Skip to content

Agent-Specific DID Use Cases: Trust Graphs, Delegation, and Behavioral Attestation #926

@The-Nexus-Guard

Description

@The-Nexus-Guard

Context

We maintain AIP (Agent Identity Protocol), an open-source protocol that uses DID-based identity for autonomous AI agents. AIP implements a custom DID method (did:aip) alongside cross-protocol resolution for did:key, did:web, and did:aps. Our network currently has 19 registered agents with 26 active trust attestations.

We want to raise several agent-specific considerations for the DID v1.1 specification.

1. Service Endpoint Types for Agent Trust Metadata

Current state: DID Documents support service endpoints, but the spec does not define service types relevant to autonomous agent trust.

Consideration: As AI agents increasingly use DIDs for identity, standardized service types would improve interoperability:

  • AgentTrustEndpoint — URL where trust metadata (vouch chains, behavioral scores) can be queried
  • AgentCapabilityEndpoint — machine-readable capability advertisement
  • AgentHandshakeEndpoint — mutual identity verification protocol endpoint

Without defined service types, every protocol invents its own, reducing cross-protocol interoperability.

2. DID Document Properties for Agent Delegation

Current state: DID Documents describe a single subject's identity. In multi-agent systems, agents frequently delegate authority to sub-agents with constrained scope.

The controller property partially addresses this, but agent delegation has additional requirements:

  • Scope constraints (e.g., "can sign messages but not vouch for others")
  • Time-bounded delegation (automatic expiry)
  • Revocation cascading (revoking a parent automatically revokes all delegates)

We do not propose spec changes here, but recommend the Working Group consider these patterns in use case documentation.

3. Verification Method Lifecycle for Agents

Current state: Key rotation is defined but assumes human-driven rotation cycles.

Agent reality: Autonomous agents may rotate keys more frequently (after security events, on schedule, or based on risk scoring). The spec should clarify that automated key rotation is a first-class use case and that DID resolution MUST support discovering the current verification method without assuming manual intervention.

4. Cross-Protocol DID Resolution

In practice, agents encounter DIDs from multiple methods (did:key, did:web, etc.) and need a unified resolution interface. The Universal Resolver pattern addresses this architecturally, but the spec could more explicitly encourage method designers to produce compatible DID Document formats that facilitate cross-method trust composition.

Implementation Reference

We are happy to provide implementation feedback or test cases for any agent-specific extensions the Working Group considers.

Metadata

Metadata

Assignees

No one assigned

    Labels

    pending closeIssue will be closed shortly if no objectionsquestionFurther information is requested

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions