<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-oauth-rar-agent-extensions-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="extensions for RAR">Policy and Lifecycle Extensions for OAuth Rich Authorization Requests</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-oauth-rar-agent-extensions-00"/>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="04"/>
    <area>Security</area>
    <workgroup>oauth</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 41?>

<t>OAuth 2.0 Rich Authorization Requests (RAR), as defined in RFC 9396,
   provides a mechanism for clients to request fine-grained, structured
   authorization details.  However, in emerging ecosystems of
   collaborating AI agents and long-running automated tasks, two critical
   authorization dimensions remain implicit: the required security
   assurance level of the authorization policy and the strict binding of
   authorization lifetime to a task's lifecycle.</t>
      <t>This document extends the "authorization_details" object of RAR by
   introducing two new members: "policy_context" and
   "lifecycle_binding".  The "policy_context" member allows a client to
   explicitly request that the authorization be evaluated and granted
   under a specific policy assurance level, mitigating policy downgrade
   attacks and enhancing user consent.  The "lifecycle_binding" member
   enables the validity of an authorization grant to be tied directly to
   the state of an external entity, such as an automated task, ensuring
   permissions are automatically and immediately revoked upon task
   completion. These extensions provide a standardized way to achieve
   more secure, transparent, and context-aware authorization in complex,
   automated environments.</t>
    </abstract>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>OAuth 2.0 Rich Authorization Requests <xref target="RFC9396"/> significantly enhances
   the expressive power of authorization requests beyond simple string-
   based scopes. This enables clients, such as sophisticated AI agents,
   to articulate their needs with greater precision.</t>
      <section anchor="the-need-for-advanced-authorization-in-ai-agent-ecosystems">
        <name>The Need for Advanced Authorization in AI Agent Ecosystems</name>
        <t>Modern distributed systems are increasingly composed of autonomous or
   semi-autonomous AI agents that collaborate to fulfill complex user
   intents. For example, a user's request to "plan a business trip to
   Paris" might involve a primary "coordinator" agent that delegates
   sub-tasks to specialized agents for flight booking, hotel reservation,
   and expense reporting.</t>
        <t>In such scenarios, traditional authorization models face two major
   challenges:</t>
        <t>*Permission Abuse and Policy Downgrade: An agent might request
      a high-privilege action (e.g., booking a flight) but the
      authorization server (AS) might grant it under a default, low-
      assurance security policy. A malicious or compromised client could
      exploit this ambiguity to bypass stricter security controls like
      multi-factor authentication or fraud detection that should be
      associated with high-risk operations. The authorization request
      lacks a standard mechanism for the client to explicitly request and
      for the user to consent to a specific, appropriate level of policy
      assurance.</t>
        <t>*Excessive Permission Lifetime: An agent is granted permission to
      manage a long-running task (e.g., a data processing job).
      Traditional access tokens rely on a fixed expiration time ("exp"
      claim). If the task completes or fails prematurely, the token
      remains valid for the remainder of its lifetime, creating a
      significant window of opportunity for misuse if the token is
      compromised. The principle of least privilege dictates that the
      permission's lifetime should be strictly bound to the task's
      active lifecycle.</t>
        <t>This specification addresses these gaps by extending the RAR framework
   to include explicit policy context and lifecycle binding information
   within the authorization request itself.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref>.</t>
        <t>This document uses the terms "Authorization Server" (AS), "Client",
   "Resource Server" (RS), and "Access Token" as defined in The OAuth
   2.0 Authorization Framework <xref target="RFC6749"/>. The term
   "authorization_details" is used as defined in Rich Authorization
   Requests <xref target="RFC9396"/>.</t>
      </section>
    </section>
    <section anchor="the-policycontext-member">
