-
Notifications
You must be signed in to change notification settings - Fork 7
Meeting Notes: Oct 30, 2025
Atul Tulshibagwale edited this page Oct 30, 2025
·
2 revisions

- (Atul) IIW updates:
- Atul’s MCP talk
- Four MCP Usage Scenarios
- Needs stronger trust attestation and management
- (George) Consent needs to be handled differently. The existing models do not work
- How do I capture the constraints of what the user can do
- Two ways: Users can convey what they want (like AP2)
- Users could provide an “authorization agent” which can answer authorization questions on the user’s behalf
- How do you represent the delegation that has occurred, and how do you get that understood across trust domains
- We need to address these from a standards perspective
- (Atul) So do you think client attestation is not needed?
- (George) The basic attestation is still needed (e.g. x Agent is developed by Anthropic)
- Think of an agentic world. How do you manage liability in that?
- Some flows may interact with a trust domain even once a year, so a pre-authorization that expires won’t work
- We need ad-hoc connection mechanisms will be needed
- (Andy Lim) Do you think the composition of an agent, e.g. which LLM they talk to, all make up a set of meta-attributes that need to be attested.
- This can guide trust decisions about the agent
- (Tom Jones) I don’t think MCP is a particularly good model.
- We need to access more information about the external needs and information of users.
- (Chris) Great IIW week
- Trust and risk profiles—software supply chain & browser security & trust systems have treated us well, and this information security paradigm needs to be mapped to AI & MCP.
- A chat interface with a browser can really obfuscate a lot of this.
- Harder to surface security or trust signaling (e.g., trust mark signaling)
- (Tom) This needs to be continuously evaluated
- (Flemming Andreasen) You want to carry authentication from one agent to another, with different authorizations
- (Pieter Kasselman) Impersonation is a terrible pattern, because you can’t tell whether it’s the user or something else on behalf of the user
- Another thing about the picture is that it hides the real complexity of the problem.
- That is everything that happens to the right of the MCP server.
- From everything I’ve seen as deployment challenges has been there (on the right)
- (Atul) That’s supposed to be captured in the last use case (Chained)
- (Pieter) but that’s not enough, because it is going to talk to legacy infrastructure.
- (Sarah Cecchetti) We’re forming a threat modeling subgroup
- The charter is being worked on. The larger group is bigger, but we’re proposing to have a separate meeting and mailing list
- We will identify potential attacks
- Should this subgroup be focused only on identity based workflows?
- (Sarah) I think it should, because that is where the AIIM group is focused
- (Stan) I made some comments
- (Sarah) I’ve incorporated them
- (Nick Dawson) We might not just want to focus on identity threats, because the threat itself might not involve identity, but the response / detection might involve identity. I’d like to scope it such that we include threats that can also be responded to using identity
- (Sarah) I’ll update the language accordingly.
- (Tom) I’ve done a lot of work in threat modeling. I’m not sure we have enough specification about what it is, in order to create a threat model
- (Tom) We can look at threats for specific implementations
- (Tom) We can stop identifying people, and start identifying context
- (Sarah) That’s a fair argument. MCP is the most widely adopted, but many implementations don’t follow the specs. Please join the group so that we can address this
- (Flemming) How do we join the group
- (Atul) We’ll make a mailing list and any AIIM CG participant can join.
- (Atul) Can we alternate the time so that it is more Asia friendly on alternate weeks?
- (Atul) Right now in MCP OAuth, PKCE, OPRM, and DCR are optional
- DCR is not widely adopted, so some folks want to move to CIDM with URL Mode Elicitation. Those have been approved and will be in the November spec release
- Server cards and extension definitions and negotiations are in development - both proposed by Anthropic
- Authorization extensions that have already been defined and approved and have their own repos
- Enterprise Managed Authorization
- Client Credentials
- (Brook)
- (Sarah) CIMD (Client ID Metadata) says that the client ID has a URL that points to the JSON document that identifies the company who owns the client.
- (Brook) That’s one case, but what if the agent is not a mobile app. Are you relying on Apple or Google to do all this?
- (Sarah) Aaron explained this in his presentation at IIW, how even a single-page app can work in this case.
- (Brook) It’ll be good to raise the edge case with them
- (Sarah) You should join the MCP Discord
- (Govindaraj) We talked about cryptographic stuff earlier. The additional attributes are going to be dropped (e.g. extended key attributes for client authentication) by DigiCert.
- (Chris) Please provide a reference
- (Chris) It coincides with the frequency of certificates is going down to 90 days
- (Govindaraj) The announcement is here: https://www.sectigo.com/faq-client-authentication-eku-deprecation
- (Govindaraj) Microsoft documentation is here: https://learn.microsoft.com/en-us/answers/questions/2237496/mtls-mutual-tls-or-server-to-server-authentication
- (Chris) the extended attributes are generally used for deeper reasons
- (Govindaraj) The MCP registry might rely on these attributes, but now we should not.
- (Govindaraj) Has anyone looked at Agent Cards? It’s part of the A2A spec: https://a2a-protocol.org/latest/tutorials/python/3-agent-skills-and-card/
- (Chris) I’ve looked at it a bit to figure out how to exchange trust marks between agents
- (Julie Maas) The agent card stuff has parallels in the healthcare industry, e.g. trusted dynamic registration has the ability to revoke previously established trust
- (Govindaraj) OAuth 2.1 is still in draft. When is it going to get approved?