<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-oauth-transactiontokens-bcp-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>OAuth Transaction Tokens Best Current Practice</title>
    <seriesInfo name="Internet-Draft" value="draft-oauth-transactiontokens-bcp-00"/>
    <author fullname="ASHAY RAUT">
      <organization>Amazon</organization>
      <address>
        <email>asharaut@amazon.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="18"/>
    <area>AREA</area>
    <workgroup>WG Working Group</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 33?>

<t>This document provides best current practices for implementing and deploying OAuth 2.0 Transaction Tokens as specified in draft-ietf-oauth-transaction-tokens. Transaction Tokens (Txn-Tokens) enable workloads in a trusted domain to preserve and propagate user identity and authorization context across service boundaries during the processing of external programmatic requests. This BCP addresses practical deployment considerations including token service architecture, size management, propagation patterns, validation strategies, and operational monitoring that are essential for secure and effective implementation in production environments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-oauth-transactiontokens-bcp/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ashayraut/oauth-transactiontokens-best-current-practice"/>.</t>
    </note>
  </front>
  <middle>
    <?line 38?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="background">
        <name>Background</name>
        <t>Modern distributed systems built on microservice architectures face a fundamental challenge: maintaining security context as requests traverse multiple service boundaries. When an external actor initiates an API request, the user identity and authorization context must be preserved and made available to all downstream internal microservices involved in processing that request. Without a standardized mechanism, organizations resort to ad-hoc solutions that introduce security vulnerabilities, operational complexity, and interoperability challenges.</t>
        <t>The OAuth 2.0 Transaction Tokens specification (draft-ietf-oauth-transaction-tokens) addresses this challenge by defining a token format and exchange protocol that enables secure context propagation across internal microservices within trusted domains. However, the specification focuses on protocol mechanics rather than deployment practices. Real-world implementations face additional challenges including latency constraints, token size limitations, schema evolution, propagation reliability, and operational monitoring.</t>
      </section>
      <section anchor="purpose-of-the-bcp">
        <name>Purpose of the BCP</name>
        <t>This Best Current Practice document provides implementers with guidance derived from production deployments of Txn-Token systems. It addresses practical considerations that fall outside the scope of the protocol specification but are critical for successful deployment. The recommendations in this document are based on operational experience with large-scale microservice environments where hundreds of internal microservices must coordinate security context propagation across complex call chains.</t>
        <t>This BCP is intended for:
- Organizations implementing Transaction Token Services
- internal microservice developers integrating Txn-Token support
- Security architects designing authorization systems
- Operations teams monitoring token propagation</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in RFC 2119.
This document uses terminology from draft-ietf-oauth-transaction-tokens including "Transaction Token" (Txn-Token), "Transaction Token Service", "trusted domain", and "authorization context".</t>
    </section>
    <section anchor="best-current-practices">
      <name>Best Current Practices</name>
      <t>## Transaction Token Service Implementation
### Service Architecture
Organizations <bcp14>SHOULD</bcp14> setup Transaction Token Service (TTS) which hosts functionality to issue token, replace token and other Txn-Token related functionality. Organizations <bcp14>SHOULD</bcp14> prefer architectures where the authorization service that authenticates and authorizes external actors, invokes the TTS for getting Transaction Token as part of authentication and authorization requests and pass Txn-token as well with it. This way, it avoids an explicit calls from external endpoint to TTS and lesser code changes in external services. Additionally, all internal microservices that want to replace tokens <bcp14>SHOULD</bcp14> connect directly to TTS. This architecture strikes balance between the options to either have authorization service host all TTS functionality or external services needing to connect TTS.
