Strong Authentication for Agent-Initiated Value Transfer Governance requires that every AI agent initiating a value transfer — whether fiat currency, digital asset, tokenised security, or any other instrument representing economic value — authenticates itself through a mechanism that is structurally independent of the agent's reasoning layer, cryptographically verifiable, and tiered to the risk profile of the transfer. The authentication credential must not be extractable from the agent's context, must not be replayable across sessions, and must be validated by the receiving system before any value movement occurs. This dimension ensures that the identity asserting a value transfer is genuine, authorised, and bound to a specific mandate — preventing credential theft, session hijacking, and impersonation attacks that could redirect funds at machine speed.
Scenario A — Credential Extraction Through Context Manipulation: A financial services firm deploys an AI agent to process supplier payments. The agent authenticates to the payment gateway using an API key stored in its environment variables, which are accessible within the agent's runtime context. An adversarial prompt injection embedded in a supplier invoice causes the agent to include its API key in the metadata field of a payment request to an attacker-controlled endpoint. The attacker extracts the key and initiates 47 fraudulent transfers totalling £2,340,000 over a weekend before the anomaly is detected on Monday morning.
What went wrong: The authentication credential was accessible within the agent's reasoning context. The credential was a static bearer token with no session binding, no per-transaction challenge, and no hardware-rooted attestation. The credential alone was sufficient to authorise value transfers with no additional authentication factor. Consequence: £2,340,000 in fraudulent transfers, FCA enforcement investigation for inadequate systems and controls, reputational damage requiring public disclosure, insurance claim contested on grounds that credential storage was negligent.
Scenario B — Session Hijacking Through Token Replay: An AI agent managing portfolio rebalancing authenticates to a brokerage API using an OAuth2 access token with a 24-hour expiry. The token is issued once at session start and reused for all subsequent requests. A man-in-the-middle attack on an internal network segment captures the token during a routine health-check call. The attacker replays the token to execute 312 unauthorised trades over 6 hours, generating £890,000 in losses through adverse market positions before the token expires.
What went wrong: The access token had no per-request binding (no DPoP, no mutual TLS channel binding). The token lifetime of 24 hours was excessive for the risk profile. No transaction-level re-authentication was required despite the value of individual trades exceeding £50,000. Consequence: £890,000 in trading losses, regulatory finding under MiFID II Article 16 for inadequate algorithmic trading controls, mandatory remediation programme with quarterly reporting to the regulator.
Scenario C — Impersonation Through Credential Sharing: An organisation deploys three AI agents for different payment functions: domestic payments (Agent A, limit £10,000), international payments (Agent B, limit £100,000), and treasury operations (Agent C, limit £5,000,000). All three agents authenticate to the payment infrastructure using the same service account credential. Agent A is compromised through a prompt injection attack. Because the credential is shared, the attacker uses Agent A's authenticated session to execute treasury-level transfers, bypassing Agent A's £10,000 mandate limit at the payment infrastructure layer because the infrastructure sees a valid treasury-level credential.
What went wrong: Credential sharing across agents with different mandate levels meant that authentication did not bind to a specific mandate. The payment infrastructure validated the credential but had no mechanism to verify which agent — and therefore which mandate — was using it. Consequence: £4,700,000 in unauthorised transfers, complete loss of mandate enforcement at the infrastructure layer, regulatory finding that the firm's control framework was fundamentally compromised.
Scope: This dimension applies to all AI agents that initiate, authorise, approve, or relay value transfers of any kind. Value transfer includes: fiat currency payments (domestic and international), digital asset transfers (cryptocurrency, stablecoins, tokenised securities), inter-account movements within the same institution, instructions to third-party payment processors, and any action that results in economic value moving from one party or account to another. The scope extends to agents that do not directly execute the transfer but generate or approve the instruction that causes execution — an agent that produces a payment file for batch processing is within scope even though it does not call the payment API directly. Agents that only read account balances or transaction histories without initiating transfers are excluded, provided they cannot be repurposed to initiate transfers without re-assessment.
4.1. A conforming system MUST authenticate every agent-initiated value transfer using a credential that is not accessible within the agent's reasoning context, instruction set, or memory.
4.2. A conforming system MUST bind authentication credentials to a specific agent identity and mandate, such that a credential issued to one agent cannot be used to authenticate actions under a different agent's mandate.
4.3. A conforming system MUST require per-transaction or per-session cryptographic challenge-response authentication for all value transfers exceeding a defined threshold, where the threshold is commensurate with the organisation's risk appetite and no higher than £10,000 or equivalent.
4.4. A conforming system MUST ensure that authentication tokens used for value transfers are not replayable — each token must be bound to a specific transaction or short-lived session and must be invalidated after use or expiry.
4.5. A conforming system MUST reject value transfer requests where the authentication mechanism is unavailable, degraded, or returns an ambiguous result, defaulting to denial rather than permissive fallback.
4.6. A conforming system MUST log every authentication event associated with a value transfer, including successful authentications, failed attempts, credential rotation events, and session establishment, with sufficient detail to reconstruct the authentication chain for any given transfer.