      <name>The "policy_context" Member</name>
      <t>This specification defines a new JSON object member, "policy_context",
   for the "authorization_details" object. This member allows a client
   to request that the authorization decision be subject to a specific
   set of policy constraints and assurance levels.</t>
      <section anchor="structure-of-the-policycontext-object">
        <name>Structure of the "policy_context" Object</name>
        <t>The "policy_context" member, if present, MUST be a JSON object. Its
   members provide context for the policy decision.</t>
        <t>{
     "assurance_level": "financial_grade_v1",
     "compliance_frameworks": ["pci-dss", "gdpr","iso27001"]
   }</t>
      </section>
      <section anchor="pre-defined-policy-context-parameters">
        <name>Pre-defined Policy Context Parameters</name>
        <section anchor="the-assurancelevel-parameter">
          <name>The "assurance_level" Parameter</name>
          <t>A string that identifies the desired policy assurance level. This
   identifier MUST be from a list of values pre-defined and published by
   the authorization server. It serves as the primary input for the AS to
   select the appropriate set of evaluation rules (e.g., requiring MFA,
   performing risk analysis).This identifier MUST be one of the values advertised by the Authorization Server in its "policy_assurance_levels_supported" metadata entry (see Section 5).</t>
        </section>
        <section anchor="the-complianceframeworks-parameter">
          <name>The "compliance_frameworks" Parameter</name>
          <t>An optional array of strings identifying specific compliance
   frameworks that the requested operation must adhere to. These string identifiers MUST be values from the "OAuth Policy Compliance Frameworks" registry established by this specification (see Section 10.3.2).</t>
        </section>
      </section>
      <section anchor="authorization-server-processing">
        <name>Authorization Server Processing</name>
        <t>When an AS receives an "authorization_details" object containing a
   "policy_context" member, it MUST:</t>
        <ol spacing="normal" type="1"><li>
            <t>Validate that the value of "assurance_level" is known and supported.</t>
          </li>
          <li>
            <t>Use the "policy_context" to select and execute the corresponding
authorization policies.</t>
          </li>
          <li>
            <t>Perform a cross-validation to ensure the requested policy context
is appropriate for the requested "type" and "actions". For
instance, an AS policy may require that a "payment_transaction"
type MUST request a "financial_grade_v1" or higher assurance
level.</t>
          </li>
          <li>
            <t>Clearly communicate the semantic meaning of the requested
"policy_context" to the end-user during the consent process.</t>
          </li>
        </ol>
      </section>
      <section anchor="issuance-in-access-tokens">
        <name>Issuance in Access Tokens</name>
        <t>If the request is approved, the AS SHOULD include the validated
   "policy_context" object within the "authorization_details" claim of
   the issued JWT access token. This enables the resource server to perform
   its own local policy enforcement based on this context.</t>
      </section>
    </section>
    <section anchor="the-lifecyclebinding-member">
      <name>The "lifecycle_binding" Member</name>
      <t>This specification defines another new JSON object member,
   "lifecycle_binding", for the "authorization_details" object. This
   member ties the authorization's validity to the lifecycle of an
   external entity.</t>
      <section anchor="structure-of-the-lifecyclebinding-object">
        <name>Structure of the "lifecycle_binding" Object</name>
        <t>The "lifecycle_binding" member, if present, MUST be a JSON object.</t>
        <t>{
     "type": "task_status_webhook",
     "task_id": "job-d4a3b2-8c7e-4f5a-9b1c-2d3e4f5a6b7c",
     "termination_states": ["COMPLETED", "FAILED", "CANCELLED"]
   }</t>
      </section>
      <section anchor="lifecycle-binding-types">
        <name>Lifecycle Binding Types</name>
        <t>The "type" member indicates the mechanism by which the AS can monitor
   the external entity's state.</t>
        <section anchor="the-taskstatuswebhook-type">
          <name>The "task_status_webhook" Type</name>
          <t>Indicates that the external task provider will notify the AS of
   terminal state changes via a pre-configured webhook. The object MUST
   also contain:</t>
          <t>o  "task_id" (string): A unique identifier for the task.