### Context Selection
Transaction Token Services <bcp14>MUST</bcp14> include all mandatory claims defined in draft-ietf-oauth-transaction-tokens. However, services <bcp14>SHOULD NOT</bcp14> include all optional contexts by default. Optional contexts such as transaction context (tctx) or custom claims <bcp14>MUST</bcp14> be added only when explicitly requested.</t>
      <t>Organizations <bcp14>SHOULD</bcp14> provide client libraries that offer interfaces for requesting Txn-Tokens with specific optional contexts. This approach prevents token bloat while ensuring that services can obtain the context they require. When an optional context cannot be added due to parsing errors, format violations, or unavailability, the Transaction Token Service <bcp14>MUST NOT</bcp14> fail the token issuance. Instead, it <bcp14>SHOULD</bcp14> issue the token without that specific context and <bcp14>MAY</bcp14> log the condition for operational monitoring.</t>
      <section anchor="token-size-management">
        <name>Token Size Management</name>
        <t>### Size Limits
Transaction Token Services <bcp14>MUST NOT</bcp14> issue tokens larger than 4KB. While HTTP specifications do not mandate maximum header sizes, common web server implementations impose limits to prevent Denial of Service attacks. Apache defaults to 8KB maximum header size, but organizations must account for other headers in the same request. A 4KB limit for Txn-Tokens provides reasonable headroom while preventing operational issues.</t>
        <t>Organizations <bcp14>SHOULD</bcp14> implement monitoring on token size to detect trends toward the limit. Services that consistently approach size limits indicate either excessive context inclusion or the need for context relocation strategies.</t>
        <section anchor="context-relocation">
          <name>Context Relocation</name>
          <t>When authorization context exceeds 4KB, Transaction Token Services <bcp14>SHOULD</bcp14> implement a relocation endpoint. The service stores oversized contexts in a separate data store using the Txn-Token identifier as the primary key. The Txn-Token itself contains only a reference to the relocated context.</t>
          <t>Client libraries for token validation <bcp14>SHOULD</bcp14> transparently handle context relocation. When an internal microservice requests a context that has been relocated, the library fetches it from the relocation endpoint. This pattern mirrors Policy Information Points in Attribute-Based Access Control (ABAC) systems where additional attributes are retrieved at runtime.</t>
          <t>Context relocation introduces additional latency and failure modes. Organizations <bcp14>SHOULD</bcp14> treat relocation as an exception rather than the normal case. Monitoring <bcp14>SHOULD</bcp14> track relocation frequency to identify services that consistently require excessive context.</t>
        </section>
      </section>
      <section anchor="token-lifetime-and-expiration">
        <name>Token Lifetime and Expiration</name>
        <t>Transaction tokens <bcp14>SHOULD</bcp14> have a time-to-live of less than 5 minutes. Organizations <bcp14>SHOULD</bcp14> determine appropriate lifetimes by working backward from latency Service Level Agreements (SLAs) defined for external endpoints.</t>
        <t>Short token lifetimes reduce the window for token compromise and limit the impact of token mix-up scenarios. However, lifetimes must accommodate the longest expected call chains in the SOA. Organizations <bcp14>SHOULD</bcp14> measure actual request processing times and set token lifetimes to exceed the 99th percentile by a reasonable margin.</t>
        <t>When tokens expire during request processing, services <bcp14>MUST NOT</bcp14> automatically request new tokens. Expired tokens indicate either excessively long call chains or performance problems that require investigation. Services <bcp14>SHOULD</bcp14> fail requests with expired tokens and emit telemetry for operational monitoring.</t>
      </section>
      <section anchor="schema-governance">
        <name>Schema Governance</name>
        <t>### Context Visibility
Organizations <bcp14>MUST</bcp14> govern the contexts added to Txn-Tokens. Once a context appears in a Txn-Token, it becomes visible to all services in the call chain. Services may develop dependencies on these contexts in ways not anticipated by the context provider. This phenomenon follows Hyrum's Law: with sufficient consumers, all observable behaviors of a system will be depended upon by somebody.</t>
