Manifest

Problem Statement

We live in an identity-centric world, where access to systems and resources is granted based on who or what you are. To prove identity or access rights, most systems rely on tokens, portable proofs issued by a trusted authority.

Examples include OAuth 2.0 access tokens (for authorization), SAML assertions and JWTs (for authentication or identity claims), and API keys.

These tokens are presented to workloads to request access.

However, not all communication flows are token-based. While many interactions between services use tokens, especially in synchronous API calls - other patterns such as asynchronous messaging, event streaming, or batch processing may not support token propagation.

In these cases, systems often rely on secure channels, pre-established trust, or inferred identity, but without a shared protocol to verify or audit authorization decisions.

Even when tokens are used, there is no standard protocol to guarantee that:

  • the token is actually validated
  • its scopes, roles, or consent are enforced
  • the workload is trusted to act on behalf of the subject
  • the action is logged or can be audited
  • delegation rules are enforced or even known

In practice, this means that enforcement happens inside the application code, often inconsistently and without external visibility.

OAuth is a typical example: it issues a valid token, and while it recommends that the resource server validates the token, it does not define what must happen after the token is delivered, including how scopes are enforced, how delegation is handled, or how access is audited.

This model leads to security gaps, lack of enforcement guarantees, and risk of silent delegation.

ZTAuth* addresses this gap by introducing an authorization protocol that governs runtime enforcement, validates mutual trust between identities and workloads, and ensures consistent handling of delegation and consent — all in line with Zero Trust principles.

Note:
The problem space can be summarized as:

[Token Issued] → [Token Delivered] → [ ??? ] ← ZTAuth* governs this part

Traditional token systems stop at delivery.
ZTAuth* starts where they end.

Human vs Non-Human Identities

Most identity systems focus on human users. Modern architectures also involve non-human actors such as services, agents, and machines.

Standards like OpenID Connect and OAuth 2.0 cover human identities well. Managing identities for machines and agents is still evolving, with efforts like WIMSE addressing this space.

Foundational Concepts

ZTAuth* is built on four core pillars that define how authorization is governed, delegated, and enforced across distributed systems. These pillars provide the foundation for a consistent and secure authorization model, aligned with Zero Trust principles.

Policy Governance

Authorization logic is often hardcoded inside applications, making it difficult to control how access decisions are made or to track them for auditing. ZTAuth* separates policy from application code by introducing a centralized layer for defining and enforcing authorization rules.

Policies are stored in a Git-like structure, ensuring immutability, versioning, correctness, and portability. This enables consistent access control and supports integration with auditing, risk management, and compliance processes.

Workload Governance

Tokens are usually processed by the workload receiving the request, but there is no protocol-level guarantee that the token is validated or that the workload is trusted. ZTAuth* makes validation an integrated part of the authorization process by defining which workloads are allowed to process requests.

Workloads can be grouped into security groups with assigned Trust Levels, and the protocol controls which of them can act on behalf of a subject. This enables secure and auditable authorization decisions at the workload level.

Zero Trust Security Model

ZTAuth* builds a full Authorization Request Context based on both the identity of the subject and the identity of the workload. This dual identity model allows access decisions to consider not only who initiated the action, but also what is executing it.

The Authorization Request Context can be materialized as a Transaction Token (TxToken), issued by a Transaction Token Service and evaluated by a Policy Decision Point. This enables consistent, portable, and auditable enforcement across distributed environments.

ZTAuth* also supports Trust Elevation, a process in which a workload may request access to the authorization context of another identity, under specific conditions. This is commonly used when a workload needs to temporarily act with the privileges of a different subject — for example, a service operating on behalf of a user or another system.

Trust Elevation is always subject to policy evaluation and must follow predefined rules, including proof of consent when applicable.
This makes it suitable for dynamic and delegated access, while remaining aligned with Zero Trust principles.

Delegation-First Model

Delegation is a core feature in ZTAuth*, not an optional add-on. By explicitly modeling both the subject and the workload in the Authorization Request Context, ZTAuth* naturally supports on-behalf-of execution.

Delegation is made explicit and verifiable through Trust Delegation, where a subject can authorize another identity, such as a workload or service, to act within a specific scope. Delegation requires proof of subject consent and is enforced by policy at runtime.

This model ensures that all delegated actions are controlled, traceable, and aligned with the Zero Trust principle of least privilege.