Skip to main content
SecureAuthSecureAuth
Back to Blog
AI Security
July 15, 2025
8 min read

Automated Trust: OpenID Federation & CDR-Style Accreditation

Lukasz Radosz
5-Part Series: Architecting Identity for Agentic AI

Why Automated Trust Matters for Agentic AI

Across the previous four parts of this series, we established the foundations for agentic AI identity: wiring MCP to your IdP with OAuth 2.1, securing internal tools behind the firewall, and managing cross-boundary SaaS integrations with Dynamic Client Registration and trust registries. All of these assumed, to varying degrees, that participating systems already know and trust each other. But what happens when they don't?

In practice, agentic AI systems increasingly need to establish trust across organizational boundaries. An enterprise deploying an AI orchestration layer may need to integrate with external AI service providers, partner APIs, or federated identity systems — all without prior direct relationships. Manual pre-registration of every potential counterparty doesn't scale when agents are dynamic, ephemeral, and operating across ecosystems.

Parties with no prior direct relationship can dynamically establish trust based on digital signatures and agreed trust anchors.
— OpenID Connect Federation 1.0 Specification

OpenID Connect Federation 1.0 (OIDF 1.0) provides exactly this capability. It introduces a hierarchical trust model built on cryptographic signatures, published metadata, and trust anchors — enabling automated, verifiable trust establishment without manual configuration. When combined with accreditation frameworks inspired by Australia's Consumer Data Right (CDR), it creates a robust foundation for governing which AI agents are permitted to participate in federated ecosystems.

Zero
Manual Pre-Registration
7-Step
Discovery Process
Signed
JWT Assertions
CDR
Accreditation Model

OpenID Federation 1.0: A Primer

OIDF 1.0 extends OpenID Connect by introducing a federation layer for automating trust. Every party — whether an IdP, RP, or intermediary authority — is a Federation Entity with its own signed metadata. Four key innovations transform how identity participants discover, verify, and interact with each other.

1

Federation Entity & Metadata

Each entity publishes a self-signed JSON Web Token (Entity Configuration) at a well-known URL: /.well-known/openid-federation. This contains the entity's identity, role (OpenID Provider, Relying Party, etc.), cryptographic keys (JWKS), and standard OIDC metadata. It is the entity's self-declaration — what it claims to be and what it can do.
2

Entity Statements (Signed Metadata)

An Entity Statement is a JWT in which an issuer asserts the metadata of a subject entity. Unlike self-signed Entity Configurations, Entity Statements are issued by trusted authorities — organizations that vouch for the subject's identity, capabilities, and compliance. This is the cryptographic equivalent of a letter of reference, but machine-verifiable and tamper-proof.
3

Trust Chains

A trust chain is a sequence of Entity Statements linking a leaf entity (e.g., an AI agent service) through zero or more Intermediate Authorities up to a recognized Trust Anchor. Each link is a signed JWT, and the entire chain must validate cryptographically. Trust chains are uni-directional — mutual trust requires two independent chains, one in each direction.
4

Automatic Client Onboarding

Federation metadata enables automatic client registration. When a Relying Party presents a valid trust chain rooted at a recognized Trust Anchor, an OpenID Provider can accept it without any manual setup. This eliminates hand-configured registries and enables AI agents to onboard into new ecosystems dynamically.

The Federation Trust Hierarchy

OIDF 1.0 organizes participants into a hierarchical structure. At the top sit Trust Anchors — entities that all participants agree to trust as the root authority (analogous to root Certificate Authorities in TLS). Below them, Intermediate Authorities can further delegate trust. At the bottom, Leaf Entities are the actual service participants: AI agent platforms, identity providers, resource servers, and relying parties.

Federation Trust Hierarchy

Trust Anchor

Root of trust (e.g., industry consortium, government body)

Entity Statement (signed JWT)

Intermediate Authority A

Enterprise federation operator

Intermediate Authority B

AI vendor accreditation body

Entity Statements (signed JWTs)

Leaf Entity

AI Agent Service

Leaf Entity

Enterprise IdP

Leaf Entity

Data Provider API

Each arrow represents a signed Entity Statement (JWT) where the issuer asserts the metadata of the subject entity below. Trust flows downward from anchor to leaves.

This hierarchy is particularly powerful for agentic AI because it mirrors how trust actually works in enterprise ecosystems. A large financial services consortium might serve as a Trust Anchor. Member banks and their approved AI vendors sit as Intermediate Authorities. Individual AI agent instances — the actual services performing tasks — are Leaf Entities whose trustworthiness can be verified by tracing their chain back to the consortium root.

Trust Chain Discovery & Validation

The process of establishing trust in OIDF 1.0 follows a precise seven-step procedure. When one entity (the verifier) encounters another entity (the subject) and wants to determine whether it should be trusted, it performs the following discovery and validation sequence:

Step 1

Entity Configuration Fetch

Retrieve the entity's self-signed Entity Configuration from its well-known endpoint (/.well-known/openid-federation). This JWT contains identity claims, cryptographic keys (JWKS), and authority hints.

Step 2

Read Authority Hints

Parse the authority_hints claim from the Entity Configuration. These are identifiers of superior entities (Intermediate Authorities or Trust Anchors) that vouch for this entity.

Step 3

Fetch Entity Statement

Request an Entity Statement about the subject entity from each hinted authority's federation fetch endpoint. The authority returns a signed JWT asserting the subject's metadata.

Step 4

Iterate to Trust Anchor

Repeat steps 1–3 for each authority in the chain, following authority hints upward until a recognized Trust Anchor is reached. This builds the full chain of signed assertions.

Step 5

Validate Signatures

Verify each JWT signature in the chain using the issuer's published keys. Every link must be cryptographically valid to ensure chain integrity from leaf to anchor.

Step 6

Apply Policy

Process metadata policies from each authority in the chain. Superior entities can constrain subordinate metadata — restricting scopes, enforcing encryption, or limiting grant types.

Step 7

Establish Trust & Use Metadata

Once validated, the entity is deemed trustworthy. Its resolved metadata (after policy application) is used for standard OIDC/OAuth interactions — token endpoints, signing keys, and supported flows.

Trust chains are uni-directional — mutual trust between two entities requires building and validating two separate chains, one in each direction. This prevents unilateral trust assumptions and ensures both parties have been vouched for by their respective trust hierarchies.

Federation Trust Models: Hierarchical vs. Mesh

OIDF 1.0 is flexible enough to support different trust topologies. Whether the trust model is centralized or multilateral, the mechanism of verification is uniform — the architect's task is mainly to configure the appropriate trust anchors and policies.

1

Hierarchical Trust

Analogous to classic PKI: a single Trust Anchor (or small set of anchors) sits at the top, and all federation members are directly or indirectly certified by it. If two parties share the same trust anchor, they can establish trust. Many industry trust frameworks adopt this model — e.g., Australia's CDR has a central accreditation registry that could serve as the trust anchor signing statements for each accredited participant.
2

Mesh or Multilateral Trust

An entity can be part of multiple federations or trust networks. OIDF allows multiple entries in authority_hints and an RP can trust multiple anchors. An AI service might be accredited in both a healthcare federation and a financial services federation — an enterprise in either sector could trust it via the respective authority. Trust is established if any trusted anchor yields a valid chain.

A Federation Operator administers a federation — often operating the trust anchor or coordinating policies among multiple authorities. Operators define the technical and legal policies of the trust framework and may provide discovery services (e.g., a resolve endpoint that returns fully validated metadata). Their role is analogous to a certificate authority, but with richer, dynamic metadata handling.

Use Case 1: Onboarding an External AI Agent

Imagine an enterprise wants to allow an external AI SaaS platform to access internal data on behalf of users — for instance, an AI scheduling agent that needs to read employees' calendars via an API. With OpenID Federation, this onboarding can be seamless and automated.

  1. 1
    Mutual IdP-Client Trust

    The AI platform presents its federation entity ID and metadata when initiating the OAuth flow. The enterprise IdP triggers trust chain resolution — fetching the AI client's entity configuration and walking the chain to a known trust anchor. If the AI platform is accredited under a recognized AI services trust network, the enterprise trusts that network's anchor.

  2. 2
    Automatic Client Registration

    Because the AI client's metadata is now verified via the trust chain, the enterprise IdP can automatically treat this client as registered — issuing tokens without a human admin configuring the client in advance. The IdP applies federation policies before issuing tokens, ensuring requested scopes are allowed under the trust framework.

  3. 3
    AI Trusting Enterprise IdP

    The AI platform verifies the enterprise IdP's identity via federation in reverse. It fetches the enterprise IdP's entity configuration, follows its authority_hints, and confirms the IdP is legitimate and accredited. This protects against the AI agent sending credentials to a rogue IdP impersonator.

  4. 4
    Token Exchange and Access

    Once the OIDC handshake succeeds, the enterprise IdP issues an access token. The AI agent calls the enterprise's MCP server or API using that token to retrieve the needed data. The enterprise API trusts the token because it's issued by its own IdP — normal internal trust after federation enabled the external client.