        <t>Before adding a new context to Txn-Tokens, organizations <bcp14>MUST</bcp14> consider the implications of making that context universally visible. If a context represents an identifier or concept known only to services early in the call chain, adding it to the Txn-Token exposes it to all downstream services. Those services may develop business logic dependencies on the context, not just security dependencies.</t>
        <t>When the format or semantics of a widely-visible context must change, the organization faces a painful migration process. All services that depend on the context must be identified, updated, and deployed. Organizations <bcp14>SHOULD</bcp14> prefer adding new contexts with different names rather than changing existing contexts when semantic changes are required.</t>
        <section anchor="backward-compatibility">
          <name>Backward Compatibility</name>
          <t>Organizations <bcp14>MUST</bcp14> implement backward compatibility tests for Txn-Token contexts. Automated tests <bcp14>SHOULD</bcp14> verify that changes to context format or structure do not break existing consumers. These tests <bcp14>SHOULD</bcp14> run as part of the continuous integration pipeline for the Transaction Token Service.</t>
          <t>Backward compatibility testing becomes increasingly important as the number of services consuming Txn-Tokens grows. Without automated verification, format changes risk cascading failures across the SOA.</t>
        </section>
      </section>
      <section anchor="token-propagation">
        <name>Token Propagation</name>
        <t>### Propagation Control
Organizations <bcp14>MUST</bcp14> prevent Txn-Tokens from propagating outside the trusted domain. While tokens contain encrypted sensitive data, organizations <bcp14>SHOULD</bcp14> implement explicit controls to block external propagation. Propagation libraries <bcp14>MUST</bcp14> detect when an internal microservice attempts to include a Txn-Token in a request to an external endpoint and <bcp14>MUST</bcp14> remove the token from that request.</t>
        <t>This defense-in-depth approach protects against misconfiguration and implementation errors. Even if token encryption remains secure, preventing external propagation eliminates entire classes of potential vulnerabilities.</t>
        <section anchor="propagation-libraries">
          <name>Propagation Libraries</name>
          <t>Organizations <bcp14>SHOULD</bcp14> provide standardized propagation libraries that handle token lifecycle within an internal microservice workload processing. These libraries <bcp14>MUST</bcp14> extract the Txn-Token from the incoming HTTP header, store it in request-scoped memory, add the token to outgoing request headers, and clear it from memory when request processing completes.</t>
          <t>Standardized libraries provide several benefits. First, they enforce propagation controls including external blocking to avoid the token flowing outside your trust boundary. Second, they can be used to consistently emit telemetry about token initiation, propagation, and validation. Third, they provide a centralized point for implementing fallback behaviors when tokens are missing.</t>
        </section>
        <section anchor="propagation-reliability">
          <name>Propagation Reliability</name>
          <t>Organizations <bcp14>SHOULD</bcp14> monitor propagation success rates across the SOA. Unless propagation success reaches 100% for a given call chain, services cannot reliably enforce authorization policies based on Txn-Token contents. Services <bcp14>MUST</bcp14> implement reasonable fallback behaviors when tokens are absent.</t>
          <t>Propagation libraries <bcp14>MAY</bcp14> implement automatic token initiation when an incoming request lacks a Txn-Token. The library requests a placeholder token from the Transaction Token Service indicating that no context was received at the current service. This placeholder enables downstream services to identify where propagation broke in the call chain, facilitating operational debugging.</t>
        </section>
        <section anchor="token-mix-up-prevention">
          <name>Token Mix-up Prevention</name>
          <t>Token mix-up represents the most severe propagation risk. Mix-up occurs when a token intended for one request is incorrectly attached to a different request. If token T1 is meant for request R1 and token T2 for request R2, but T2 is sent with R1 due to a propagation bug, actors may access data they are not authorized to see.</t>
