<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-oauth-transactiontokens-bcp-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>OAuth Transaction Tokens Best Current Practice</title>
    <seriesInfo name="Internet-Draft" value="draft-oauth-transactiontokens-bcp-01"/>
    <author fullname="ASHAY RAUT">
      <organization>Amazon</organization>
      <address>
        <email>asharaut@amazon.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="21"/>
    <area>AREA</area>
    <workgroup>WG Working Group</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 33?>

<t>This document provides best current practices for implementing and deploying OAuth 2.0 Transaction Tokens as specified in draft-ietf-oauth-transaction-tokens. Transaction Tokens (Txn-Tokens) enable workloads in a trusted domain to preserve and propagate user identity and authorization context across service boundaries during the processing of external programmatic requests. This BCP addresses practical deployment considerations including token service architecture, size management, propagation patterns, validation strategies, and operational monitoring that are essential for secure and effective implementation in production environments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-oauth-transactiontokens-bcp/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ashayraut/oauth-transactiontokens-best-current-practice"/>.</t>
    </note>
  </front>
  <middle>
    <?line 38?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="background">
        <name>Background</name>
        <t>Modern distributed systems built on microservice architectures face a fundamental challenge: maintaining security context as requests traverse multiple service boundaries. When an external actor initiates an API request, the user identity and authorization context must be preserved and made available to all downstream internal microservices involved in processing that request. Without a standardized mechanism, organizations resort to ad-hoc solutions that introduce security vulnerabilities, operational complexity, and interoperability challenges.</t>
        <t>The OAuth 2.0 Transaction Tokens specification (draft-ietf-oauth-transaction-tokens) addresses this challenge by defining a token format and exchange protocol that enables secure context propagation across internal microservices within trusted domains. However, the specification focuses on protocol mechanics rather than deployment practices. Real-world implementations face additional challenges including latency constraints, token size limitations, schema evolution, propagation reliability, and operational monitoring.</t>
      </section>
      <section anchor="purpose-of-the-bcp">
        <name>Purpose of the BCP</name>
        <t>This Best Current Practice document provides implementers with guidance derived from production deployments of Txn-Token systems. It addresses practical considerations that fall outside the scope of the protocol specification but are critical for successful deployment. The recommendations in this document are based on operational experience with large-scale microservice environments where hundreds of internal microservices must coordinate security context propagation across complex call chains.</t>
        <t>This BCP is intended for:
- Organizations implementing Transaction Token Services
- internal microservice developers integrating Txn-Token support
- Security architects designing authorization systems
- Operations teams monitoring token propagation</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in RFC 2119.
This document uses terminology from draft-ietf-oauth-transaction-tokens including "Transaction Token" (Txn-Token), "Transaction Token Service", "trusted domain", and "authorization context".</t>
    </section>
    <section anchor="best-current-practices">
      <name>Best Current Practices</name>
      <section anchor="transaction-token-service-implementation">
        <name>Transaction Token Service Implementation</name>
        <section anchor="service-architecture">
          <name>Service Architecture</name>
          <t>Organizations <bcp14>SHOULD</bcp14> setup Transaction Token Service (TTS) which hosts functionality to issue token, replace token and other Txn-Token related functionality. Organizations <bcp14>SHOULD</bcp14> prefer architectures where the authorization service that authenticates and authorizes external actors, invokes the TTS for getting Transaction Token as part of authentication and authorization requests and pass Txn-token as well with it. This way, it avoids an explicit calls from external endpoint to TTS and lesser code changes in external services. Additionally, all internal microservices that want to replace tokens <bcp14>SHOULD</bcp14> connect directly to TTS. This architecture strikes balance between the options to either have authorization service host all TTS functionality or external services needing to connect TTS.</t>