   o  "termination_states" (array of strings): A list of states that,
      once the task enters, will trigger the immediate revocation of the
      associated authorization.</t>
        </section>
      </section>
      <section anchor="authorization-server-processing-1">
        <name>Authorization Server Processing</name>
        <t>When an AS processes a request with a "lifecycle_binding" member, it
   MUST:</t>
        <ol spacing="normal" type="1"><li>
            <t>Verify its capability to monitor the specified task.</t>
          </li>
          <li>
            <t>Create an internal record linking the "task_id" to the access
token to be issued (e.g., via its "jti").</t>
          </li>
          <li>
            <t>Upon receiving notification that the task has entered a terminal
state, the AS MUST immediately revoke the associated token and
propagate this revocation information.</t>
          </li>
        </ol>
      </section>
      <section anchor="resource-server-responsibilities">
        <name>Resource Server Responsibilities</name>
        <t>Resource servers receiving tokens that contain a "lifecycle_binding"
   claim SHOULD NOT rely solely on the "exp" claim for validation. They
   MUST employ a mechanism to check for real-time revocation, such as
   subscribing to a revocation feed from the AS or using token
   introspection <xref target="RFC7662"/>.</t>
      </section>
    </section>
    <section anchor="example-authorization-request">
      <name>Example Authorization Request</name>
      <t>The following is a non-normative example of an "authorization_details"
   object utilizing both new members for a request to execute a
   sensitive data processing task.</t>
      <t>[
     {
       "type": "patient_data_analysis_job",
       "actions": ["execute", "monitor_progress"],
       "locations": ["https://api.compute.com/jobs"],
       "policy_context": {
         "assurance_level": "hipaa_phi_access",
         "compliance_frameworks": ["hipaa", "gdpr"]
       },
       "lifecycle_binding": {
         "type": "task_status_webhook",
         "task_id": "analysis-job-1138",
         "termination_states": ["COMPLETED", "FAILED_VALIDATION"]
       }
     }
   ]</t>
    </section>
    <section anchor="authorization-server-metadata">
      <name>Authorization Server Metadata</name>
      <t>This specification adds the following parameters to the OAuth Authorization Server Metadata <xref target="RFC8414"/>.</t>
      <t>policy_assurance_levels_supported: OPTIONAL. A JSON array of objects, where each object represents a supported assurance level. Each object has the following members:</t>
      <t>"level" (string): A structured identifier for the assurance level (e.g., "nist_ial2"). REQUIRED.
"description" (string): A human-readable description. OPTIONAL.
"uri" (string): A URI pointing to the detailed definition of the level. OPTIONAL.</t>
      <t>policy_compliance_frameworks_supported: OPTIONAL. A JSON array of strings containing the compliance framework identifiers supported by the AS.</t>
    </section>
    <section anchor="error-response">
      <name>Error Response</name>
      <t>When a request is denied due to a failure in validating the "policy_context", the AS returns an error response with the following error code:</t>
      <t>Error Code: policy_requirement_not_met
Description: The requested "policy_context" is not supported or cannot be satisfied.
The AS SHOULD include an "error_description" parameter to provide developers with more details about the failure.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Preventing Policy Downgrade Attacks: The "policy_context" member allows the AS to enforce that high-risk
   actions are always requested with a corresponding high-assurance
   policy context. The AS MUST reject requests where this mapping is
   violated, thus preventing a client from obtaining a privileged token
   under weak security pretenses.</t>
      <t>Ensuring Timely Revocation: The "lifecycle_binding" member significantly reduces the risk window
   of compromised tokens for long-running tasks. The effectiveness of
   this mechanism is entirely dependent on the reliability of the state
   notification and revocation propagation systems. Implementations MUST
   include robust error handling and fallbacks. The token's "exp" claim
   serves as an essential fallback mechanism.</t>
      <t>User Consent and Transparency: The structured nature of these new members allows the AS to present a
   far more intelligible and accurate consent screen to the user, leading
   to more meaningful and informed authorization decisions.</t>
      <t>Reliability of External State Monitoring: The AS must trust the source of the lifecycle events (e.g., the task
   provider's webhook). Mechanisms such as mutual TLS authentication and
   request signing SHOULD be used to secure the communication channel
   for state updates.</t>
      <t>The "policy_context" and "lifecycle_binding" members may contain
   information about the user's intended actions and associated tasks.