          <t>Token mix-up scenarios are difficult to detect because they may not cause obvious failures. The request succeeds but with incorrect authorization context. Organizations <bcp14>MUST</bcp14> implement request-scoped token storage in propagation libraries to prevent mix-up. Tokens <bcp14>MUST</bcp14> be associated with specific request contexts and <bcp14>MUST NOT</bcp14> be stored in shared or global state.</t>
          <t>Organizations <bcp14>SHOULD</bcp14> implement testing strategies that deliberately attempt to cause token mix-up under concurrent load. These tests verify that propagation libraries correctly isolate tokens across concurrent requests.</t>
        </section>
        <section anchor="trust-boundary-handling">
          <name>Trust Boundary Handling</name>
          <t>When requests cross trust boundaries within the organization, propagation libraries <bcp14>MUST</bcp14> either block token propagation or replace token contents with appropriately scoped contexts. Organizations <bcp14>SHOULD</bcp14> define trust boundaries explicitly and configure propagation libraries with boundary detection logic.</t>
          <t>At trust boundaries, services <bcp14>MAY</bcp14> request new Txn-Tokens from the Transaction Token Service with contexts appropriate for the target trust domain. This approach maintains context propagation while respecting security boundaries.</t>
        </section>
        <section anchor="cache-considerations">
          <name>Cache Considerations</name>
          <t>The introduction of Txn-token provides more information now to the entire microservice architecture graph. There are Services in the graph that cache data to avoid calling dependent services multiple times. Now, they <bcp14>SHOULD</bcp14> consider Txn-Token contexts to be included in the cache keys. If not included, there is a risk that incorrect data is vended out or cache hit is impacted because the dependent services might be using the Txn-Token contexts for computing the results which might get cached.</t>
          <t>Organizations <bcp14>SHOULD</bcp14> provide guidance to workload developers on cache key construction when Txn-Tokens are involved. Cache invalidation strategies <bcp14>MUST</bcp14> account for context changes that affect cached data.</t>
        </section>
      </section>
      <section anchor="token-validation">
        <name>Token Validation</name>
        <t>### Validation Libraries
Organizations <bcp14>SHOULD</bcp14> provide standardized validation libraries that handle signature verification, decryption, and token parsing. These libraries <bcp14>SHOULD</bcp14> synchronize cryptographic keys in the background, ensuring that services always have current keys for verification and decryption.</t>
        <t>Validation libraries <bcp14>SHOULD</bcp14> decode Txn-Tokens into strongly-typed objects appropriate for the implementation language. This approach prevents parsing errors and provides compile-time verification of context access patterns.</t>
        <section anchor="error-handling">
          <name>Error Handling</name>
          <t>Validation libraries <bcp14>SHOULD</bcp14> emit standardized error codes for common failure conditions including expired tokens, malformed tokens, and signature verification failures. These error codes enable consistent operational monitoring across the SOA.</t>
        </section>
        <section anchor="fallback-policies">
          <name>Fallback Policies</name>
          <t>Services <bcp14>SHOULD NOT</bcp14> automatically fail requests when Txn-Tokens are missing or invalid. Organizations <bcp14>MUST</bcp14> define fallback policies that balance security with user experience. Fallback policies <bcp14>MAY</bcp14> include serving redacted data, limiting functionality, or requesting step-up authentication.</t>
          <t>The appropriate fallback depends on the sensitivity of the requested operation. Services accessing highly sensitive data <bcp14>MAY</bcp14> require valid Txn-Tokens and fail requests when tokens are absent. Services providing less sensitive functionality <bcp14>SHOULD</bcp14> implement graceful degradation.</t>
        </section>
      </section>
      <section anchor="telemetry-and-monitoring">
        <name>Telemetry and Monitoring</name>
        <t>### Adoption Monitoring
Transaction token adoption in large SOA environments takes time. Organizations <bcp14>SHOULD</bcp14> implement comprehensive telemetry to monitor adoption progress, propagation reliability, and validation patterns.</t>
        <t>When organizations provide standardized libraries for token initiation, propagation, and validation, telemetry logic <bcp14>SHOULD</bcp14> be embedded in those libraries. This approach ensures consistent telemetry across all services without requiring individual workload implementations.</t>
        <section anchor="telemetry-aggregation">
          <name>Telemetry Aggregation</name>
          <t>Services <bcp14>SHOULD</bcp14> aggregate telemetry locally before transmitting to centralized monitoring systems. Local aggregation reduces network overhead and enables higher-frequency sampling without overwhelming monitoring infrastructure.</t>
          <t>Centralized monitoring systems <bcp14>SHOULD</bcp14> store telemetry in data warehouses that support analytical queries. Organizations <bcp14>SHOULD</bcp14> implement automated monitors that alert on significant changes in propagation rates, validation failures, or token expiration rates.</t>
        </section>
        <section anchor="key-metrics">
          <name>Key Metrics</name>
          <t>Organizations <bcp14>SHOULD</bcp14> monitor the following key metrics:
- Token initiation rate by service
- Propagation success rate by call chain
- Token expiration rate during request processing
- Validation failure rate by error type
- Token size distribution
- Context relocation frequency</t>
          <t>These metrics provide visibility into Txn-Token health across the SOA and enable rapid identification of deployment issues.</t>
        </section>
      </section>
      <section anchor="key-management">
        <name>Key Management</name>
        <t>Organizations <bcp14>MUST</bcp14> implement secure key management practices for Txn-Token cryptographic operations. Key management <bcp14>SHOULD</bcp14> follow the guidelines in RFC 4107 "Guidelines for Cryptographic Key Management".</t>
        <t>Transaction Token Services <bcp14>MUST</bcp14> support key rotation without service disruption. Validation libraries <bcp14>MUST</bcp14> support multiple concurrent keys to enable zero-downtime rotation. Organizations <bcp14>SHOULD</bcp14> automate key rotation on a regular schedule.</t>
      </section>
      <section anchor="batch-processing-pattern">
        <name>Batch Processing pattern</name>
        <t>OAuth Transaction Tokens are designed to propagate security context through a call chain within a trust domain. To maintain a high security posture without the overhead of a global revocation infrastructure, these tokens are short-lived (typically minutes). In many modern architectures, a transaction may be asynchronous. For example, a request may be placed on a message queue (e.g., Kafka, RabbitMQ) and processed by a worker service hours or days later. By the time the worker resumes the transaction, the original Transaction Token has expired.</t>
        <t>Batch Token (Voucher): A long-lived, opaque, or encrypted token representing the transaction context during a period of rest.
Initiator: The internal microservice that receives a Transaction Token and requests a Batch Token before an asynchronous pause.
Rehydrator: The internal microservice that takes a Batch Token and exchanges it for a fresh, short-lived Transaction Token to resume processing.</t>
        <section anchor="initiation-pausing-the-transaction">
          <name>Initiation (Pausing the Transaction)</name>
          <t>When a internal microservice determines that a transaction will exceed the TTL of the current Transaction Token (TraT), it <bcp14>SHOULD</bcp14> request a Batch Token from the Transaction Token Service (TTS).
The request to the TTS <bcp14>SHOULD</bcp14> include:
   * The current valid TraT.
   * The intended "use case ID" or "namespace" to constrain the token.</t>
          <t>The TTS returns a Batch Token with a TTL suitable for the asynchronous delay (e.g., 24 hours to 7 days).</t>
        </section>
        <section anchor="rehydration-resuming-the-transaction">
          <name>Rehydration (Resuming the Transaction)</name>
          <t>When a worker service (the Rehydrator) picks up the task, it <bcp14>MUST NOT</bcp14> use the Batch Token directly to call downstream services. Instead, it <bcp14>MUST</bcp14> exchange the Batch Token at the TTS for a fresh TraT.
The TTS <bcp14>SHALL</bcp14>:
   1.  Verify the Batch Token's signature and expiration.
   2.  Validate that the Rehydrator is authorized for the specific 
       "use case ID" or "namespace" embedded in the Batch Token.
