ADR-012: Protocol-Ready JWT Authentication

Date: 2025-08-10 Status: ACCEPTED Context: Security Sunday Sprint - Protocol-First Foundation

Context and Problem Statement

Piper Morgan requires a secure, scalable authentication system that enables:

  1. Protocol Portability: Compatible with MCP (Model Context Protocol) and other AI agent ecosystems
  2. Federation Ready: Supports cross-system authentication for agent-to-agent communication
  3. Ecosystem Participation: OAuth 2.0 compliance for third-party integrations
  4. Future-Proof Architecture: Extensible for protocol evolution and multi-agent workflows

Current session-based authentication limits protocol integration and federation capabilities.

Decision Drivers

Strategic Requirements

Technical Requirements

Business Requirements

Considered Options

Option 1: Session-Based Authentication (Current)

Pros: Simple, familiar, good for monolithic applications Cons: Protocol incompatible, federation impossible, scaling limitations

Option 2: JWT with Custom Claims

Pros: Flexible, fast development Cons: Poor interoperability, federation challenges, non-standard

Option 3: Standards-Compliant JWT (Selected)

Pros: Protocol ready, federation enabled, ecosystem compatible Cons: More complex implementation, token management overhead

Decision Outcome

Chosen Option: Standards-Compliant JWT Authentication with Protocol Extensions

Core Implementation

# JWT Standard Claims (RFC 7519)
{
  "iss": "https://piper-morgan.ai",           # Issuer
  "sub": "user:12345",                        # Subject (User ID)
  "aud": ["piper-api", "mcp-protocol"],       # Audience
  "exp": 1734567890,                          # Expiration
  "iat": 1734564290,                          # Issued At
  "jti": "uuid-token-id"                      # JWT ID
}

# Piper-Specific Claims
{
  "role": "pm",                               # User role
  "permissions": ["projects.read", "..."],    # Fine-grained permissions
  "context_id": "session-uuid",               # Session context
  "protocol_version": "1.0"                   # Protocol compatibility
}

Protocol Integration Strategy

MCP Authentication Flow:
  1. Client authenticates via OAuth 2.0 → JWT issued
  2. JWT included in MCP protocol headers
  3. Protocol server validates JWT → grants access
  4. Agent-to-agent calls use JWT delegation

Federation Pattern:
  1. Piper issues JWT with federation claims
  2. Partner systems validate via public key
  3. Cross-system operations use delegated tokens
  4. Audit trail maintained across federation

Consequences

Positive

Negative

Neutral

Implementation Roadmap

Phase 1: Foundation (Sprint 1)

Phase 2: Protocol Integration (Sprint 2)

Phase 3: Federation (Sprint 3)

Phase 4: Ecosystem Hub (Future)

Security Considerations

Token Security

Protocol Security

Federation Security

References


Strategic Impact: Protocol-ready authentication foundation enabling MCP integration, agent federation, and ecosystem hub positioning for Piper Morgan’s evolution to multi-agent intelligence platform.