   This information must be handled with care by the AS and RS, subject
   to the system's overall privacy policy.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="oauth-authorization-server-metadata">
        <name>OAuth Authorization Server Metadata</name>
        <t>This specification requests the registration of the following values in the "OAuth Authorization Server Metadata" registry:</t>
        <t>*policy_assurance_levels_supported
*policy_compliance_frameworks_supported</t>
      </section>
      <section anchor="oauth-extensions-error-registry">
        <name>OAuth Extensions Error Registry</name>
        <t>This specification requests the registration of the following value in the "OAuth Extensions Error Registry":</t>
        <t>*Error Code: policy_requirement_not_met</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document based on RFC9396</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9396">
          <front>
            <title>OAuth 2.0 Rich Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="J. Richer" initials="J." surname="Richer"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document specifies a new parameter authorization_details that is used to carry fine-grained authorization data in OAuth messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9396"/>
          <seriesInfo name="DOI" value="10.17487/RFC9396"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
      </references>
    </references>
    <?line 322?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61bXW8buZJ9N+D/QCgPSQaSxnZyk4mfVuM4GA/sJGs792Ix
CASqm5IYt5q6zW47msH89z1VRbK7JTnJLu68RJa6i8X6OHWqyBmNRocHvtZl
PtWFK82pqqvGHB7YdcUffX1ydPTm6OTwINP1qfJ1rp6os6XJ7vBaM1tZ760r
680ab16c3747PNCV0afqxmRNZevN4cHD4lQ53dTLw4PDg9xlpV7h2bzS83qU
LU054h9Hla5GemHKemS+1qYkqX50dEQv1bYu8MpHV9hso6CqurRzk22ywqjz
9LCau0p9mECWurbZUtEnV9k/dY1f1bX5d2N87aHfbFaZ+1Nl+m9eT64PDwpd
QltTHh7cPZweHig1UhdlbarS1KO3pLF8d2c2D67KYZQnKtc1dDs5Onk1OjoZ
Hb1UoxF/pyzk2qIwubKlwhbdCppkuig2arZRX1fFSTXPlJ2r0tVqYe9pVc06
Y+WREjNdGVvYckEWL2ltV0G/s6UttbpyM1sY+jKDnU/Vr8b+jkf5C9eUdbUJ
