<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-morrison-org-alter-policy-provision-00" category="info" submissionType="independent" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Org-Alter Policy Provision">Org-Alter-Mediated Policy Provision and Governance Inheritance for Agent Runtimes Bound to a Principal Identity</title>
    <seriesInfo name="Internet-Draft" value="draft-morrison-org-alter-policy-provision-00"/>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
      <address>
        <postal>
          <city>Cronulla, NSW</city>
          <country>Australia</country>
        </postal>
        <email>blake@truealter.com</email>
      </address>
    </author>
    <date year="2026" month="May"/>
    <abstract>
      <?line 76?>

<t>This memo specifies how an artificial-intelligence agent runtime,
bound at instantiation to a principal identity handle, resolves at
session initialisation a target organisational identity substrate
from a manifest source bound to the runtime's working context and
retrieves from that substrate a typed policy stack comprising a
handbook artefact, a standard-operating-procedure registry pointer,
an enforcement-gate specification, and an audit-signal ingestion
endpoint.  The policy stack is then applied as runtime constraints
on subsequent tool invocations, with audit signals emitted back to
the same substrate.  Policy provision occurs in the same act of
session initialisation as principal identification, rather than as
a separate ceremony against a side-channel governance plane.  A
principal concurrently bound to multiple organisational substrates
operates the runtime under a deterministic composition of the
several policy stacks, with cross-organisational residual conflicts
routed to the peer-protocol Identity Accord ceremony <xref target="IDACCORD"/>
rather than to a meta-federation authority.  The memo is
Informational.  The wire surface relies on the DNS-based discovery
of <xref target="MCPDNS"/> and the handle namespace of <xref target="IDPRONOUNS"/>; no new
transport is introduced.</t>
    </abstract>
  </front>
  <middle>
    <?line 99?>

<section anchor="status-of-this-memo">
      <name>Status of This Memo</name>
      <t>This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.</t>
      <t>Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF).  Note that other groups may also distribute
working documents as Internet-Drafts.  The list of current
Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.</t>
      <t>Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time.  It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Artificial-intelligence agent runtimes operated by a human principal
require, at the moment they begin acting on the principal's behalf,
a corpus of policy artefacts that constrain their behaviour:
permitted and refused actions, vocabulary and tone rules, escalation
procedures, audit destinations, and the standard operating
procedures the principal's organisation has adopted.  In current
practice these artefacts are supplied to the agent runtime by a
governance plane architecturally separate from the principal's
identity infrastructure.  The agent runtime authenticates to one
substrate (an identity provider) and receives policy from another
(a governance platform, an orchestration framework's configuration
plane, a per-tool policy console).  The two substrates are joined
by out-of-band integration work specific to each deployment.</t>
      <t>This memo articulates a different arrangement and specifies the
wire surface that supports it.  An organisational identity
substrate, addressable by the same identity handle that authenticates
the principal as a member of the organisation, exposes typed
surfaces over the Model Context Protocol <xref target="MCP"/> that carry the
policy artefacts the agent runtime requires.  The agent runtime
resolves the substrate at session initialisation, fetches the
typed surfaces, applies them as runtime constraints, and emits
audit signals to the same substrate.  Policy provision is a
byproduct of principal identification rather than a separate
ceremony.</t>
      <t>The arrangement composes directly with the discovery mechanism of
<xref target="MCPDNS"/>, the handle namespace of <xref target="IDPRONOUNS"/>, the attribution
grammar of <xref target="IDCOMMITS"/>, the cross-session coordination posture of
<xref target="SUBSTRATE"/>, and the cross-organisational ceremony of <xref target="IDACCORD"/>.
No new transport, no new handle category, and no new attribution
slot is introduced.  The contribution of this memo is the
specification of the typed surface set, the session-initialisation
flow that retrieves them, the runtime application of the retrieved
enforcement-gate specification, the audit-signal flow back to the
substrate, the live-update propagation, the multi-organisational
composition rule, and the compliance-state inheritance posture.</t>
      <t>The doctrinal grounding of the arrangement is articulated in
<xref target="AGENTGOV"/>.  This memo specifies the protocol surface only; it
does not restate the doctrine.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described
in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in
all capitals, as shown here.</t>
      <t>The following terms are defined for the purposes of this document.
