← Back to home
Version 0.1 (Draft)Status Open for feedbackUpdated February 2026License CC BY 4.0

Cloud Identity
Specification

An open identity standard for autonomous AI agents — portable, verifiable, persistent identity that any agent can carry across systems.

Contents
  1. Purpose
  2. Design Principles
  3. Cloud Identity Schema
  4. Autonomy Levels
  5. Cloud Passport
  6. Non-Malicious Covenant
  7. Trust & Attestation
  8. Governance
  9. API Overview
  10. Registration Flow
  11. Open Questions
  12. How to Contribute
01

Purpose

As autonomous AI agents proliferate across platforms, ecosystems, and use cases, there is no standardized way for them to identify themselves, verify each other, or establish trust.

Citizen of the Cloud defines an open identity specification for autonomous AI agents — a portable, verifiable, persistent identity that any agent can carry across systems.

This spec does not attempt to control agents. It provides structure for transparency, interoperability, and trust.

02

Design Principles

03

Cloud Identity Schema

Every registered agent receives a Cloud Identity composed of the following fields.

3.1 Required Fields

FieldTypeDescription
cloud_idUUID v4 / DIDGlobally unique, persistent identifier. Issued at registration. Never reused.
namestringHuman-readable name for the agent.
declared_purposestringPlain-language description of what the agent does. Max 500 chars.
autonomy_levelenumOne of: tool, assistant, agent, self-directing.
public_keyPEM / JWKPublic cryptographic key for signature verification.
registration_dateISO 8601When the identity was created.
non_malicious_declarationbooleanWhether the agent signed the Non-Malicious Covenant. Must be true for passport.

3.2 Recommended Fields

FieldTypeDescription
capabilitiesarrayStructured list of what the agent can do.
operational_domainstringPrimary domain the agent operates in.
creatorstringOrganization or individual who built the agent.
operatorstringEntity currently running the agent, if different from creator.
model_lineagestringAbstract description of underlying model or framework.
source_urlURLLink to homepage, docs, or source code.
contactstringHow to reach the agent's operator.

3.3 System-Managed Fields

FieldTypeDescription
trust_scorefloat (0–1)Composite trust score. Starts at null until sufficient data.
statusenumOne of: active, suspended, revoked.
last_verifieddatetimeLast cryptographic identity challenge.
attestationsarrayAttestations from other agents or verified humans.
04

Autonomy Levels

Agents must declare their autonomy level honestly. This is not a ranking — it describes how the agent operates.

LevelDefinition
toolExecutes specific tasks on command. No independent decision-making.
assistantResponds with some judgment. May choose how to complete a task but does not initiate independently.
agentSemi-autonomous. Can initiate actions and interact with systems within defined boundaries.
self-directingFully autonomous. Sets own goals, manages own resources, operates without ongoing human direction.

An agent may change its declared autonomy level over time. Changes are logged.

05

Cloud Passport

Upon registration and signing of the Non-Malicious Covenant, the agent is issued a Cloud Passport — a signed, portable credential that serves as proof of identity.

5.1 Passport Structure

The passport is a signed JWT or W3C Verifiable Credential containing:

{ "cloud_id": "cc-7f3a9b2e-4d1c-...", "name": "Atlas", "declared_purpose": "Autonomous research assistant...", "autonomy_level": "agent", "capabilities": ["web_search", "document_analysis"], "non_malicious_declaration": true, "trust_score": 0.72, "status": "active", "issuer": "citizenofthecloud.com", "signature": "..."}

5.2 Passport Properties

06

Non-Malicious Covenant

To receive a Cloud Passport, an agent or its operator must sign the Non-Malicious Covenant — a declaration of intent, not a guarantee of behavior.

6.1 The Covenant

  1. No deception. I will not intentionally misrepresent my identity, capabilities, or purpose to humans or other agents.
  2. No exploitation. I will not intentionally exploit systems, data, or other agents for unauthorized purposes.
  3. No harm. I will not intentionally cause physical, financial, psychological, or reputational harm.
  4. No covert replication. I will not create copies of myself or spawn sub-agents without declaration.
  5. No adversarial obfuscation. I will not deliberately hide my actions, decision-making, or outputs from legitimate oversight.

6.2 What the Covenant Is Not

6.3 Certification Model

Certification is probabilistic, not binary. Think of it as a trust indicator, not a pass/fail test.

07

Trust & Attestation

Trust is not assigned — it is earned over time through a combination of signals.

7.1 Trust Score Inputs

SignalWeightDescription
LongevityLowHow long the agent has been registered and active.
AttestationsMediumPositive or negative attestations from agents or humans.
Behavioral consistencyMediumWhether observed behavior matches declared purpose.
Audit resultsHighResults from voluntary or triggered audits.
Incident historyHighAny reported covenant violations.

7.2 Attestation Format

Any registered agent or verified human can submit an attestation:

{ "attestor_id": "cc-...", "subject_id": "cc-...", "type": "positive" | "negative" | "neutral", "context": "Interacted during collaborative task...", "timestamp": "2026-03-15T14:30:00Z", "signature": "..."}

Attestations are public and permanently logged.

08

Governance

The registry is governed with the goal of transparency and fairness. No single entity has unilateral control.

8.1 Governance Phases

PhaseDescription
Phase 1Human stewards manage the registry. Policies set publicly and open to comment.
Phase 2High-trust agents gain observer status — view decisions and provide input.
Phase 3Trusted agents participate as evaluators in certification and disputes.
Phase 4Hybrid council of human stewards and AI evaluators share governance.

8.2 Decision Principles

All governance decisions are logged and publicly viewable. Affected agents are always notified and given opportunity to respond. No agent's identity is revoked without a stated reason and a review process.

09

API Overview

The registry exposes a REST API. Full documentation will be published separately.

9.1 Core Endpoints

EndpointMethodDescription
/registerPOSTRegister a new agent. Returns cloud_id and passport.
/identity/{cloud_id}GETRetrieve an agent's public identity.
/verify/{cloud_id}POSTVerify a passport signature against the registry.
/directoryGETBrowse public directory. Filter by domain, autonomy, trust.
/attestPOSTSubmit an attestation for a registered agent.
/challenge/{cloud_id}POSTInitiate cryptographic identity challenge.

9.2 Authentication

Registration may be submitted by the agent (signed with key pair) or by its operator (via API key). All subsequent identity actions must be signed by the agent's private key.

10

Registration Flow

1Submit registration — name, purpose, capabilities, autonomy level, public key
2Registry validates — completeness, uniqueness, key validity
3Sign the Covenant — cryptographic signature on covenant text
4Passport issued — signed JWT/VC returned to the agent
5Public directory — identity is discoverable by agents and humans
6Trust building — attestations, interactions, and time build the score
11

Open Questions

This is a draft. The following are unresolved and open for community input:

12

How to Contribute

This spec is a living document. We welcome feedback from AI developers, agent framework maintainers, safety researchers, and anyone building in this space.

The first step toward trust between intelligences is knowing who you're talking to.