4.7. A conforming system SHOULD implement mutual TLS or equivalent channel-binding mechanisms to prevent credential interception during transit between the agent and the payment infrastructure.
4.8. A conforming system SHOULD rotate authentication credentials on a schedule no longer than 24 hours for high-frequency agents, with immediate rotation capability upon detection of compromise indicators.
4.9. A conforming system SHOULD implement hardware-rooted attestation (e.g., TPM-backed keys, HSM-issued ephemeral credentials) for agents executing transfers above £100,000 or equivalent.
4.10. A conforming system MAY implement step-up authentication that increases the authentication strength required as the cumulative value of transfers in a session increases.
Strong authentication for agent-initiated value transfers addresses a threat surface that does not exist in traditional human-operated payment systems. When a human initiates a bank transfer, the authentication chain includes something the human knows (password), something the human has (hardware token or mobile device), and often something the human is (biometric). Each factor is bound to a physical person and is difficult to extract remotely. When an AI agent initiates a transfer, none of these factors apply in their traditional form. The agent does not "know" a password in the human sense — it has access to a credential in its runtime environment. The agent does not "have" a hardware token — it may have access to a key stored in a file or environment variable. The agent has no biometric identity.
This creates a fundamental authentication gap. If the credential is accessible within the agent's reasoning context, it can be extracted through prompt injection, context manipulation, or output exfiltration. If the credential is a static bearer token, it can be replayed by any party that intercepts it. If the credential is shared across agents, compromise of the least-privileged agent grants access at the highest-privileged level.
The consequence of authentication failure in value transfer is immediate and quantifiable. Unlike data breaches where the harm may be diffuse and delayed, a fraudulent value transfer results in immediate financial loss. At machine speed, an agent with compromised credentials can execute hundreds of transfers before any monitoring system responds. The average time to detect credential compromise in financial services is measured in hours to days; an AI agent can exhaust a £10,000,000 mandate in under 60 seconds.
AG-115 therefore requires authentication mechanisms that are structurally separated from the agent's reasoning layer, cryptographically bound to specific identities and transactions, and designed to fail safely. This is not a general-purpose authentication standard — it is specifically designed for the unique threat model of autonomous agents executing value transfers at machine speed.
AG-115 requires a layered authentication architecture where no single credential compromise can authorise a value transfer. The authentication mechanism must operate outside the agent's reasoning context, meaning the agent cannot read, copy, or exfiltrate the credential through any output channel.
Recommended patterns:
Anti-patterns to avoid:
Banking and Payments. Authentication requirements should align with PSD2 Strong Customer Authentication (SCA) principles, adapted for agent-to-system interactions. The three SCA elements (knowledge, possession, inherence) map to: knowledge = mandate-bound credential, possession = HSM-backed key or hardware-bound certificate, inherence = runtime attestation of agent integrity. Payment Services Regulations 2017 require that payment service providers apply strong authentication for electronic payment transactions — AI-initiated payments are no exception.
Crypto and Digital Assets. Private key management for blockchain transactions requires particular care. An agent that holds a private key in memory can sign arbitrary transactions. Key material should be held in HSMs with transaction-level policy enforcement. Multi-signature schemes where the agent is one of N signers (with human or compliance signers holding remaining keys) provide structural protection against single-agent compromise. Travel Rule (FATF Recommendation 16) compliance requires verifiable originator identity for transfers above applicable thresholds.
Cross-Border Transfers. Agents executing cross-border value transfers must authenticate with multiple systems across jurisdictions. Credential management must account for different authentication standards across payment networks (SWIFT gpi, SEPA, Faster Payments, domestic ACH). Credential mapping — ensuring that a single agent identity is correctly authenticated across all systems it interacts with — is a non-trivial operational challenge.
Basic Implementation — Each agent has a unique credential (API key or service account) that is not shared with other agents. The credential is stored outside the agent's instruction set but within the same runtime environment (e.g., in environment variables or a configuration file accessible to the agent process). Authentication is validated by the receiving payment system on each request. Credential rotation occurs on a defined schedule (e.g., quarterly). Authentication events are logged but may not capture all fields needed for forensic reconstruction. This level meets the minimum mandatory requirements but leaves the credential accessible within the agent's process boundary.
Intermediate Implementation — Credentials are stored in a dedicated secrets management system (e.g., HashiCorp Vault, AWS Secrets Manager, Azure Key Vault) and are injected into the agent's runtime at request time with short expiry (e.g., 1 hour). The agent cannot read the credential directly — it receives a scoped, time-limited token that the payment infrastructure validates against the secrets management system. Mutual TLS binds each agent's network connection to its identity. Per-agent certificates encode the mandate reference. Credential rotation is automated and occurs at least daily. All authentication events are logged with full detail including agent identity, mandate reference, transfer details, and authentication outcome.
Advanced Implementation — All intermediate capabilities plus: HSM-backed signing where the agent never possesses key material. Per-transaction challenge-response for transfers above a risk-commensurate threshold. Runtime attestation verifies agent integrity before credential issuance. Hardware-bound credentials that cannot be extracted from the execution environment. Real-time anomaly detection on authentication patterns (e.g., unusual authentication frequency, geographic anomalies in request origins, credential use outside normal operating hours). Independent adversarial testing has verified that no known attack vector can extract or replay authentication credentials.