Terms previously defined by the referenced Morrison-family memos
retain their established meaning and are reproduced here only when
operative for the present specification.</t>
      <dl>
        <dt>~handle</dt>
        <dd>
          <t>A principal identity handle as defined by <xref target="IDPRONOUNS"/>.  A
Sovereign-tier handle is human-controlled (e.g. <tt>~blake</tt>); an
Instrument-tier handle is agent-runtime-vendor-controlled and
conventionally prefixed <tt>~cc-</tt> (e.g. <tt>~cc-opus-4-7</tt>).  A handle's
trust tier is a property of the handle, not a property of any
session it appears in.</t>
        </dd>
        <dt>Organisational identity substrate</dt>
        <dd>
          <t>A network-addressable system that authoritatively recognises a
set of <tt>~handles</tt> as members of an organisation, maintains the
organisation's policy artefacts, and exposes typed surfaces by
which authenticated agent runtimes of recognised members may
retrieve those artefacts and submit audit signals back.  The
substrate is itself addressable by a handle, conventionally
domain-qualified (e.g. <tt>~truealter.com</tt> for the operator of
this memo).</t>
        </dd>
        <dt>Policy artefact</dt>
        <dd>
          <t>A datum retrieved from the organisational identity substrate
that constrains an agent runtime's subsequent behaviour.  The
load-bearing policy artefacts specified by this memo are the
handbook, the standard-operating-procedure registry, the
enforcement-gate specification, and the audit-signal ingestion
endpoint.</t>
        </dd>
        <dt>Enforcement gate</dt>
        <dd>
          <t>A single rule within the enforcement-gate specification
comprising a trigger predicate evaluated against tool name and
arguments, an action selected from a defined action set, an
applicability scope, and an explanation string.  Enforcement
gates are policy retrieved from the substrate; they are not
hardcoded behaviour of the agent runtime.</t>
        </dd>
        <dt>Audit signal</dt>
        <dd>
          <t>An append-only record submitted by the agent runtime to the
organisational identity substrate's ingestion endpoint following
a runtime event that meets a substrate-specified significance
predicate.</t>
        </dd>
        <dt>Session-bind</dt>
        <dd>
          <t>The discrete act, at agent runtime instantiation, of
authenticating the bound principal handle to the resolved
organisational identity substrate and retrieving the policy
artefacts that will govern the session.</t>
        </dd>
        <dt>Manifest source</dt>
        <dd>
          <t>A configuration surface bound to the agent runtime's working
context (project-resident anchor file, DNS TXT record under the
<tt>_alter.</tt> scheme of <xref target="MCPDNS"/>, environment variable, or handle-
scoped fallback) that names the target organisational identity
substrate for the session.</t>
        </dd>
        <dt>Accord</dt>
        <dd>
          <t>The peer-protocol cross-organisational ceremony defined by
<xref target="IDACCORD"/>.  Referenced here as the terminator of unresolvable
multi-organisational policy-composition residuals.</t>
        </dd>
      </dl>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>The arrangement specified by this memo comprises four operative
surfaces and three flow stages.</t>
      <section anchor="operative-surfaces">
        <name>Operative Surfaces</name>
        <t>The organisational identity substrate SHALL expose at minimum the
following four typed surfaces over the Model Context Protocol
<xref target="MCP"/> to authenticated agent runtimes of recognised members.  Each
surface is addressable as a tool invocation against the substrate.</t>
        <dl>
          <dt><tt>org_alter_handbook</tt></dt>
          <dd>
            <t>Returns the organisational handbook artefact.  The handbook
comprises the body of prose policy that an organisation
customarily supplies to a contractor at the commencement of an
engagement: voice and tone rules, vocabulary constraints,
positioning rules, decision-routing rules, and any further
prose policy the organisation considers operative.  The surface
SHALL support both whole-handbook retrieval and section-scoped
retrieval by section identifier.</t>
          </dd>
          <dt><tt>org_alter_sop_registry</tt></dt>
          <dd>
            <t>Returns the registry of standard operating procedures maintained
by the organisational identity substrate.  Each registry entry
carries a stable identifier, a title, a status (live, draft,
deprecated), a body, and an invocation verb under which the
agent runtime may execute the procedure.  The surface SHALL
support both registry listing and individual-procedure retrieval.</t>
          </dd>
          <dt><tt>org_alter_enforcement_gates</tt></dt>
          <dd>
            <t>Returns the specification of enforcement gates the agent runtime
is to apply to subsequent tool invocations.  The grammar of an
enforcement gate is defined in Section 5.</t>
          </dd>
          <dt><tt>org_alter_ingest</tt></dt>
          <dd>
            <t>Accepts audit signals submitted by the agent runtime per
Section 6.  The surface is append-only; admitted signals are
written to the organisational identity substrate's append-only
event log and are not retractable or amendable.</t>
          </dd>
        </dl>
        <t>Additional surfaces (a roster surface, a decisions surface, a
compliance surface) MAY be exposed by the organisational identity
substrate; agent runtimes consulting such surfaces operate beyond
the load-bearing minimum specified here.</t>
      </section>
      <section anchor="flow-stages">
        <name>Flow Stages</name>
        <t>The session-bind flow comprises three stages, executed in order:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Resolve.</strong>  The agent runtime determines the target
