Identity linking is the mechanism that allows AI agents to connect user identities across different systems — linking a user's merchant account to their payment provider, or their loyalty program to a specific retailer. Get this wrong, and you either have a security nightmare or a usability dead end.
The original UCP identity linking design worked, but it was showing cracks as enterprise adoption accelerated. The new design addresses three critical limitations:
feat! prefix, indicating backward-incompatible changes. Existing identity linking implementations will need to migrate to the new mechanism registry pattern.
The headline change is introducing a mechanism registry — a discoverable list of supported identity linking methods. Instead of hardcoding OAuth2, SAML, or proprietary methods, merchants now advertise their capabilities:
{
"identityLinking": {
"mechanisms": [
{
"type": "oauth2",
"authorizationEndpoint": "https://merchant.example/oauth/authorize",
"scopes": ["profile", "loyalty.read", "orders.read"]
},
{
"type": "saml",
"metadataUrl": "https://merchant.example/saml/metadata"
}
]
}
}
The second major change is capability-driven scoping. Rather than identity links granting blanket access, they now specify exactly what capabilities are unlocked:
profile — basic identity confirmationloyalty.read — read loyalty points and tier statusloyalty.redeem — ability to redeem pointsorders.read — view order historyorders.modify — change or cancel ordersThis granularity is essential for enterprise adoption. A corporate travel agent can link to a hotel's loyalty program to read status without being authorized to redeem points — a common compliance requirement.
For existing implementations, the migration involves:
The PR includes a compatibility shim that maps old-style identity links to the new format with full scopes (essentially the "all or nothing" behavior), giving merchants time to implement proper scope handling.
This redesign opens several doors:
The PR is still open for review. Given the breaking nature of the changes, expect a longer review cycle and potentially a dedicated migration window before this lands in a spec version.
For merchants and agent developers watching UCP, this is a good time to audit your current identity linking implementations and start planning for the mechanism registry pattern.