        </section>
        <section anchor="context-selection">
          <name>Context Selection</name>
          <t>Transaction Token Services <bcp14>MUST</bcp14> include all mandatory claims defined in draft-ietf-oauth-transaction-tokens. However, services <bcp14>SHOULD NOT</bcp14> include all optional contexts by default. Optional contexts such as transaction context (tctx) or custom claims <bcp14>MUST</bcp14> be added only when explicitly requested.</t>
          <t>Organizations <bcp14>SHOULD</bcp14> provide client libraries that offer interfaces for requesting Txn-Tokens with specific optional contexts. This approach prevents token bloat while ensuring that services can obtain the context they require. When an optional context cannot be added due to parsing errors, format violations, or unavailability, the Transaction Token Service <bcp14>MUST NOT</bcp14> fail the token issuance. Instead, it <bcp14>SHOULD</bcp14> issue the token without that specific context and <bcp14>MAY</bcp14> log the condition for operational monitoring.</t>
        </section>
      </section>
      <section anchor="token-size-management">
        <name>Token Size Management</name>
        <section anchor="size-limits">
          <name>Size Limits</name>
          <t>Transaction Token Services <bcp14>MUST NOT</bcp14> issue tokens larger than 4KB. While HTTP specifications do not mandate maximum header sizes, common web server implementations impose limits to prevent Denial of Service attacks. Apache defaults to 8KB maximum header size, but organizations must account for other headers in the same request. A 4KB limit for Txn-Tokens provides reasonable headroom while preventing operational issues.</t>
          <t>Organizations <bcp14>SHOULD</bcp14> implement monitoring on token size to detect trends toward the limit. Services that consistently approach size limits indicate either excessive context inclusion or the need for context relocation strategies.</t>
        </section>
        <section anchor="context-relocation">
          <name>Context Relocation</name>
          <t>When authorization context exceeds 4KB, Transaction Token Services <bcp14>SHOULD</bcp14> implement a relocation endpoint. The service stores oversized contexts in a separate data store using the Txn-Token identifier as the primary key. The Txn-Token itself contains only a reference to the relocated context.</t>
          <t>Client libraries for token validation <bcp14>SHOULD</bcp14> transparently handle context relocation. When an internal microservice requests a context that has been relocated, the library fetches it from the relocation endpoint. This pattern mirrors Policy Information Points in Attribute-Based Access Control (ABAC) systems where additional attributes are retrieved at runtime.</t>
          <t>Context relocation introduces additional latency and failure modes. Organizations <bcp14>SHOULD</bcp14> treat relocation as an exception rather than the normal case. Monitoring <bcp14>SHOULD</bcp14> track relocation frequency to identify services that consistently require excessive context.</t>
        </section>
      </section>
      <section anchor="token-lifetime-and-expiration">
        <name>Token Lifetime and Expiration</name>
        <t>Transaction tokens <bcp14>SHOULD</bcp14> have a time-to-live of less than 5 minutes. Organizations <bcp14>SHOULD</bcp14> determine appropriate lifetimes by working backward from latency Service Level Agreements (SLAs) defined for external endpoints.</t>
        <t>Short token lifetimes reduce the window for token compromise and limit the impact of token mix-up scenarios. However, lifetimes must accommodate the longest expected call chains in the SOA. Organizations <bcp14>SHOULD</bcp14> measure actual request processing times and set token lifetimes to exceed the 99th percentile by a reasonable margin.</t>
        <t>When tokens expire during request processing, services <bcp14>MUST NOT</bcp14> automatically request new tokens. Expired tokens indicate either excessively long call chains or performance problems that require investigation. Services <bcp14>SHOULD</bcp14> fail requests with expired tokens and emit telemetry for operational monitoring.</t>
      </section>
      <section anchor="schema-governance">
        <name>Schema Governance</name>
        <section anchor="context-visibility">
          <name>Context Visibility</name>
          <t>Organizations <bcp14>MUST</bcp14> govern the contexts added to Txn-Tokens. Once a context appears in a Txn-Token, it becomes visible to all services in the call chain. Services may develop dependencies on these contexts in ways not anticipated by the context provider. This phenomenon follows Hyrum's Law: with sufficient consumers, all observable behaviors of a system will be depended upon by somebody.</t>
          <t>Before adding a new context to Txn-Tokens, organizations <bcp14>MUST</bcp14> consider the implications of making that context universally visible. If a context represents an identifier or concept known only to services early in the call chain, adding it to the Txn-Token exposes it to all downstream services. Those services may develop business logic dependencies on the context, not just security dependencies.</t>
          <t>When the format or semantics of a widely-visible context must change, the organization faces a painful migration process. All services that depend on the context must be identified, updated, and deployed. Organizations <bcp14>SHOULD</bcp14> prefer adding new contexts with different names rather than changing existing contexts when semantic changes are required.</t>
        </section>
        <section anchor="backward-compatibility">
          <name>Backward Compatibility</name>
          <t>Organizations <bcp14>MUST</bcp14> implement backward compatibility tests for Txn-Token contexts. Automated tests <bcp14>SHOULD</bcp14> verify that changes to context format or structure do not break existing consumers. These tests <bcp14>SHOULD</bcp14> run as part of the continuous integration pipeline for the Transaction Token Service.</t>
          <t>Backward compatibility testing becomes increasingly important as the number of services consuming Txn-Tokens grows. Without automated verification, format changes risk cascading failures across the SOA.</t>
        </section>
      </section>
      <section anchor="token-propagation">
        <name>Token Propagation</name>
        <section anchor="propagation-control">
          <name>Propagation Control</name>
          <t>Organizations <bcp14>MUST</bcp14> prevent Txn-Tokens from propagating outside the trusted domain. While tokens contain encrypted sensitive data, organizations <bcp14>SHOULD</bcp14> implement explicit controls to block external propagation. Propagation libraries <bcp14>MUST</bcp14> detect when an internal microservice attempts to include a Txn-Token in a request to an external endpoint and <bcp14>MUST</bcp14> remove the token from that request.</t>
          <t>This defense-in-depth approach protects against misconfiguration and implementation errors. Even if token encryption remains secure, preventing external propagation eliminates entire classes of potential vulnerabilities.</t>
        </section>
        <section anchor="propagation-libraries">
          <name>Propagation Libraries</name>
          <t>Organizations <bcp14>SHOULD</bcp14> provide standardized propagation libraries that handle token lifecycle within an internal microservice workload processing. These libraries <bcp14>MUST</bcp14> extract the Txn-Token from the incoming HTTP header, store it in request-scoped memory, add the token to outgoing request headers, and clear it from memory when request processing completes.</t>
          <t>Standardized libraries provide several benefits. First, they enforce propagation controls including external blocking to avoid the token flowing outside your trust boundary. Second, they can be used to consistently emit telemetry about token initiation, propagation, and validation. Third, they provide a centralized point for implementing fallback behaviors when tokens are missing.</t>
        </section>
        <section anchor="propagation-reliability">
          <name>Propagation Reliability</name>
          <t>Organizations <bcp14>SHOULD</bcp14> monitor propagation success rates across the SOA. Unless propagation success reaches 100% for a given call chain, services cannot reliably enforce authorization policies based on Txn-Token contents. Services <bcp14>MUST</bcp14> implement reasonable fallback behaviors when tokens are absent.</t>
          <t>Propagation libraries <bcp14>MAY</bcp14> implement automatic token initiation when an incoming request lacks a Txn-Token. The library requests a placeholder token from the Transaction Token Service indicating that no context was received at the current service. This placeholder enables downstream services to identify where propagation broke in the call chain, facilitating operational debugging.</t>
        </section>
        <section anchor="token-mix-up-prevention">
          <name>Token Mix-up Prevention</name>