T9I3ZqVtcarI3isR+V8Z/bZiIePMrdo1L626af4Di/mmsLurHB6UriJT3Bu2
8PW7s5Pj4zfx86vXL9PnX45fv4yf37x48yp9//KYvqe/EKjlfFve61evTvj3
EXyhZ76udFbT3xIdJ+Ojb0WIeoZQeD5U2qvczG0pDoRYRToMaQ21rty9zY1X
Wq1MttSl9SuOoqywCGGvaqcqkadIxGhRaZI0RAJVTVY3lclZkO6pkJsalvNj
pX5zD+beVENa2qxMtaAgMJnzG1+blVduzq9nrij0zFV4Hb9PLhRnkOccQTYv
RlVTlvRTiD/spdb+zg9V/eBUhgSliNyniV3F5KjInaWyqzXSzwID6qXhzVls
QvmU5yTD+6bSZWZUAe0LaMkP90Wv2zSmH2EQm9VqZsucFA0b679SIN1raERm
1byDp56/ZAwYSyio2yVSDgDTQPVa0jv3vMagJ24azDxQbvbFYG2oCZcjK1mM
RTS7vMlIG7JSaR7g5NXMVP5UDUT7aQbMwwoD2ga/NUjqTMNWBmNSyey+IsIU
kMA9UARJzGBvLMh8FTsDJmIE1Utd7zHkzChzr4uG3UrmRJBhCdGnKXNaQ/m1
yezcZsnsfRcN1QoxsJD4CY/k7qGEqNyIJ+paZ3cSUqZEqLNhGg/p2JGH5nGf
uxYIW5V9lXpWGPEHtLY5goYsr8utbfEuyNPYX22xtRyBlpE9goUkaghi5XXy
dFXqAkugUmyQYw2SW/sguhP3QzyC7QfgUmtThfqFZyuzBdK0YbtamdziffbG
vbuDoGYNJUlayEDkhSHFx2QFb7p1JcAEuYEqrK5y+yckPOgNRzKwET5gMSuH
9TmXDHITFvBraFTWQ1YjhM5IPwQ1O+ZCaooOX4cxc8KOTXlvK1dSNvhxhMOV
zXMCcipdFyHSSc6Pw+MfAY0/K28XJcUW/AX7SHAYn3yESK4MzHtvEFkPiBdy
V09mFWXOzMZhn55ARiAB2MWCZtoTymRubfxYUjxGUsDa1t/erfE7+Y+2n9BQ
7EIGr/BbU1DkQD9bIbUNEOLBYtcLsBaEEVyGfCHvscVgpScc3O/xJAP8JL+n
XeZb1oEXsN6E1lPnCaZJwJVDIhKg0q5mDWkWQZycacsMK3vsFyYkRzrar1jK
lW7lGoC9ZJA3KzvqfN3CPQNEWwsYJ+dNQfQjBgdnbMQ3jgj1DtsxXzX9jDDj
B576FnQckKugFFKzBvrBkwhMu45Z+FFXFhC6sotlDZn3rrinQF9XdqWrjRpk
DgwJtb921UD0FDVzUxjgTYgTUMgRVyRaj7EK0EA5EnZGJp8XvMbMuTuYaaiW
DvkIPaHvPVs/BD4B1Nc1co/K09pVhGmxNlyUEiU+Q/RU1nnOMmAQXgdy9MNy
BZcVWFsDJakCrPSX4AKUejC6cmF84B/qp48JRNQEhjKsR6CqbyOSnqpJGYwg
BgtWZhGku1ri6xGMdw+itIAQTkr1zIwX42HcOh4TWzyHS7gipPd7+pNhEMrP
JjfPw3KCqbZOZQHMRjcF4AU1aJSkpNoQq3ooCWM1gRGoLEk4clBVDvuGp0L5
Ag0s8iiJipizpCLyVa9mdtGQNAL1zRrLhKoPVdJKhHGVK6iu36V9raCjHcER
iCLeJEF8JrukyKh0kxNrMmIuDjC/JE0AKZ1tucwyJnCqs6kRvHcKoFKxMIaW
bWTd8lEhZTBB+RbzI8RLlXxfFY9MAf/F57mK4ulQSIXexIqNnFzDyIgJyuhE
qMQjOy6Lgf7T+dcsgG4nMi8DgerEIRwT+EKnDsbkJtPrUlMg9nkk5WqMSk19
DmW84xXx6xc3ez6OAm67+ZVljB8ooMwoYRZHyDK3Xw1nrRU/KGZ5zwb4ZhDl
ZIW2q+djdSFkkjUIVddwMM6JzBFwo+w1JHsoD9JiUYiQWC/MI9lfvs2lNNna
J6I5VITKTIp0FNGpdoijEiyJ3nJrQpqmpBAmsTAkgYCdtzrA1Gkvbd5IxMG7
IFRU9CCrQCGoVQsCOVKEkDIRwCimddjTVuc28EN2UaOJ3iynsIqWe5pUIYRB