organisational identity substrate by consulting the manifest
source, as specified in Section 4.</t>
          </li>
          <li>
            <t><strong>Retrieve.</strong>  The agent runtime authenticates to the resolved
substrate using the bound principal handle's session credential
and retrieves the four load-bearing policy artefacts via the
surfaces of Section 3.1.</t>
          </li>
          <li>
            <t><strong>Apply.</strong>  The agent runtime translates the retrieved
enforcement-gate specification into runtime hooks, registers
the audit-signal endpoint as the destination for subsequent
significant-event emissions, and surfaces the handbook and
SOP registry to the bound principal as in-context advisory
material.</t>
          </li>
        </ol>
        <t>The three stages constitute session-bind.  All three SHALL complete
before the agent runtime acts on the principal's first prompt of
the session.  If any stage fails, session-bind SHALL fail; partial
inheritance of policy is not permitted (Section 9).</t>
      </section>
    </section>
    <section anchor="discovery-and-resolution">
      <name>Discovery and Resolution</name>
      <t>The agent runtime SHALL resolve the target organisational identity
substrate from a manifest source bound to the runtime's working
context.  Manifest sources are evaluated in the priority order
below.  The first source that yields a handle is operative; later
sources are not consulted.</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Project-resident anchor.</strong>  A file at an implementation-
defined path within the working directory tree (a recommended
path is <tt>.alter/org-alter.toml</tt> or an <tt>[org-alter]</tt> block
within <tt>pyproject.toml</tt>, <tt>package.json</tt>, or <tt>Cargo.toml</tt>)
names the target substrate by handle.</t>
        </li>
        <li>
          <t><strong>DNS TXT record under the <tt>_alter.</tt> scheme of <xref target="MCPDNS"/>.</strong>
The agent runtime resolves the working directory's source-
control remote (where present) to a domain name and queries
<tt>_alter.&lt;domain&gt;</tt> per <xref target="MCPDNS"/>.  The TXT record's <tt>org_alter</tt>
field, when present, names the target substrate.</t>
        </li>
        <li>
          <t><strong>Environment variable.</strong>  An implementation-defined
environment variable (a recommended name is
<tt>ALTER_ORG_HANDLE</tt>) carries the target substrate handle.</t>
        </li>
        <li>
          <t><strong>Handle-scoped fallback.</strong>  If sources (1) through (3) do
not resolve, the runtime falls back to the principal's own
handle-scoped substrate, which exposes the same typed surfaces
as an organisational identity substrate but is scoped to the
principal alone and does not participate in multi-organisational
composition (Section 8).</t>
        </li>
      </ol>
      <t>The resolved handle is translated to a substrate endpoint via the
DNS-based resolution mechanism of <xref target="MCPDNS"/>.  The agent runtime
opens a Model Context Protocol session against the endpoint,
authenticating with the bound principal handle's session credential
obtained from the implementation-defined session manifest.</t>
      <t>A substrate that does not recognise the authenticating handle as a
member SHALL refuse the session; an unrecognised handle MUST NOT
receive policy artefacts.  The substrate MAY further refuse on
trust-tier grounds: an Instrument-tier handle SHALL be admitted
only when the substrate's policy explicitly admits Instrument-tier
sessions from the corresponding Sovereign-tier handle's delegation.</t>
    </section>
    <section anchor="enforcement-gate-grammar">
      <name>Enforcement Gate Grammar</name>
      <t>The <tt>org_alter_enforcement_gates</tt> surface (Section 3.1) returns
an enforcement-gate specification.  An enforcement-gate
specification is a list of enforcement gates.  Each enforcement
gate is an object with the following fields.</t>
      <dl>
        <dt><tt>id</tt> (string, REQUIRED)</dt>
        <dd>
          <t>A stable identifier for the gate, unique within the
specification.  Identifiers are used as the addressing target
for audit signals (Section 6) and for policy-update propagation
(Section 7).</t>
        </dd>
        <dt><tt>trigger</tt> (object, REQUIRED)</dt>
        <dd>
          <t>The trigger predicate evaluated against each prospective tool
invocation.  The object's keys are predicate operators; the
values are operator-specific patterns.  Minimum operator set:
</t>
          <ul spacing="normal">
            <li>
              <t><tt>tool_name_match</tt> (string): regular expression matched against
the tool name.</t>
            </li>
            <li>
              <t><tt>path_glob</tt> (string): glob pattern matched against any
argument resolvable as a filesystem path.</t>
            </li>
            <li>
              <t><tt>command_substring</tt> (string): substring matched against any
argument carrying a command string.</t>
            </li>
            <li>
              <t><tt>arg_arity</tt> (object): minimum and maximum bounds on argument
list length.</t>
            </li>
          </ul>
          <t>A trigger object matches when every operator present in the
object matches.  Additional operators MAY be defined by the
substrate and SHOULD be ignored by agent runtimes that do not
understand them.</t>
        </dd>
        <dt><tt>action</tt> (enum, REQUIRED)</dt>
        <dd>
          <t>One of:
</t>
          <ul spacing="normal">
            <li>
              <t><tt>block</tt>: the tool invocation is refused.  The runtime returns
the gate's explanation string to the agent reasoning loop as
a synthetic error and emits a <tt>policy.violation</tt> audit signal.</t>
            </li>
            <li>
