RIP-100

Authorization Objects (AO)

Status: Draft

Abstract

RIP-100 defines Authorization Objects (AO): first-class, time-bounded, revocable authorizations that exist independently of execution. An Authorization Object represents explicit permission for a class of actions to occur, without prescribing when, how, or whether execution takes place.

This proposal defines no execution semantics.

Definition

An AO asserts:

“A grantor permits a grantee to perform an action within a defined scope, subject to explicit validity constraints.”

An Authorization Object MUST include:

The Authorization Object has a deterministic identity, typically derived as a cryptographic hash of its contents.

Non-goals

Authorization Objects represent permission, not action.

Lifecycle

  1. Creation — the grantor signs an Authorization Object
  2. Existence — the object may be stored, transmitted, or observed
  3. Evaluation — third parties verify validity at a given time
  4. Revocation — the grantor invalidates the authorization
  5. Expiration — the authorization ceases outside its validity window

At no point does the Authorization Object itself cause execution.

Profiles and infrastructure

Authorization Objects are intentionally generic. Domain-specific proposals may define profiles that interpret the scope field, and infrastructure that records or observes AO state.

Specification

Add your canonical RIP-100 draft link here when ready.

Draft link
REPLACE_WITH_RIP_100_URL