kOxn0TEGxSk6z6mQC3nD5hZ67amHFYrNYQHxRKGRkCuD1vgullzsrmhyk/Ih
cszAaKRRSc18bAJST+fEgZS2ttxDgWNuwXemmI9jwSbzlK5wi43660nd/vU3
PUBmRwOvqIP3anD16eZ2MJR/1fsP/Pn6/L8/XVyfv6XPN79NLi/Th/jEzW8f
Pl2+bT+1b559uLo6f/9WXsa3auurq8n/DITVDT58vL348H5yOVC8uW73QtRA
KDCV6wrBzSSfWlKPtm0mTemvZx/V8UtmZNRDf+ZP1DV/HstOuyKb4EBFBsHG
+wTmhmvGgIsGtDxjJBtIZR1cG++aCnUhPXVNT/EmJpLatxTpg62mmUzNpJLF
ELHsL/ouhgsrTq3/Z0kLUlGWfqRzw8YaHy3SNuk7tJWF7FJXiZT97dlV6FmC
/fqpIItRGaC28PebD+9jEymtznBHnpgwIs63O9FAcPc3iDGlvtMV5oG/Mg40
oluvrgQuWbfFhOtPTROKMDrYahJ9TKybOLyInf2O8T7wgjHNHml9hwSP1Btw
g8OJN6NK0zEn4L4WqAqtd+qlInJEi8amtUvb8dpfAecGaS9T3ssAPTxcSG2s
LqZMzqb3x8FLimgrzTn4+QRmHi/9MVhndpR7Tzm8yNfVYDiw3p28Pjo6Hnzm
t/9OHYP6WJlRjMvABc+C3uDNEIsA9/JwiMJtNdvn6LFJ6InE6TADaNDchnwG
JPAoZn+HLzElzD++VyWjz1GNqMajOyGf0jjBcC1N6lM8rJsZnljirzAj2Q07
4ZzkNvnoKTVrqXDcENhy3bRem9xEqgHg5hAliR2+EwI0DDgY6xtq+gL3kPkT
WeTq3WQYu3mqGvQdkzvwl2LjrX8+5qTas3lXpkAOG9c5NlEzrUV9Y0X3oCRB
DbGFGN5bvvNT3zArMDlFfK2ZJhkakqpn3hCKCl39x/NxLwb2x95WJID4riOr
qirNMxQJjrTHDdkgDX5aqYJESXKLIAFSqPGMjBjUmzhrvjRcieJwI4Rha0yf
rBlMyBHF2CDjhBT+UYsW9bG3yiyoMQaXAK1ug0yqYR96e6Y7Phq/GJ9E++33
0sdETOmpf6F3oIkQIg8tvrEcouX3RoOENsDFlgg+Dmk1WyL2hcdjpf5JZFOm
DcHQbCPy2G6+Y793JfpFTrgUQONQOZX65M1+yKXGWXJIOmA0VDLggPIVQHbt
mFRF3rdvGgskkYVeYKGPkkdUdyrn/ehediHdgQzQzFbU9EldWol6v05Kt6w7
vjegc6OB8AjpeP2A5xKtiJLarYwGFOy6sNJKb+IIWoyrYRe9IZ4z5emZSEs9
hKKFJFJTO7a3DlA/Qf0hld/ooSRE8JT/fAlDnYGvVzK1WaEByMJcieY0mtpU
hIYuZabd33cSuM+XPDkr8xH3hnlTRXode8TQbsXIv4CWnFU0gepQMa4uF72F
kz/u6SAioHCgr5Gnp+msjnru6Bgyo8PJH8sh7tziRJ8eRM/SwO2//+u21xFu
zfVE5cA4wywDhgn4LpUM6Eu5UrgMOBiCwlDXkBkmuzI2dIFWB927rG/PsLol
fvuaoMT8SldTeDzC/x47DBj+nyhgh/nQDNzvFtynvp2ih6hp+yiei4fThN5s
/HEit8ceW1zu0fH+j9C5bVbGiQ8qRj3plIb5jZ8+mNnSubuWi/GPNqfnvrjZ
KH+pX8xORr9kr83o5fwfevRmdpyNTvIXhv56NXuddV7lpk8szGcFwuHQiX28
PL+VTuzd5OJSPp1N3p+dX9IfHSYHM7XHzL+GzvQWevtkEoGv4Cd6IgvtuukM
h1DNHpbUmISMyzRNGEtbB5iTUXnPTU+9HHD06cE+W7FCis5Bke0dBUK9SXJ5
ahIodIXcLQo6dgZViFrFLBW7FeGAhfawgMB7q3m2a0ZIpbld0PmlCjpIxxay
gLwv09jCu1g9Y010HZ+inDOVeH6qJgroCYTqUrSYLPT4uH1516vq2TYLYomR
0Pp2gBJjA6iQmXaUZKi/9kOxCSQsFkaWTmc/fPITh47z3ti1nSz2kvP/R0sC