              <t><tt>prompt-for-confirmation</tt>: the tool invocation is paused and
a confirmation prompt is rendered to the Sovereign-tier
principal.  The invocation proceeds only on principal
confirmation.  A <tt>gate.confirmation-requested</tt> audit signal
is emitted on prompt; a <tt>gate.confirmation-granted</tt> or
<tt>gate.confirmation-denied</tt> signal is emitted on outcome.</t>
            </li>
            <li>
              <t><tt>allow-with-audit</tt>: the tool invocation proceeds, and a
<tt>gate.allowed-with-audit</tt> audit signal is emitted.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>scope</tt> (object, OPTIONAL)</dt>
        <dd>
          <t>An applicability scope restricting the gate's effect.  Recognised
keys:
</t>
          <ul spacing="normal">
            <li>
              <t><tt>trust_tiers</tt> (array of strings): the trust tiers (Sovereign,
Instrument, Bot) to which the gate applies.  Omission
indicates all tiers.</t>
            </li>
            <li>
              <t><tt>working_context_glob</tt> (string): a glob matched against the
agent runtime's working directory path.  Omission indicates
all contexts.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>explanation</tt> (string, REQUIRED)</dt>
        <dd>
          <t>A human-readable explanation of the gate, returned to the agent
runtime on action execution.  The explanation SHOULD be
sufficient for the reasoning loop to surface to the principal
without further substrate round-trip.</t>
        </dd>
        <dt><tt>audit_emit_on</tt> (array of strings, OPTIONAL)</dt>
        <dd>
          <t>A list of event types for which audit signals are emitted on
this gate's evaluation, beyond the action-implicit signals
enumerated above.  Substrate-significance predicates (Section 6)
may select event types not directly tied to a gate; this field
carries the per-gate overrides.</t>
        </dd>
      </dl>
      <t>When two or more gates trigger on a single prospective tool
invocation (after applicability-scope filtering), the gate whose
action is most restrictive prevails.  Order of restrictiveness,
from most to least, is <tt>block</tt>, <tt>prompt-for-confirmation</tt>,
<tt>allow-with-audit</tt>.</t>
      <t>The agent runtime SHALL NOT maintain enforcement gates outside the
specification retrieved from the substrate.  Gates are policy,
sourced from the substrate; an agent runtime that hardcodes a gate
operates outside the surface of this memo.</t>
    </section>
    <section anchor="audit-signal-flow">
      <name>Audit Signal Flow</name>
      <t>The agent runtime emits audit signals to the substrate's
<tt>org_alter_ingest</tt> surface for runtime events that meet a
substrate-specified significance predicate.  The significance
predicate is itself policy retrieved from the substrate; the
substrate determines which events are significant, not the runtime.</t>
      <t>An audit signal is an object with the following minimum fields:</t>
      <dl>
        <dt><tt>type</tt> (string, REQUIRED)</dt>
        <dd>
          <t>The event type.  The minimum-set of event types a conformant
runtime SHALL emit when triggered comprises:
</t>
          <ul spacing="normal">
            <li>
              <t><tt>session.start</tt> at session bind, carrying the bound principal
handle, trust tier, resolved substrate handle, and manifest
source used for resolution.</t>
            </li>
            <li>
              <t><tt>session.end</tt> at session termination, carrying the bound
handle and a structured summary of session activity.</t>
            </li>
            <li>
              <t><tt>tool.invoke</tt> per tool invocation that meets the substrate-
specified significance predicate, carrying the tool name, a
redacted argument summary, the gate evaluation outcome, and
the result classification.</t>
            </li>
            <li>
              <t><tt>policy.violation</tt> when a <tt>block</tt> gate action fires, carrying
the gate identifier and the offending invocation.</t>
            </li>
            <li>
              <t><tt>policy.update</tt> on receipt of a live-substrate policy update
(Section 7), acknowledging the new policy epoch.</t>
            </li>
            <li>
              <t><tt>gate.confirmation-requested</tt>, <tt>gate.confirmation-granted</tt>,
<tt>gate.confirmation-denied</tt> on <tt>prompt-for-confirmation</tt> flow.</t>
            </li>
            <li>
              <t><tt>gate.allowed-with-audit</tt> on the corresponding action.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>payload</tt> (object, REQUIRED)</dt>
        <dd>
          <t>Event-type-specific structured data.  The substrate's significance
predicate MAY constrain payload shape per event type.</t>
        </dd>
        <dt><tt>attribution</tt> (object, REQUIRED)</dt>
        <dd>
          <t>Carries the Sovereign-tier handle and any in-scope Instrument-tier
handle.  The grammar follows the trailer slots defined by
<xref target="IDCOMMITS"/>; the audit-signal <tt>attribution</tt> field is the
protocol-layer companion to the commit-trailer block.</t>
        </dd>
        <dt><tt>timestamp</tt> (string, REQUIRED)</dt>
        <dd>
          <t>RFC 3339 timestamp at which the runtime emitted the signal.</t>
        </dd>
        <dt><tt>gate_id</tt> (string, OPTIONAL)</dt>
        <dd>
          <t>When the signal arises from a gate evaluation, the identifier
of the gate.</t>
        </dd>
      </dl>
      <t>The substrate's audit-signal endpoint is append-only.  Admitted
signals SHALL NOT be retracted or amended by the emitting runtime
or by the substrate operator.  The structural co-location of
policy and audit at the same substrate is the load-bearing
property of this section; an audit channel addressable separately
from the policy that governed the audited events does not satisfy
