Trust Elevation
In the ZTAuth* protocol, the Policy Decision Point (PDP) is responsible for evaluating authorization requests based on contextual information carried along with Transaction Token (Txn Token).
In order to perform a valid authorization evaluation, the PDP MUST receive a well-formed and verifiable Txn Token. Upon receiving the token, the PDP performs the following steps:
- Verify the Txn Token: The PDP MUST validate the token’s digital signature, expiration (
exp
), and audience (aud
) to ensure authenticity and scope of use. - Extract relevant claims: The PDP MUST extract the
sub
(subject),act
(actor), andscope
claims from the token. - Check actor permissions: The PDP MUST verify that the
act
identity belongs to a security group or trust level authorized to act on behalf of thesub
identity for the requested operation. - Resolve the authorization model: The PDP retrieves the applicable
auth* model
based on thezone_id
andledger_id
associated with thesub
identity. - Evaluate authorization: The PDP evaluates the request against the retrieved model using the extracted claims and any additional contextual inputs.
This process is referred to as Trust Elevation.
In scenarios involving multi-level delegation, Trust Elevation may involve chaining or traversing multiple intermediate authorization contexts
. These intermediate steps contribute to the construction of a final, composite authorization context used to determine the effective decision for the original request.
By design, this process ensures that each authorization context is logically and cryptographically isolated, in alignment with Zero Trust principles. Each decision is tightly bound to its originating request and cannot be reused or escalated beyond its defined scope and trust domain.
Furthermore, because the protocol is inherently structured around delegation, it natively supports multi-level delegation scenarios. Each actor in the chain operates within a bounded authorization context, derived from and limited by the preceding level of trust, ensuring both traceability and containment of privileges.