   3.  Issue a new, short-lived TraT containing the original 
       claims (e.g., subject, original requester IP).</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="token-mix-up-prevention-1">
        <name>Token Mix-up Prevention</name>
        <t>Token mix-up represents a critical security risk. Organizations <bcp14>MUST</bcp14> implement request-scoped token storage and <bcp14>MUST</bcp14> test for mix-up scenarios under concurrent load. Token mix-up can result in unauthorized data access without obvious system failures, making it particularly dangerous.</t>
      </section>
      <section anchor="trust-boundary-controls">
        <name>Trust Boundary Controls</name>
        <t>Organizations <bcp14>MUST</bcp14> define trust boundaries explicitly and <bcp14>MUST</bcp14> implement controls that prevent inappropriate token propagation across those boundaries. Failure to control propagation at trust boundaries can expose sensitive contexts to unauthorized services.</t>
      </section>
      <section anchor="cache-security">
        <name>Cache Security</name>
        <t>Services that cache data based on Txn-Token contexts face security risks if cache keys do not incorporate all relevant contexts. Organizations <bcp14>MUST</bcp14> provide guidance on secure cache key construction and <bcp14>MUST</bcp14> audit caching services for correct context handling.</t>
      </section>
      <section anchor="fallback-mechanisms">
        <name>Fallback Mechanisms</name>
        <t>While fallback mechanisms improve availability, they can introduce security vulnerabilities if not carefully designed. Organizations <bcp14>MUST</bcp14> ensure that fallback policies do not inadvertently grant excessive access when Txn-Tokens are absent. Fallback policies <bcp14>SHOULD</bcp14> be explicitly documented and reviewed by security teams.</t>
      </section>
      <section anchor="token-lifetime">
        <name>Token Lifetime</name>
        <t>Short token lifetimes reduce the window for token compromise but may cause operational issues if set too aggressively. Organizations <bcp14>MUST</bcp14> balance security considerations with operational requirements when setting token lifetimes.</t>
      </section>
      <section anchor="external-propagation">
        <name>External Propagation</name>
        <t>Preventing Txn-Tokens from leaving the trusted domain is critical. Organizations <bcp14>MUST</bcp14> implement multiple layers of defense including library-level controls, network-level filtering, and monitoring for external propagation attempts.</t>
      </section>
      <section anchor="batch-processing-security-consideration">
        <name>Batch processing security consideration</name>
        <section anchor="token-constraining">
          <name>Token Constraining</name>
          <t>Batch Tokens <bcp14>MUST</bcp14> be sender-constrained or scoped to specific namespaces. This prevents a compromised service from "stealing" a Batch Token from a queue and successfully minting a 
Transaction Token for an unrelated flow.</t>
        </section>
        <section anchor="data-mutability-and-consent">
          <name>Data Mutability and Consent</name>
          <t>Asynchronous delays increase the risk that the underlying authorization context has changed (e.g., a user has revoked consent). The TTS <bcp14>SHOULD</bcp14> perform a "freshness check" during 
rehydration for claims marked as mutable or sensitive.</t>
        </section>
        <section anchor="infinite-exchange-prevention">
          <name>Infinite Exchange Prevention</name>
          <t>To prevent a transaction from living indefinitely through repeated rehydrations, the TTS <bcp14>SHOULD</bcp14> implement a maximum chain depth or total transaction lifetime counter within the token metadata.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="references">
      <name>References</name>
      <t>## Normative References
<eref target="https://datatracker.ietf.org/doc/html/rfc2119">RFC2119</eref> Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997.</t>
      <t><eref target="https://www.ietf.org/archive/id/draft-ietf-oauth-transaction-tokens-06.html">TXNTOKENS</eref> Tulshibagwale, A., Hardt, D., and G. Fletcher, "OAuth 2.0 Transaction Tokens", draft-ietf-oauth-transaction-tokens-06 (work in progress).</t>
      <section anchor="informative-references">
        <name>Informative References</name>
        <t><eref target="https://datatracker.ietf.org/doc/html/rfc4107">RFC4107</eref> Bellovin, S. and R. Housley, "Guidelines for Cryptographic Key Management", BCP 107, RFC 4107, DOI 10.17487/RFC4107, June 2005.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 274?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