          <t>Token mix-up represents the most severe propagation risk. Mix-up occurs when a token intended for one request is incorrectly attached to a different request. If token T1 is meant for request R1 and token T2 for request R2, but T2 is sent with R1 due to a propagation bug, actors may access data they are not authorized to see.</t>
          <t>Token mix-up scenarios are difficult to detect because they may not cause obvious failures. The request succeeds but with incorrect authorization context. Organizations <bcp14>MUST</bcp14> implement request-scoped token storage in propagation libraries to prevent mix-up. Tokens <bcp14>MUST</bcp14> be associated with specific request contexts and <bcp14>MUST NOT</bcp14> be stored in shared or global state.</t>
          <t>Organizations <bcp14>SHOULD</bcp14> implement testing strategies that deliberately attempt to cause token mix-up under concurrent load. These tests verify that propagation libraries correctly isolate tokens across concurrent requests.</t>
        </section>
        <section anchor="trust-boundary-handling">
          <name>Trust Boundary Handling</name>
          <t>When requests cross trust boundaries within the organization, propagation libraries <bcp14>MUST</bcp14> either block token propagation or replace token contents with appropriately scoped contexts. Organizations <bcp14>SHOULD</bcp14> define trust boundaries explicitly and configure propagation libraries with boundary detection logic.</t>
          <t>At trust boundaries, services <bcp14>MAY</bcp14> request new Txn-Tokens from the Transaction Token Service with contexts appropriate for the target trust domain. This approach maintains context propagation while respecting security boundaries.</t>
        </section>
        <section anchor="cache-considerations">
          <name>Cache Considerations</name>
          <t>The introduction of Txn-token provides more information now to the entire microservice architecture graph. There are Services in the graph that cache data to avoid calling dependent services multiple times. Now, they <bcp14>SHOULD</bcp14> consider Txn-Token contexts to be included in the cache keys. If not included, there is a risk that incorrect data is vended out or cache hit is impacted because the dependent services might be using the Txn-Token contexts for computing the results which might get cached.</t>
          <t>Organizations <bcp14>SHOULD</bcp14> provide guidance to workload developers on cache key construction when Txn-Tokens are involved. Cache invalidation strategies <bcp14>MUST</bcp14> account for context changes that affect cached data.</t>
        </section>
      </section>
      <section anchor="token-validation">
        <name>Token Validation</name>
        <section anchor="validation-libraries">
          <name>Validation Libraries</name>
          <t>Organizations <bcp14>SHOULD</bcp14> provide standardized validation libraries that handle signature verification, decryption, and token parsing. These libraries <bcp14>SHOULD</bcp14> synchronize cryptographic keys in the background, ensuring that services always have current keys for verification and decryption.</t>
          <t>Validation libraries <bcp14>SHOULD</bcp14> decode Txn-Tokens into strongly-typed objects appropriate for the implementation language. This approach prevents parsing errors and provides compile-time verification of context access patterns.</t>
        </section>
        <section anchor="error-handling">
          <name>Error Handling</name>
          <t>Validation libraries <bcp14>SHOULD</bcp14> emit standardized error codes for common failure conditions including expired tokens, malformed tokens, and signature verification failures. These error codes enable consistent operational monitoring across the SOA.</t>
        </section>
        <section anchor="fallback-policies">
          <name>Fallback Policies</name>
          <t>Services <bcp14>SHOULD NOT</bcp14> automatically fail requests when Txn-Tokens are missing or invalid. Organizations <bcp14>MUST</bcp14> define fallback policies that balance security with user experience. Fallback policies <bcp14>MAY</bcp14> include serving redacted data, limiting functionality, or requesting step-up authentication.</t>
          <t>The appropriate fallback depends on the sensitivity of the requested operation. Services accessing highly sensitive data <bcp14>MAY</bcp14> require valid Txn-Tokens and fail requests when tokens are absent. Services providing less sensitive functionality <bcp14>SHOULD</bcp14> implement graceful degradation.</t>
        </section>
      </section>
      <section anchor="telemetry-and-monitoring">
        <name>Telemetry and Monitoring</name>
        <section anchor="adoption-monitoring">
          <name>Adoption Monitoring</name>
