Skip to content

ICCP

Integrated Context Control Protocol — a standard for institutional AI context governance. Presented at Quantum Leap 2026.

User-directed governance for models, data, and context in enterprise AI. Make AI accountable by design.

Abstract & Purpose

Abstract

ICCP 1.0 defines a standardized interoperability framework for governing how AI systems receive authorized institutional context. It enables institutions to control identity claims, model authorization, resource scope, compliance posture, and audit traceability prior to AI model invocation. The protocol is designed to function as an institutional requirement similar to LDAP, SAML, SCIM, and LTI.

Purpose & Scope

ICCP standardizes the secure exchange of contextual authorization between institutions and AI vendors. It ensures that AI systems do not directly retrieve enterprise data without institutional approval. ICCP applies to AI chat systems, workflow automation agents, model orchestration platforms, and external AI providers.

Core Design Principles

1.

Institutional control over contextual authorization.

2.

Least-privilege access by default.

3.

Signed and verifiable context assertions.

4.

Deterministic audit traceability.

5.

Vendor-agnostic model compatibility.

In practice: Transparency (users and admins see what data informed the AI), Least Privilege (the AI only sees what is needed for this user, right now), and Auditability (every invocation is traceable and reconstructable).

Architectural Model

Institution Systems → ICCP Gateway → AI Vendor / Model Provider. The ICCP Gateway assembles and signs Context Assertions before any model invocation. AI vendors must validate assertion signatures and enforce declared scope constraints.

CLIENTS (Chat UI, Workflow UI, API Clients)ICCP GOVERNANCE LAYERAI MODELS (OpenAI, Anthropic, Internal, On-prem)

Governance layer includes: Identity Service, Policy Engine, Context Assembly Engine, Model Registry, Resource Registry, Audit Service. Context Packet flows to the model only after validation.

Protocol Objects & Schemas

Five core objects make governance explicit and portable: Identity Scope, Model Descriptor, Resource Descriptor, Policy Rule, and Context Packet (assertion).

Identity Claims

Required: user_id, institution_id, role, clearance_level, session_id. Optional: delegation and impersonation scope.

Model Descriptor

Each model must declare model_id, provider, compliance certifications, data residency, risk classification, and capability tags.

Resource Descriptor

Resources declare resource_id, origin_system, domain classification, sensitivity level, ttl_seconds, and allowed_roles.

ICCP Context Assertion

Immutable, deterministic, and fully reconstructable. The signed payload sent to the AI vendor before any model invocation.

{
  "iccp_version": "1.0",
  "assertion_id": "uuid",
  "issued_by": "Institution-ATL-001",
  "subject": {
    "user_id": "u-93824",
    "role": "AcademicAdvisor",
    "clearance": "FERPA-Authorized"
  },
  "authorized_models": ["gpt-4o-enterprise"],
  "authorized_resources": [
    {
      "resource_id": "canvas-grades",
      "scope": "current-term",
      "ttl_seconds": 300
    }
  ],
  "compliance_mode": "FERPA",
  "signature": "institution-signed-token"
}

Policy, Audit & Compliance

Policy Enforcement

Precedence order: Institution → Role → User. AI vendors must reject any invocation where assertion validation fails. TTL expiration invalidates contextual authorization.

  • • Institution policy: hard constraints, evaluated first
  • • Role policy: permissions and defaults, scoped access
  • • User settings: preferences within allowed bounds

Audit & Trace Requirements

Every ICCP invocation must generate assertion_id, user_id, model_invoked, resources_accessed, and timestamp. Vendors must retain logs per institutional compliance requirements.

Optional: WORM/immutable logs, SIEM integration, redaction-first logging. Compliance profiles: FERPA, HIPAA, PCI, Institutional Confidential.

Revocation & Expiry

ICCP assertions are time-bound. Institutions may revoke authorization dynamically. Expired assertions must invalidate active sessions.

Compliance Profiles

ICCP supports predefined modes: FERPA, HIPAA, PCI, and Institutional Confidential. Compliance profiles define allowable model–resource combinations.

Vendor Conformance

To claim ICCP 1.0 compatibility, vendors must validate signed assertions, enforce scope and TTL, log invocation metadata, and provide conformance documentation.

Deployment & Governance

How to adopt ICCP

  • Embedded — ICCP runs inside the app tier; fastest path, best for single-product deployments.
  • Gateway — ICCP as an “AI Context Firewall”; centralized governance for multi-app and multi-team reuse.
  • Federated — Cross-institution governance, shared compliance profiles, partner ecosystem and standards.

Versioning

ICCP follows semantic versioning (MAJOR.MINOR.PATCH). Breaking changes increment MAJOR. A working group governs future revisions. Open protocol spec and reference objects; vendor implementations and tooling can be proprietary.

Conclusion & Call to Adoption

ICCP establishes a standardized institutional framework for AI context governance. Institutions are encouraged to require ICCP support in AI procurement processes. Vendors are invited to participate in the ICCP working group to drive ecosystem adoption.

Take the First Step, Get Started Today.

Take Control. Create Opportunities. Reimagine Tomorrow...Today!