Components of an on-behalf-of delegation pattern

Components of an on-behalf-of delegation pattern

While at the OAuth Security Workshop (Feb 2025) and more recently the Internet Identity Workshop (April 2025), I had multiple conversations around delegated authorization; and especially the on-behalf-of use case. These ranged from personal conversations over drinks to more formally organized discussions as “un-conference” sessions (thanks to @Dean Saxe and @Mark Haines for running those).

There is much yet to distill from those conversations but I wanted to share a few thoughts that crystalized as the discussions unfolded. Here are some key characteristics for the on-behalf-of use case.

  • Lifecycle - the delegated authorization is created, active for some period of time and then revoked. It may, or may not be used by the delegated party.
  • Actors - there are two legal parties involved. The one legal party is delegating authorization to the other legal party to act as a fiduciary (or in some authority) of the first legal party. Note that it is possible for the “legal party” to represent more than a single person or company.
  • Relationship - the actors are in some relationship with each other. This relationship can define a domain in which the delegation is valid.
  • Authorization Policy - policy that defines when the delegated authorization is activated/deactivated and puts constraints on the scope of the delegated authorization. For example, the delegation of guardianship (parent is the guardian of the child) is deactivated when the child turns 18 (in some jurisdictions).

Where I think this gets really interesting is in every day use cases like the following…

I’d like to delegate authority to my daughter to use my Costco card so that she can do the shopping for me this week. At our local Costco stores, they are scanning every card on entrance to the store and comparing the image on the card with the person presenting it. This begs the question of how do I create such a policy that it could be presented at entrance to a Costco store and be accepted as valid?

It would be nice to be able to leverage digital credentials for this though I know of no ongoing work to try and spec out how that might be possible. I want the delegation to have the following properties:

  • Local creation - I need to be able to create the delegated authorization credential from my own wallet.
  • Transference - I need a way to transfer the newly created digital credentials to another wallet
  • Constrained - I need to be able to ensure the delegated authorization is properly constrained (the authorization policy for this delegation). For instance, can I make the delegation one-time-use? Or time bound? What about location constrained (only at this particular Costco store)? Financially constrained (can’t spend more than $X dollars)?

I realize we (the global we) haven’t designed (applied) standards for even the basic on-behalf-of use cases. However, I don’t think we should limit ourselves to just the simple use cases but rather define mechanisms that will work for future needs as well. I’d love to hear your thoughts in the comments!

P.S. For those interested, there is work happening around this topic in

Thanks for this. Curious if a key characteristic would be that the verifier could see information about both parties in the transaction (e.g., X is acting on behalf of Y) and then record that in case they needed to explain the circumstances of the transaction (e.g., Y looked at X's medical record and that was permitted because Y could prove delegation)?

We have quite a few different use cases in the real estate industry, where there are fiduciaries acting on behalf of a buyer or seller, and where a delegated authorization can then be further delegated in case one of these fiduciaries goes on vacation. I'm starting to think more and more around this use case and how it applies to our business model.

Mitchell Nguyen

CEO @ WebBadge.com (Beta 🆙) | 2x Technical Solo-Founder | 1% for the Planet Member | Early Investors, Founding Team Members & Strategic Partners Welcome | Webby Honoree • Lovie Shortlist • Davey🥈 | Qualcomm & UCSD Alum

7mo

+1 to “leverage digital credentials” to grant authority! Similar to how “something you know” (like a password or PIN), “something you have” (like a smartphone or security token), and “something you are” (like a fingerprint or facial recognition) are used for #MFA, “what you have” (like verifiable credentials or badges) is used for authorization—on the frontend. 💡On the backend, how much can we leverage #AI to dynamically interpret, design, and implement authorization policies, conditions, and constraints—given how Costco, Sam’s Club, and other memberships may vary in policies and options regarding what’s acceptable? #ConsumerAuthorization #Authorization

Tom Jones

trustregistry.us = No Human Left Behind. Let's fix this now!

7mo

Kantara is currently focused on delegation for disadvantaged users. The point is to raise inclusion for digital public infrastructure to all humans. Comments welcomed. I see lots of synergy with George's approach. https://docs.google.com/document/d/1uGJkFPUuHtj_hFJsOrEQ7qHxTfBocPmN/edit?usp=sharing&ouid=109794657323597753486&rtpof=true&sd=true

Well credential may be a way, but we currently solve exactly this use-case for another large retailer using essentially Attribute-enhanced ReBAC. This is quite typical of Relationship-based and Context-based access control. And so is B2B, B2B2C !

To view or add a comment, sign in

More articles by George Fletcher

  • When Science Fiction becomes Reality

    This morning as I was preparing for the 41st addition of the Internet Identity Workshop, I started down this rabbit…

    2 Comments
  • Identifiers for Agentic AI

    I’ve seen many discussions regarding identifiers for Agentic AI when it comes to security, audit, compliance and…

    46 Comments
  • A Delegated Authorization Use Case

    This use case has come up in previous articles and posts, and I’d like to take a deeper look at what’s possible today…

    20 Comments
  • Is Federated Authorization a thing?

    While I don’t often hear these words combined, I do see work that could be classified this way. Take for instance the…

    14 Comments
  • Authentication or Authorization: Which comes first?

    I remember having this conversation with Ian Glazer at an European Identity and Cloud Conference a few years ago. We…

    24 Comments
  • Delegated Authentication

    We all know about Federated Authentication (more commonly known as Single-Sign-On [SSO])… so what is Delegated…

    15 Comments
  • What might an on-behalf-of token look like?

    In a previous Obtaining an on-behalf-of Authorization Token, I described a method for obtaining an on-behalf-of…

    11 Comments
  • Obtaining an On-Behalf-Of authorization token

    In this article I want to focus on what steps are required for a customer care system to obtain an on-behalf-of token…

    21 Comments
  • The importance of "Consent Receipts" in an AI Agent world

    In my last post on the topic of delegated authorization use cases, the comments brought up the use case of an AI Agent…

    11 Comments
  • Off to New Adventures!

    Today marks my last day at Capital One. The last 3 years have been rewarding, unexpected and challenging both…

    76 Comments

Others also viewed

Explore content categories