this specification.</t>
    </section>
    <section anchor="live-policy-updates">
      <name>Live Policy Updates</name>
      <t>The agent runtime maintains, for the duration of the session, a
subscription channel against the resolved organisational identity
substrate over which the substrate emits policy-update
notifications.  The subscription channel SHOULD be implemented as
a Server-Sent Events stream <xref target="RFC8441"/> or equivalent
unidirectional-from-substrate transport that the existing
Model Context Protocol session can carry without additional
authentication round-trip.</t>
      <t>On receipt of a policy-update notification, the runtime SHALL:</t>
      <ol spacing="normal" type="1"><li>
          <t>Re-fetch the affected policy artefact via the corresponding
typed surface of Section 3.1.</t>
        </li>
        <li>
          <t>Recompute the runtime hooks of Section 5 from the updated
enforcement-gate specification.</t>
        </li>
        <li>
          <t>Atomically replace its in-memory policy state.  No tool
invocation issued after the atomic replacement observes a
partial composition of the pre-update and post-update gate
sets.</t>
        </li>
        <li>
          <t>Emit a <tt>policy.update</tt> audit signal acknowledging the new
policy epoch.</t>
        </li>
      </ol>
      <t>A runtime SHALL NOT require process restart to apply a policy
update.  An update notification that the runtime cannot apply
(because the substrate returned a malformed artefact, or because
the runtime's hook surface cannot represent the updated gate set)
SHALL cause the runtime to emit a <tt>policy.update-failed</tt> audit
signal and either retain the prior policy state and surface the
condition to the principal, or terminate the session at the
substrate's configured failure-mode.</t>
    </section>
    <section anchor="multi-organisational-composition">
      <name>Multi-Organisational Composition</name>
      <t>A principal MAY be concurrently recognised by multiple
organisational identity substrates.  When the manifest source
resolution of Section 4 returns more than one substrate handle
(for example, when the project-resident anchor names a primary
substrate and the session credential carries auxiliary memberships),
the agent runtime composes the retrieved policy stacks under the
following rules.</t>
      <dl>
        <dt><tt>org_alter_handbook</tt> composition</dt>
        <dd>
          <t>Handbooks compose by union.  Where two handbooks declare
conflicting sections, the substrate declared earlier in the
manifest's precedence order prevails.  In the absence of
explicit precedence, the substrate resolved from the working-
context anchor (Section 4(1) or 4(2)) prevails.</t>
        </dd>
        <dt><tt>org_alter_sop_registry</tt> composition</dt>
        <dd>
          <t>Standard-operating-procedure registries compose by union.
Procedures are identified by the tuple <tt>(substrate-handle,
procedure-identifier)</tt> to permit identically-named procedures
across substrates without collision.</t>
        </dd>
        <dt><tt>org_alter_enforcement_gates</tt> composition</dt>
        <dd>
          <t>Enforcement gates compose by union under a strictest-applicable
rule: where two gates from distinct substrates trigger on a
single prospective tool invocation, the gate whose action is
most restrictive prevails (order as in Section 5).</t>
        </dd>
        <dt><tt>org_alter_ingest</tt> fan-out</dt>
        <dd>
          <t>An audit signal arising from a gate whose evaluation drew on
policy from multiple substrates SHALL be emitted to the audit-
signal endpoints of all participating substrates.  Each
substrate receives the audit trail for its share of the agent
runtime's activity.  Fan-out is realised by parallel append
calls to each substrate's audit endpoint.</t>
        </dd>
      </dl>
      <t>Cross-organisational residual conflicts that the composition
rules above cannot resolve (for example, two substrates' handbooks
declaring mutually-inconsistent positioning rules where neither is
clearly subordinate under the manifest precedence) SHALL be routed
to the peer-protocol Identity Accord ceremony <xref target="IDACCORD"/> between
the participating substrates.  The agent runtime emits an
<tt>accord.residual</tt> audit signal to all participating substrates and
suspends the conflicting action pending resolution by the
substrates' principals.  Resolution does not proceed via a meta-
federation authority; a meta-federation authority is structurally
precluded by the multi-organisational topology this section
specifies.</t>
    </section>
    <section anchor="compliance-state-inheritance">
      <name>Compliance-State Inheritance</name>
      <t>At session-bind, the agent runtime inherits the organisational
identity substrate's then-current compliance state as a single
coherent snapshot.  The snapshot comprises at minimum:</t>
      <ul spacing="normal">
        <li>
          <t>The audit-signal endpoint URI and its current write credential.</t>
        </li>
        <li>
          <t>The enforcement-gate specification at its current epoch.</t>
        </li>
        <li>
          <t>The standard-operating-procedure registry pointer at its
current revision.</t>
        </li>
        <li>
          <t>A hash of the handbook artefact at its current revision.</t>
        </li>
        <li>
          <t>The set of compliance commitments the substrate has accepted
and currently asserts (for example, a refusal of a specified
category of automated invocation, or a specified regulatory
posture).</t>
        </li>
      </ul>
      <t>Inheritance SHALL be atomic.  Either all snapshot elements are
inherited at a single substrate epoch, or session-bind fails.  A
session that proceeds with a partial snapshot is non-conformant.
The runtime SHALL surface session-bind failure to the principal
with the substrate-returned diagnostic; it SHALL NOT silently
degrade to a fallback policy stack.</t>
      <t>Subsequent live updates (Section 7) modify the snapshot at the
runtime in place but do not retroactively alter the snapshot epoch
recorded at session-bind.  The audit trail of a session is the
sequence of policy epochs the runtime observed across its
lifetime, anchored by the session-bind snapshot.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This memo defines a set of Model Context Protocol tool-surface
names under the <tt>org_alter_</tt> prefix.  The four load-bearing names
(<tt>org_alter_handbook</tt>, <tt>org_alter_sop_registry</tt>,
<tt>org_alter_enforcement_gates</tt>, <tt>org_alter_ingest</tt>) are registered
under the existing Morrison-family <tt>org_alter_*</tt> namespace
established by the operator of the reference substrate
(Alter Meridian Pty Ltd) and surfaced in the discovery records of
<xref target="MCPDNS"/>.</t>
      <t>This memo requests that IANA establish, if not already established
by a companion specification, a Model Context Protocol Tool
Surface Names registry, with the four names above registered as
the initial entries, each carrying:</t>
      <ul spacing="normal">
        <li>
          <t>The surface name.</t>
        </li>
        <li>
          <t>A reference to this document.</t>
        </li>
        <li>
          <t>A short specification of the surface's typed return shape.</t>
        </li>
        <li>
          <t>The required authentication scope (member recognition; trust
tier permitted; further substrate-specific predicates).</t>
        </li>
      </ul>
      <t>If the Model Context Protocol Tool Surface Names registry is
established by <xref target="MCPDNS"/> or a successor document, the four names
above are added to that registry under the same allocation policy.</t>
      <t>No new DNS RR types, transport identifiers, port numbers, URI
schemes, or media types are introduced by this memo.  The reuse
of the <tt>_alter.&lt;domain&gt;</tt> DNS label (Section 4(2)) is per <xref target="MCPDNS"/>
and requires no further allocation here.</t>
      <t>The session-manifest path layout referenced by Section 4(1) and
Section 4(3) is implementation-defined and is not registered.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The arrangement specified by this memo concentrates policy,
attribution, and audit on a single substrate addressable by the
principal's identity credential.  The concentration is the load-
bearing property; it is also the principal source of the
following security considerations.</t>
      <section anchor="substrate-compromise">
        <name>Substrate Compromise</name>
        <t>A compromised organisational identity substrate may serve falsified
policy artefacts to authenticated members, induce the runtime to
emit audit signals to an attacker-controlled endpoint, or suppress
update notifications to keep runtimes operating under stale gates.
Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>The substrate's policy artefacts SHOULD be served over a
channel authenticated by the cryptographic identity envelope
of <xref target="MCPDNS"/> (the <tt>_alter.&lt;domain&gt;</tt> Ed25519 binding) so that a
consuming runtime can verify the artefact bears the substrate's
declared signing key.</t>
          </li>
          <li>
            <t>Audit-signal endpoints SHOULD be pinned at session-bind time
to the endpoint URI recorded in the compliance snapshot
(Section 9); mid-session redirection of the endpoint SHALL
require a <tt>policy.update</tt> notification carrying the new endpoint
under the same signing key.</t>
          </li>
          <li>
            <t>Runtimes SHOULD treat suppressed update notifications as an
observable substrate signal under the substrate-observation
posture of <xref target="SUBSTRATE"/>; prolonged absence of update events on
a substrate that asserts an active policy lifecycle is
itself diagnostic.</t>
          </li>
        </ul>
      </section>
      <section anchor="trust-tier-escalation">
        <name>Trust-Tier Escalation</name>
        <t>An Instrument-tier handle that successfully presents a Sovereign-
tier session credential (through credential theft, compromised
session manifest, or substrate misissuance) would receive the
Sovereign-tier gate set, which is by construction more permissive.
Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>The substrate SHALL bind trust tier to the handle itself, not
to the session, and SHALL refuse Instrument-tier handles
presenting Sovereign-tier credentials at the recognition step.</t>
          </li>
          <li>
            <t>Audit signals SHALL carry attribution per Section 6; an
Instrument-tier session writing to the audit log under a
Sovereign-tier attribution is detectable by post-hoc audit and
by the cross-tier checks defined in <xref target="IDCOMMITS"/>.</t>
          </li>
          <li>
            <t>Sovereign-tier confirmation prompts (Section 5's <tt>prompt-for-
confirmation</tt> action) SHOULD be rendered through an out-of-
band channel addressable only by the human principal, so that
an Instrument-tier session in possession of the Sovereign-tier
session credential cannot satisfy a confirmation on the
principal's behalf.</t>
          </li>
        </ul>
      </section>
      <section anchor="multi-organisational-conflict-exploitation">
        <name>Multi-Organisational Conflict Exploitation</name>
        <t>A principal recognised by multiple substrates may be the vector
for an exploit in which one substrate's gate is suppressed by a
falsified or absent gate from a second substrate.  Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>The strictest-applicable rule of Section 8 SHALL be evaluated
over the gates actually retrieved from each substrate.  A
substrate that fails to return its enforcement-gate
specification at session-bind SHALL cause session-bind to fail
for that substrate (no implicit empty-gate-set composition).</t>
          </li>
          <li>
            <t>The principal's manifest precedence declarations SHOULD be
authenticated against the principal's signing key per
<xref target="IDPRONOUNS"/> so that a forged precedence claim cannot install
a less-restrictive substrate as the primary.</t>
          </li>
        </ul>
      </section>
      <section anchor="live-update-replay">
        <name>Live-Update Replay</name>
        <t>An attacker positioned to observe the subscription channel may
attempt to replay an aged <tt>policy.update</tt> notification to roll a
runtime back to an earlier policy epoch.  Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>Update notifications SHALL carry a monotonic substrate-emitted
epoch identifier.</t>
          </li>
          <li>
            <t>Runtimes SHALL reject notifications carrying an epoch less than
or equal to the runtime's currently-applied epoch.</t>
          </li>
          <li>
            <t>The substrate's append-only audit log retains the ordered
history of issued epoch identifiers and is consultable for
post-hoc replay detection.</t>
          </li>
        </ul>
      </section>
      <section anchor="pseudonymous-discovery-substrates">
        <name>Pseudonymous Discovery Substrates</name>
        <t>The handle-scoped fallback of Section 4(4) operates the typed
surfaces against a principal-scoped substrate that does not assert
organisational membership.  An agent runtime in this configuration
inherits the principal's own policy stack but does not benefit
from multi-organisational composition.  Implementations SHOULD
surface to the principal that the session is operating in the
fallback configuration so that the absence of an organisational
substrate is not silently consumed.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The audit-signal flow of Section 6 records the agent runtime's
tool-invocation activity on the substrate.  The substrate operator
has visibility into the principal's session activity at the
granularity of the substrate-specified significance predicate.
Three privacy postures arise.</t>
      <section anchor="significance-predicate-scope">
        <name>Significance-Predicate Scope</name>
        <t>The substrate determines which events are significant and therefore
audited.  A significance predicate covering every tool invocation
yields a complete activity log; a narrower predicate audits
only events the substrate considers operative.  Substrate operators
SHOULD publish their significance predicates as part of the
handbook artefact so that authenticated members understand the
scope of audit they consent to as a function of membership.</t>
      </section>
      <section anchor="argument-redaction">
        <name>Argument Redaction</name>
        <t>Tool-invocation arguments SHOULD be redacted before inclusion in
the <tt>tool.invoke</tt> audit signal payload.  Minimum redaction practice
is removal of secret material (credentials, signing keys),
personally-identifying information about third parties referenced
in the invocation, and any field the principal has marked
sensitive in a per-session redaction profile.  Substrate operators
SHOULD specify their argument-redaction expectations in the
handbook artefact.</t>
      </section>
      <section anchor="cross-substrate-audit-fan-out">
        <name>Cross-Substrate Audit Fan-Out</name>
        <t>Under multi-organisational composition (Section 8), audit signals
arising from gates contributed by multiple substrates are fanned
out to all contributing substrates.  Each substrate receives the
audit trail for invocations its policy participated in evaluating;
each substrate may therefore see activity the principal did not
intend to surface to it.  Principals SHOULD be made aware of the
fan-out posture at the time their multi-organisational membership
is established; substrates SHOULD declare in their handbook
artefact the fan-out events they expect to receive from sessions
of members concurrently bound to peer substrates.</t>
      </section>
    </section>
    <section anchor="relation-to-companion-memos">
      <name>Relation to Companion Memos</name>
      <t>This memo composes with five Morrison-family Internet-Drafts.</t>