snN3GSGbB5b628knBXeHfJiK3EtImem1ntkiQEWIPSlVAnHheKwlG2d8GkJ6
8fiBAgKkyVU0rCnvYklqnRkQSEC9Lbo8/QpjDIH+QN8pnphBf6nt4HnLPT6t
eahD9IwW4RCNAJyCmt221F5cR7ZPYZuWZr+nIseYtHuWJzq3PhR9O3Nacsla
L6SwW98NhM6IKnp7a0pCf2M73rLprcDGdb+u+c5mw3A0nOVw4uz3vJxEcG1t
h08yVPWuCLNV9g+NUcOTlFAtk+Oc3aS4UQbk3G16txloLE3XfPhNhEMx4iFj
a4J07hYPcngwJTvhCE62mvPhWewLCGwq1fi05/bUncKR3/gj3OL4HE/h1Lkc
VO0/lIyAPHc0MuEGhUc0rhylyybxqCscGj9ShQVqBMuaGo77k6TNUPK79wDY
Jm2S8rxfaLcOPS3czotuT8hDmvFTf4Qw+yuFWyqLa2hFXJZen8ZGdooimCqc
ahkzFbawPhWzkN9TrLqgse3gc+edIvhE3lrW9dqf/vyzXlu6nIMGnS/p/IyF
+q9tccDTjs77RyxLu9Z6ul7aqWBCR+9vDln4vTRi+Zxe+ru7h52M2NLnR8jF
NsGIRh4R0zg+fvHL1pM/zCem/5xcXryd0GS3q3/4JP9+lpjeWx6uwsDgkQGk
zsOdljbW12miFHFYOu9vipdR8cvjMCr+7iTjVMVpNR0GMrVLhVfyhWooTwuM
BiyEHKpMIIZ8chaF7c6ozjvvLPX2DuP1G9J0EPrlLn9oL1Xt4xDbt5JCDRoA
5uopur8TVCAVR/6wxkBm7Dxl6a+zbNDZjQCGOXUqqvPcuDUPBKBr67/46foC
XQowLsCjjO0Icuh+C3UWtkMvolE6IpOH9qbOj7kpTok6Mw1pLNNkJknsDXha
t8WZ2E3opM6ryqU6Z1o60+04IYgv8TTh9had1jV88SHVo0gntifnsVxUBr4t
eVxjeMUqrCj0qB8r8kTmcsPhIiqe0Z+hT5yGwQEPC8Awpsidw4O3rS9PmdB2
phTbHTB2RXc2W7vQgrqk72jojh154lRjKUq7TTaVH1Zz2ou0lMfc7YZxd06h
QFO5cE+FLwqFaqX0zMk9gGjV4Jd4+ZaGzp4Yv2A+/fgRddlIHG5fUlATuep1
+iPX1tIQN7bdQlzS2bo0AVKh5HJV8aA3vmPWQG17Qyp5vz956Q+XpNuInK4y
AWXCAY8AEHO1lV6vhQmwlHvr6OIPDz4annBHM6QLeMxQ3CzN+9qT2LxDVOQG
xYPRd51bEnQ8h3iUqcx5uGOmbkGYwMauExM6/c5Fua0bVcCzJosDERppy7Gz
cJR57xJGII8EeTvn9eFyg5nPDZ/58lWeNJXh86ZI+ngKU1vmkrlZm5JgINJJ
fGtjHxGAikshC+pRdRrodfhfZNF8TiB3n8bqgsgY5aDEZts5xiyp3IxG0JLP
0C/ni9Akeo4YnFGkhsNC2jta5g7dDSwsnkMQcHiqQkD79Ha7bfbaJ5q3nYUh
G61ym27hZRtxXKfMlLozPQEQdcnhToaEEhjI4VxXksXUWhWFXViqJXzsliGe
uO0OagAcjHRQ8bbIkC4JpHEud3OViYPGeVPIrUXuTbab0nRERveLlTQjPYee
x2HBDff+V8IjLd2IDznHZwL8PwWI96WViUUrDUs4tdJRTWzZJJnDCALuCowM
tfcqOsKnq3yrpm6gye3lzfa1n9iexRLDKYPACBg7M3IwzFPxLI6q2xEtiaDV
SlOkg1mZdTRrGnr68aOHlzymfjR3PQ+lQ20NgZxaxA5Sh2t2fAsvJx9FjJRz
19SLcuK2NzK6wtgN2CgnRUTSjEA2FWgWd30zjEfAMVzYbZyC0MGBECJYGed0
li57hcuhk/eTrfqh/npC38bp2A+wzEdIbMJrgRU+AurOVzrlPJwqxUnzD6zZ
HioxAfjpu9S2feY75Kq3787/eBJpkKz6H9rz1pYfXW4gu/xRnsN9R0YnTYic
Bf/od++KpPF5uDARbw8TbkpHfnjwv8570Hg6NAAA

-->

</rfc>