Trust Marks

A trust mark is a "statement of conformance to a set of requirements as determined by an accreditation authority." In OIDF, trust marks are digital and can be included in entity metadata. The enterprise IdP could require a certain trust mark (e.g., compliance with a specific security standard) to be present in the AI client's metadata during chain validation.

Because AI systems might need to connect to countless enterprise services, a federation approach means an enterprise can trust any number of qualified AI agents without bespoke onboarding for each. As long as those agents are in the federation, the identity layer automatically enables secure authentication and authorization — drastically reducing integration time and the risk of misconfigured credentials.

Use Case 2: Federating Enterprise IdPs for AI Delegation

Consider a large enterprise (or coalition of organizations) where multiple identity domains exist — separate IdPs for different business units, or a partner network where each organization has its own IdP. An AI agent operating in this environment may need to move seamlessly between domains: orchestrating tasks involving an HR system (authenticated via Corporate AD) and a Finance system (authenticated via a separate IdP).

Common Trust Anchor

The enterprise sets up a trust anchor representing corporate policy. Each internal IdP and major service registers under this anchor — their metadata signed by the corporate authority.

Cross-Domain SSO for AI

An AI agent in Domain A can access Domain B's applications. Domain B verifies Domain A's IdP metadata against the corporate trust anchor. Both IdPs are policy-compliant under one framework, enabling federated SSO.

Delegated Token Exchange

An AI service holding a token from Domain A's IdP can call an API protected by Domain B's IdP. Federation supports standardized token exchange if both IdPs trust each other via the shared anchor.

Unified Policy Enforcement

The corporate trust anchor's metadata policy mandates consistent rules — LoA requirements, mandatory token claims, approved algorithms — propagating throughout all domains. No domain is a weak link.

When Service B encounters a token issued by IdP A (via the AI agent's request), it uses OpenID Federation to validate IdP A's trust chain against the corporate trust anchor. Since the chain checks out, Service B accepts the token — enabling agentic AI workflows to scale across organizational boundaries.

Trust Frameworks & Federation Policy Overlays

A major strength of OpenID Federation is that it can embody Trust Frameworks — the legal, security, and compliance rules of an ecosystem — in a technical form. Here's how frameworks like CDR and Open Banking map to OIDF 1.0 concepts:

1

Accreditation Authority as Trust Anchor

In a CDR-style model, a government body accredits data recipients. In OIDF terms, this authority operates a Trust Anchor. Each accredited entity publishes an entity configuration, and the trust anchor issues an entity statement for each — effectively saying "I attest that this software is accredited." All participants configure their systems to trust the anchor's key, enabling automatic accreditation verification via trust chains.
2

Federation Metadata Policies

Trust frameworks impose uniform requirements — "OAuth clients must use mTLS or private key JWT," "tokens must be FAPI-compliant." The metadata_policy in federation bakes these into the trust process. The trust anchor includes policy in its statements so any participant's metadata is automatically checked for compliance. If an RP doesn't meet the policy, trust chain evaluation fails or metadata is adjusted to conform.
3

Trust Marks for Fine-Grained Qualifications

Some frameworks categorize participants (e.g., Read-Only vs Read/Write Accredited). OIDF supports Trust Marks — digital badges issued by an authority asserting a specific qualification or compliance (like "CDR Accredited Data Recipient" or ISO 27001 certified). Trust marks appear in entity metadata and can be required by counterparties, adding policy nuance beyond the basic trust decision.
4

Dynamic Lifecycle Management

Trust frameworks aren't static. Federation handles this via metadata refresh and JWT expiration times. If an accreditation is revoked, the trust anchor stops signing that entity's metadata. Relying parties periodically revalidate chains (cached with a validity period). This is more scalable and less error-prone than updating static trust lists or CRLs — the federation endpoints themselves distribute the changes.

CDR-Style Accreditation for AI Agents

OpenID Federation provides the mechanism for automated trust, but trust alone is insufficient. We also need a framework for determining who is worthy of trust — which entities have been vetted, audited, and approved. This is where accreditation comes in.

Consumer Data Right (CDR) Accreditation Model

Australia's CDR framework provides a powerful precedent. Under CDR, any entity that wants to receive consumer data must first be accredited by the Australian Competition and Consumer Commission (ACCC). Accredited participants are registered in a publicly accessible trust registry, and data holders verify accreditation status before sharing data.

By combining CDR-style accreditation with OIDF 1.0 trust chains, we get a system where trust is both cryptographically verifiable (via federation) and substantively meaningful (via accreditation). An AI agent isn't trusted merely because it has a valid signature chain — it's trusted because it has been vetted by an accreditation body and its accreditation status is embedded in the federation metadata.