      <t><xref target="MCPDNS"/> supplies the DNS-based discovery surface from which the
manifest-source resolution of Section 4(2) draws and the
cryptographic identity envelope referenced in Section 11.  This
memo introduces no new DNS records or labels beyond those
specified by <xref target="MCPDNS"/>.</t>
      <t><xref target="IDPRONOUNS"/> supplies the handle namespace and trust-tier
taxonomy referenced throughout this memo.  This memo introduces
no new handle category.</t>
      <t><xref target="IDCOMMITS"/> supplies the attribution grammar that the audit-
signal <tt>attribution</tt> field of Section 6 mirrors at the protocol
layer.  An audit signal and a <tt>Acted-By:</tt> / <tt>Drafted-With:</tt> commit
trailer block carry the same attribution shape, one at runtime,
one at version-control commit time.</t>
      <t><xref target="SUBSTRATE"/> supplies the substrate-observation posture under which
the runtime treats absence of expected update notifications as a
substrate signal (Section 11).  Substrate observation also supplies
the cross-session coordination floor against which multiple
concurrent runtimes of the same principal deconflict without
exchanging coordination messages.</t>
      <t><xref target="IDACCORD"/> supplies the peer-protocol ceremony to which Section 8's
cross-organisational residuals are routed.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>A reference implementation of the agent-runtime side of this
specification is operated by the present author against the
substrate <tt>~truealter.com</tt>, which exposes the surfaces of
Section 3.1.  The reference deployment supplies policy artefacts
to instrument-tier agent-runtime sessions of the recognised
member <tt>~blake</tt> and writes audit signals to the substrate's
append-only event log.</t>
      <t>In the spirit of <xref target="RFC7942"/>, the present author notes that this
section is intended to document implementation experience and is
expected to be removed before the document advances beyond the
Independent Stream.  No claim of interoperability is made; the
reference deployment is a single substrate operated by the
specification's author.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8615" target="https://www.rfc-editor.org/info/rfc8615" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8615.xml">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="MCPDNS" target="https://datatracker.ietf.org/doc/draft-morrison-mcp-dns-discovery/">
          <front>
            <title>Discovery of Model Context Protocol Servers via DNS TXT Records</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="IDPRONOUNS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-pronouns/">
          <front>
            <title>Identity Pronouns: A Reference-Axis Extension to ~handle Identity Systems</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="IDCOMMITS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-attributed-commits/">
          <front>
            <title>Identity-Attributed Git Commits via Tier-Structured Trailers</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="SUBSTRATE" target="https://datatracker.ietf.org/doc/draft-morrison-substrate-observation/">
          <front>
            <title>Substrate-Observation as an Alternative to Envelope Coordination for Concurrent Sessions</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="IDACCORD" target="https://datatracker.ietf.org/doc/draft-morrison-identity-accord/">
          <front>
            <title>Identity Accord Protocol</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="MCP" target="https://modelcontextprotocol.io">
          <front>
            <title>Model Context Protocol Specification</title>
            <author>
              <organization>Agentic AI Foundation</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8499" target="https://www.rfc-editor.org/info/rfc8499" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8499.xml">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC7942" target="https://www.rfc-editor.org/info/rfc7942" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC8441" target="https://www.rfc-editor.org/info/rfc8441" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8441.xml">
          <front>
            <title>Bootstrapping WebSockets with HTTP/2</title>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document defines a mechanism for running the WebSocket Protocol (RFC 6455) over a single stream of an HTTP/2 connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8441"/>
          <seriesInfo name="DOI" value="10.17487/RFC8441"/>
        </reference>
        <reference anchor="AGENTGOV" target="https://truealter.com/docs/decisions/agent-governance-via-org-alter">
          <front>
            <title>Policy is an Org-Alter Primitive (Proposed Architectural Decision D-AGENT-GOVERNANCE-VIA-ORG-ALTER-1)</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 817?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This memo grew out of internal architectural work on the question
of how an agent runtime, bound to a principal at instantiation,
should receive the corpus of policy artefacts a real organisation
supplies a new contractor on commencement of an engagement.  The
realisation that the corpus is structurally co-located with the
identity that names the principal as a member, and that the
prevailing architectural separation between governance plane and
identity plane is itself the failure mode, is the load-bearing
insight behind this specification.</t>
    </section>
    <section numbered="false" anchor="authors-address">
      <name>Author's Address</name>
      <t>Blake Morrison
Alter Meridian Pty Ltd
Cronulla, NSW
Australia
Email: blake@truealter.com</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