          <t>Transaction token adoption in large SOA environments takes time. Organizations <bcp14>SHOULD</bcp14> implement comprehensive telemetry to monitor adoption progress, propagation reliability, and validation patterns.</t>
          <t>When organizations provide standardized libraries for token initiation, propagation, and validation, telemetry logic <bcp14>SHOULD</bcp14> be embedded in those libraries. This approach ensures consistent telemetry across all services without requiring individual workload implementations.</t>
        </section>
        <section anchor="telemetry-aggregation">
          <name>Telemetry Aggregation</name>
          <t>Services <bcp14>SHOULD</bcp14> aggregate telemetry locally before transmitting to centralized monitoring systems. Local aggregation reduces network overhead and enables higher-frequency sampling without overwhelming monitoring infrastructure.</t>
          <t>Centralized monitoring systems <bcp14>SHOULD</bcp14> store telemetry in data warehouses that support analytical queries. Organizations <bcp14>SHOULD</bcp14> implement automated monitors that alert on significant changes in propagation rates, validation failures, or token expiration rates.</t>
        </section>
        <section anchor="key-metrics">
          <name>Key Metrics</name>
          <t>Organizations <bcp14>SHOULD</bcp14> monitor the following key metrics:
- Token initiation rate by service
- Propagation success rate by call chain
- Token expiration rate during request processing
- Validation failure rate by error type
- Token size distribution
- Context relocation frequency</t>
          <t>These metrics provide visibility into Txn-Token health across the SOA and enable rapid identification of deployment issues.</t>
        </section>
      </section>
      <section anchor="key-management">
        <name>Key Management</name>
        <t>Organizations <bcp14>MUST</bcp14> implement secure key management practices for Txn-Token cryptographic operations. Key management <bcp14>SHOULD</bcp14> follow the guidelines in RFC 4107 "Guidelines for Cryptographic Key Management".</t>
        <t>Transaction Token Services <bcp14>MUST</bcp14> support key rotation without service disruption. Validation libraries <bcp14>MUST</bcp14> support multiple concurrent keys to enable zero-downtime rotation. Organizations <bcp14>SHOULD</bcp14> automate key rotation on a regular schedule.</t>
      </section>
      <section anchor="batch-processing-pattern">
        <name>Batch Processing pattern</name>
        <t>OAuth Transaction Tokens are designed to propagate security context through a call chain within a trust domain. To maintain a high security posture without the overhead of a global revocation infrastructure, these tokens are short-lived (typically minutes). In many modern architectures, a transaction may be asynchronous. For example, a request may be placed on a message queue (e.g., Kafka, RabbitMQ) and processed by a worker service hours or days later. By the time the worker resumes the transaction, the original Transaction Token has expired.</t>
        <t>Batch Token (Voucher): A long-lived, opaque, or encrypted token representing the transaction context during a period of rest.
Initiator: The internal microservice that receives a Transaction Token and requests a Batch Token before an asynchronous pause.
Rehydrator: The internal microservice that takes a Batch Token and exchanges it for a fresh, short-lived Transaction Token to resume processing.</t>
        <section anchor="initiation-pausing-the-transaction">
          <name>Initiation (Pausing the Transaction)</name>
          <t>When a internal microservice determines that a transaction will exceed the TTL of the current Transaction Token (TraT), it <bcp14>SHOULD</bcp14> request a Batch Token from the Transaction Token Service (TTS).
The request to the TTS <bcp14>SHOULD</bcp14> include:
   * The current valid TraT.
   * The intended "use case ID" or "namespace" to constrain the token.</t>
          <t>The TTS returns a Batch Token with a TTL suitable for the asynchronous delay (e.g., 24 hours to 7 days).</t>
        </section>
        <section anchor="rehydration-resuming-the-transaction">
          <name>Rehydration (Resuming the Transaction)</name>
          <t>When a worker service (the Rehydrator) picks up the task, it <bcp14>MUST NOT</bcp14> use the Batch Token directly to call downstream services. Instead, it <bcp14>MUST</bcp14> exchange the Batch Token at the TTS for a fresh TraT.
The TTS <bcp14>SHALL</bcp14>:
   1.  Verify the Batch Token's signature and expiration.
   2.  Validate that the Rehydrator is authorized for the specific 
       "use case ID" or "namespace" embedded in the Batch Token.
   3.  Issue a new, short-lived TraT containing the original 
       claims (e.g., subject, original requester IP).</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="token-mix-up-prevention-1">
        <name>Token Mix-up Prevention</name>
        <t>Token mix-up represents a critical security risk. Organizations <bcp14>MUST</bcp14> implement request-scoped token storage and <bcp14>MUST</bcp14> test for mix-up scenarios under concurrent load. Token mix-up can result in unauthorized data access without obvious system failures, making it particularly dangerous.</t>
      </section>
      <section anchor="trust-boundary-controls">
        <name>Trust Boundary Controls</name>
        <t>Organizations <bcp14>MUST</bcp14> define trust boundaries explicitly and <bcp14>MUST</bcp14> implement controls that prevent inappropriate token propagation across those boundaries. Failure to control propagation at trust boundaries can expose sensitive contexts to unauthorized services.</t>
      </section>
      <section anchor="cache-security">
        <name>Cache Security</name>
        <t>Services that cache data based on Txn-Token contexts face security risks if cache keys do not incorporate all relevant contexts. Organizations <bcp14>MUST</bcp14> provide guidance on secure cache key construction and <bcp14>MUST</bcp14> audit caching services for correct context handling.</t>
      </section>
      <section anchor="fallback-mechanisms">
        <name>Fallback Mechanisms</name>
        <t>While fallback mechanisms improve availability, they can introduce security vulnerabilities if not carefully designed. Organizations <bcp14>MUST</bcp14> ensure that fallback policies do not inadvertently grant excessive access when Txn-Tokens are absent. Fallback policies <bcp14>SHOULD</bcp14> be explicitly documented and reviewed by security teams.</t>
      </section>
      <section anchor="token-lifetime">
        <name>Token Lifetime</name>
        <t>Short token lifetimes reduce the window for token compromise but may cause operational issues if set too aggressively. Organizations <bcp14>MUST</bcp14> balance security considerations with operational requirements when setting token lifetimes.</t>
      </section>
      <section anchor="external-propagation">
        <name>External Propagation</name>
        <t>Preventing Txn-Tokens from leaving the trusted domain is critical. Organizations <bcp14>MUST</bcp14> implement multiple layers of defense including library-level controls, network-level filtering, and monitoring for external propagation attempts.</t>
      </section>
      <section anchor="batch-processing-security-consideration">
        <name>Batch processing security consideration</name>
        <section anchor="token-constraining">
          <name>Token Constraining</name>
          <t>Batch Tokens <bcp14>MUST</bcp14> be sender-constrained or scoped to specific namespaces. This prevents a compromised service from "stealing" a Batch Token from a queue and successfully minting a 
Transaction Token for an unrelated flow.</t>
        </section>
        <section anchor="data-mutability-and-consent">
          <name>Data Mutability and Consent</name>
          <t>Asynchronous delays increase the risk that the underlying authorization context has changed (e.g., a user has revoked consent). The TTS <bcp14>SHOULD</bcp14> perform a "freshness check" during 
rehydration for claims marked as mutable or sensitive.</t>
        </section>
        <section anchor="infinite-exchange-prevention">
          <name>Infinite Exchange Prevention</name>
          <t>To prevent a transaction from living indefinitely through repeated rehydrations, the TTS <bcp14>SHOULD</bcp14> implement a maximum chain depth or total transaction lifetime counter within the token metadata.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="references">
      <name>References</name>
      <section anchor="normative-references">
        <name>Normative References</name>
        <t><eref target="https://datatracker.ietf.org/doc/html/rfc2119">RFC2119</eref> Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997.</t>
        <t><eref target="https://www.ietf.org/archive/id/draft-ietf-oauth-transaction-tokens-06.html">TXNTOKENS</eref> Tulshibagwale, A., Hardt, D., and G. Fletcher, "OAuth 2.0 Transaction Tokens", draft-ietf-oauth-transaction-tokens-06 (work in progress).</t>
      </section>
      <section anchor="informative-references">
        <name>Informative References</name>
        <t><eref target="https://datatracker.ietf.org/doc/html/rfc4107">RFC4107</eref> Bellovin, S. and R. Housley, "Guidelines for Cryptographic Key Management", BCP 107, RFC 4107, DOI 10.17487/RFC4107, June 2005.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 304?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