Accreditation Tiers for AI Agents

Tier 1: Basic Registration

Agent identity verified and published in registry. Permitted for low-risk, read-only interactions. Minimal compliance requirements.

Tier 2: Standard Accreditation

Security audit passed, data handling policies reviewed, operational SLAs established. Permitted for standard transactional interactions.

Tier 3: Elevated Accreditation

Full compliance certification (SOC 2, ISO 27001), penetration testing, incident response plan verified. Permitted for sensitive data access and high-value operations.

Tier 4: Regulated Accreditation

Sector-specific regulatory approval (financial services, healthcare). Continuous monitoring and periodic re-accreditation. Permitted for regulated operations and PII handling.

Implications for Agentic AI Systems

The combination of OIDF 1.0 and CDR-style accreditation has profound implications for how agentic AI ecosystems are built and governed.

  • Dynamic trust establishment: AI agents can join and interact with new ecosystems on-the-fly, as long as they can produce a valid trust chain to a recognized anchor. Essential for architectures where agents are composed dynamically.
  • Verifiable provenance: Every AI agent has a cryptographically provable chain of custody. An enterprise can trace an incoming agent's identity back through intermediate authorities to the trust anchor — establishing identity, organizational affiliation, and accreditation status.
  • Policy enforcement at scale: Metadata policies applied by authorities enforce security requirements (mandating mTLS, restricting token lifetimes, requiring specific scopes) without bilateral negotiation.
  • Revocation and lifecycle management: Authorities can revoke entity statements, removing agents from the trust hierarchy. A scalable mechanism for decommissioning compromised or non-compliant AI agents across the entire federation.
  • Cross-sector interoperability: A healthcare AI agent accredited under one trust anchor can interact with a financial services agent under a different anchor, provided cross-recognition exists between the anchors.

From Manual Trust to Automated Federation

Traditional Approach

  • Manual API key exchange per partner
  • Bilateral certificate pinning
  • Static allow-lists in configuration files
  • Weeks-long onboarding per integration
  • No standard revocation mechanism

Federated Approach (OIDF 1.0)

  • Automated trust via signed metadata chains
  • Cryptographic verification at every link
  • Dynamic discovery through well-known endpoints
  • Instant onboarding with valid trust chain
  • Authority-controlled revocation at any level

Concluding the Series: Identity as the Foundation

Over five articles, we've built a comprehensive architecture for identity in agentic AI systems — from wiring MCP to your IdP with OAuth 2.1, through securing internal tools and managing SaaS integrations, to automated trust establishment across organizational boundaries.

The through-line is clear: as AI agents become more autonomous, more interconnected, and more consequential, identity is not a peripheral concern — it is the foundational infrastructure upon which safety, compliance, and interoperability depend. Every agent needs a verifiable identity. Every interaction needs authorization. Every trust relationship needs cryptographic proof.

OpenID Federation 1.0, combined with accreditation frameworks like CDR, provides the capstone: a standard, scalable mechanism for extending identity-based trust beyond the boundaries of any single organization. With this in place, agentic AI can fulfill its promise of autonomous, cross-organizational collaboration — without sacrificing the security and governance that enterprises demand.

Part 1: Identity 101 for AI Agents

OAuth 2.1 and OIDC fundamentals as they apply to AI agents — the building blocks for every integration.

Part 2: Wiring MCP to Your IdP

Direct OAuth flows, token exchange, and the division of responsibilities between IdP and MCP resource servers.

Part 3: Inside the Firewall

Advanced OAuth 2.1 patterns for internal AI — Token Exchange, RAR, PAR, and CIBA for defense-in-depth.

Part 4: Inviting SaaS AI

Cross-boundary integration with Dynamic Client Registration, trust registries, and signed software statements.

Part 5: Automated Trust (This Article)

Scaling trust across organizational boundaries with OpenID Federation 1.0 and CDR-style accreditation registries.

Download the Full Whitepaper

Get the complete “Automated Trust: OpenID Federation & CDR-Style Accreditation” guide with architecture diagrams, trust chain walkthroughs, and federation policy details.

Ready to transform your identity security?

See how SecureAuth's Continuous Authority platform can protect your organization.

About SecureAuth

SecureAuth provides identity and access management solutions that enable enterprises to implement customized, resilient authentication infrastructure. Through Continuous Authority, flexible deployment options, and deep composable capabilities, SecureAuth helps organizations defend against modern identity threats while maintaining usability and operational efficiency.

Share this article: