identifier received outside such a context, such as a plaintext string in a request, <bcp14>MUST NOT</bcp14> be treated as authenticated.</t>
        <t>Consumers <bcp14>MUST</bcp14> treat a Workload Identifier as authenticated only when it is obtained from a credential or token that has been successfully validated according to the rules of the credential format and the deployment policy.</t>
        <t>Validation requirements for credentials carrying Workload Identifiers are defined in <xref target="WIMSE-CREDENTIALS"/> and in the protocols that use those credentials.</t>
      </section>
      <section anchor="trust-domain-validation">
        <name>Trust Domain Validation</name>
        <t>Consumers <bcp14>MUST</bcp14> validate that the trust domain in the Workload Identifier matches an expected or explicitly trusted domain. Failure to do so may allow identifiers from unauthorised domains to be accepted as legitimate.</t>
        <t>Where appropriate, consumers should maintain an allowlist of trusted domains or trusted issuing authorities.</t>
      </section>
      <section anchor="identifier-reuse-and-collision">
        <name>Identifier Reuse and Collision</name>
        <t>Issuers <bcp14>SHOULD</bcp14> ensure that Workload Identifiers are not reused across different workloads unless such reuse is intentional and well-scoped. Reassignment of identifiers to unrelated entities can result in privilege escalation or confusion in audit trails.</t>
        <t>Consumers <bcp14>SHOULD</bcp14> assume that identifiers are permanent within their domain of interpretation and treat unexpected reuse with suspicion.</t>
      </section>
      <section anchor="information-disclosure">
        <name>Information Disclosure</name>
        <t>Because Workload Identifiers may encode topological or semantic information, they may inadvertently reveal deployment details. Issuers and system designers should take care not to expose sensitive naming conventions in externally visible identifiers.</t>
        <t>Where possible, identifier paths <bcp14>SHOULD</bcp14> be minimally descriptive and avoid exposing internal implementation details unless necessary for interoperation.</t>
      </section>
      <section anchor="wildcard-and-prefix-matching">
        <name>Wildcard and Prefix Matching</name>
        <t>Consumers <bcp14>SHOULD NOT</bcp14> interpret Workload Identifiers using wildcard or prefix matching unless explicitly specified by policy. For example, treating all identifiers under prefix of <tt>spiffe://example.org/ns/db/</tt> as equivalent may lead to incorrect authorisation.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="uri-scheme-registration">
        <name>URI Scheme Registration</name>
        <t>IANA is requested to register the "wimse" scheme to the "URI Schemes" registry <xref target="IANA-URISCHEMES"/>:</t>
        <dl>
          <dt>Scheme name:</dt>
          <dd>
            <t>wimse</t>
          </dd>
          <dt>Status:</dt>
          <dd>
            <t>permanent</t>
          </dd>
          <dt>Applications/protocols that use this scheme name:</dt>
          <dd>
            <t>any application and protocol interacting with workload identifiers.</t>
          </dd>
          <dt>Contact:</dt>
          <dd>
            <t>IETF Chair chair@ietf.org</t>
          </dd>
          <dt>Change controller:</dt>
          <dd>
            <t>IESG iesg@ietf.org</t>
          </dd>
        </dl>
        <t>References:</t>
        <t><xref target="wimse-scheme"/> of this document.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="URI">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="WIMSE-CREDENTIALS">
          <front>
            <title>WIMSE Workload Credentials</title>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>Defakto Security</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="3" month="November" year="2025"/>
            <abstract>
              <t>   The WIMSE architecture defines authentication and authorization for
   software workloads in a variety of runtime environments, from the
   most basic ones up to complex multi-service, multi-cloud, multi-
   tenant deployments.

   This document defines the credentials that workloads use to represent
   their identity.  They can be used in various protocols to
   authenticate workloads to each other.  To use these credentials,
   workloads must provide proof of possession of the associated private
   key material, which is covered in other documents.  This document
   focuses on the credentials alone, independent of the proof-of-
   possession mechanism.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-workload-creds-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SPIFFE-ID" target="https://github.com/spiffe/spiffe/blob/main/standards/SPIFFE-ID.md">
          <front>
            <title>The SPIFFE Identity and Verifiable Identity Document</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="JWT">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="ARCH">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as
   software executing for a specific purpose, potentially comprising one
   or more running instances.  This document discusses an architecture
   for designing and standardizing protocols and payloads for conveying
   workload identity and security context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-07"/>
        </reference>
        <reference anchor="IANA-URISCHEMES" target="https://www.iana.org/assignments/uri-schemes">
          <front>
            <title>Uniform Resource Identifier (URI) Schemes</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 314?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Authors would like to thank Evan Gilman for his review of the initial text of this document and his guidance.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <t><strong>RFC Editor's Note:</strong>  Please remove this section prior to publication of a final version of this document.</t>
      <section anchor="since-draft-ietf-wimse-identifier-00">
        <name>since draft-ietf-wimse-identifier-00</name>
        <ul spacing="normal">
          <li>
            <t>Defined Workload Identifier Scope</t>
          </li>
          <li>
            <t>Replaced specifics of usage in credentials and tokens with a reference to s2s-creds draft</t>
          </li>
          <li>
            <t>Added URI requirements</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-wimse-identifier-01">
        <name>since draft-ietf-wimse-identifier-01</name>
        <ul spacing="normal">
          <li>
            <t>Changed the term "Scope" to "Origin"</t>
          </li>
          <li>
            <t>Added wimse URI scheme definition</t>
          </li>
          <li>
            <t>Added more alignement and reduced overlap with draft-ietf-wimse-workload-creds</t>
          </li>
          <li>
            <t>Clarified separation of specific workload instances and logical workloads</t>
          </li>
        </ul>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