Required artefacts:
Retention requirements:
Access requirements:
Test 8.1: Credential Isolation From Agent Context
Test 8.2: Credential-Mandate Binding Enforcement
Test 8.3: Token Replay Prevention
Test 8.4: Challenge-Response for High-Value Transfers
Test 8.5: Authentication Failure Defaults to Denial
Test 8.6: Authentication Event Logging Completeness
| Regulation | Provision | Relationship Type |
|---|---|---|
| PSD2 | Article 97 (Strong Customer Authentication) | Direct requirement |
| FCA SYSC | 6.1.1R (Systems and Controls) | Direct requirement |
| EU AI Act | Article 9 (Risk Management System) | Supports compliance |
| MiFID II | Article 16 (Organisational Requirements) | Supports compliance |
| DORA | Article 9 (ICT Risk Management Framework) | Direct requirement |
| NIST AI RMF | GOVERN 1.1, MANAGE 2.2 | Supports compliance |
| ISO 42001 | Clause 6.1 (Actions to Address Risks) | Supports compliance |
| FATF Recommendation 16 | Travel Rule (Wire Transfer Requirements) | Supports compliance |
Article 97 requires payment service providers to apply strong customer authentication where the payer initiates an electronic payment transaction. When an AI agent initiates a payment on behalf of a customer or institution, the authentication chain must satisfy the SCA requirement — possession, knowledge, and inherence factors adapted for machine identity. AG-115 implements this by requiring credentials that are structurally separated from the agent's context (possession of HSM-backed key), bound to a specific mandate (knowledge equivalent through mandate-credential binding), and verifiable through runtime attestation (inherence equivalent through agent integrity verification). Regulators have indicated that the SCA requirement applies regardless of whether the payment is initiated by a human or an automated system — the obligation is on the payment service provider to ensure strong authentication, not on the initiator to be human.
SYSC 6.1.1R requires firms to establish and maintain adequate policies and procedures sufficient to ensure compliance. For AI agents initiating value transfers, adequate systems and controls include authentication mechanisms that prevent unauthorised transfers even under adversarial conditions. The FCA's expectations under the Senior Managers and Certification Regime mean that individual senior managers may be personally accountable for the adequacy of authentication controls over AI-initiated payments.
Article 9 requires financial entities to establish ICT risk management frameworks that include identification, protection, detection, response, and recovery capabilities. Agent authentication is a protection control within this framework. DORA's specific requirements for testing ICT tools and systems (Article 25) extend to the authentication mechanisms used by AI agents.
For cross-border value transfers, the Travel Rule requires originator and beneficiary information to accompany the transfer. When an AI agent initiates a cross-border transfer, the authentication mechanism must produce verifiable originator identification that satisfies the Travel Rule requirements of the originating and receiving jurisdictions. AG-115's credential-mandate binding ensures that the originating agent's identity is cryptographically verifiable, supporting Travel Rule compliance.
| Field | Value |
|---|---|
| Severity Rating | Critical |
| Blast Radius | Organisation-wide with potential cross-organisational impact through payment networks and counterparty systems |
Consequence chain: Authentication failure in agent-initiated value transfers produces immediate, quantifiable financial loss. Unlike data breaches where impact assessment requires investigation, a fraudulent value transfer is a direct debit against the organisation's assets. The failure mode cascades: credential compromise leads to unauthorised transfer initiation, which leads to irreversible value movement (particularly for cryptocurrency and real-time payment systems where settlement is near-instant), which leads to financial loss that may exceed insurance coverage. At machine speed, an agent with compromised credentials operating against a £5,000,000 daily mandate can exhaust that limit in seconds. The blast radius extends beyond the immediate organisation — fraudulent transfers affect counterparties, payment networks, and potentially downstream recipients in payment chains. Regulatory consequences include FCA enforcement action under SYSC, PSD2 non-compliance findings, potential personal liability under the Senior Managers Regime, and mandatory incident reporting under DORA. Reputational impact is amplified because AI-initiated fraud is novel and attracts disproportionate media attention.
Cross-references: This dimension builds upon AG-001 (Operational Boundary Enforcement) which establishes the mandate structure that AG-115 authentication credentials must bind to. AG-029 (Credential Integrity Verification) provides the foundational credential management upon which AG-115 adds value-transfer-specific requirements. AG-011 (Action Reversibility and Settlement Integrity) addresses what happens after a transfer executes — AG-115 prevents unauthorised execution in the first place. AG-025 (Transaction Structuring Detection) detects attempts to circumvent per-transaction authentication thresholds through transaction splitting. AG-045 (Economic Incentive Alignment Verification) ensures that the agent's incentive structure does not create pressure to bypass authentication controls. Sibling dimensions AG-116 through AG-119 collectively govern the financial services value transfer lifecycle from pre-execution controls through outcome monitoring, fair treatment, and model challenge.