<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC3339 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3339.xml">
<!ENTITY RFC3629 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3629.xml">
<!ENTITY RFC4648 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
<!ENTITY RFC5234 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5234.xml">
<!ENTITY RFC5246 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5246.xml">
<!ENTITY RFC8126 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8259 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
<!ENTITY RFC8446 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY RFC8785 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8785.xml">
<!ENTITY RFC9110 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9110.xml">
<!ENTITY RFC9111 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9111.xml">
<!ENTITY RFC9457 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9457.xml">
<!ENTITY RFC9530 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9530.xml">
]>


<rfc ipr="trust200902" docName="draft-ryan-httpauth-payment-01" category="std" consensus="true" submissionType="IETF">
  <front>
    <title abbrev="Payment Auth Scheme">The "Payment" HTTP Authentication Scheme</title>

    <author initials="B." surname="Ryan" fullname="Brendan Ryan">
      <organization>Tempo Labs</organization>
      <address>
        <email>brendan@tempo.xyz</email>
      </address>
    </author>
    <author initials="J." surname="Moxey" fullname="Jake Moxey">
      <organization>Tempo Labs</organization>
      <address>
        <email>jake@tempo.xyz</email>
      </address>
    </author>
    <author initials="T." surname="Meagher" fullname="Tom Meagher">
      <organization>Tempo Labs</organization>
      <address>
        <email>tom@tempo.xyz</email>
      </address>
    </author>
    <author initials="J." surname="Weinstein" fullname="Jeff Weinstein">
      <organization>Stripe</organization>
      <address>
        <email>jweinstein@stripe.com</email>
      </address>
    </author>
    <author initials="S." surname="Kaliski" fullname="Steve Kaliski">
      <organization>Stripe</organization>
      <address>
        <email>stevekaliski@stripe.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="18"/>

    
    
    

    <abstract>


<?line 63?>

<t>This document defines the "Payment" HTTP authentication scheme, enabling
HTTP resources to require a payment challenge to be fulfilled before access.
The scheme extends HTTP Authentication, using the HTTP 402 "Payment Required"
status code.</t>

<t>The protocol is payment-method agnostic, supporting any payment network
or currency through registered payment method identifiers. Specific
payment methods are defined in separate payment method specifications.</t>



    </abstract>



  </front>

  <middle>


<?line 74?>

<section anchor="introduction"><name>Introduction</name>

<t>HTTP 402 "Payment Required" was reserved in HTTP/one-point-one <xref target="RFC9110"/> but never
standardized for common use. This specification defines the "Payment"
authentication scheme that gives 402 its semantics, enabling resources to
require a payment challenge to be fulfilled before access.</t>

<section anchor="relationship-to-payment-method-specifications"><name>Relationship to Payment Method Specifications</name>

<t>This specification defines the abstract protocol framework. Concrete
payment methods are defined in payment method specifications that:</t>

<t><list style="symbols">
  <t>Register a payment method identifier</t>
  <t>Define the <spanx style="verb">request</spanx> schema for that method</t>
  <t>Define the <spanx style="verb">payload</spanx> schema for that method</t>
  <t>Specify verification and settlement procedures</t>
</list></t>

</section>
</section>
<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="terminology"><name>Terminology</name>

<dl>
  <dt>Payment Challenge</dt>
  <dd>
    <t>A <spanx style="verb">WWW-Authenticate</spanx> header with scheme "Payment" indicating the
payment requirements for accessing a resource.</t>
  </dd>
  <dt>Payment Credential</dt>
  <dd>
    <t>An <spanx style="verb">Authorization</spanx> header with scheme "Payment" containing payment
authorization data.</t>
  </dd>
  <dt>Payment Method</dt>
  <dd>
    <t>A mechanism for transferring value, identified by a registered
identifier.</t>
  </dd>
  <dt>Payment Intent</dt>
  <dd>
    <t>The type of payment request, identified by a registered value in the
IANA "HTTP Payment Intents" registry. Intents are defined by separate
intent specifications.</t>
  </dd>
  <dt>Request</dt>
  <dd>
    <t>Method-specific data in the challenge enabling payment completion.
Encoded as base64url JSON in the <spanx style="verb">request</spanx> parameter.</t>
  </dd>
  <dt>Payload</dt>
  <dd>
    <t>Method-specific data in the credential proving payment.</t>
  </dd>
</dl>

</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<section anchor="request-flow"><name>Request Flow</name>

<figure><artwork><![CDATA[
   Client                                            Server
      │                                                 │
      │  (1) GET /resource                              │
      ├────────────────────────────────────────────────>│
      │                                                 │
      │  (2) 402 Payment Required                       │
      │      WWW-Authenticate: Payment id="..",         │
      │        method="..", intent="..", request=".."   │
      │<────────────────────────────────────────────────┤
      │                                                 │
      │  (3) Client fulfills payment challenge          │
      │      (signs transaction, pays invoice, etc.)    │
      │                                                 │
      │  (4) GET /resource                              │
      │      Authorization: Payment <credential>        │
      ├────────────────────────────────────────────────>│
      │                                                 │
      │  (5) Server verifies and settles                │
      │                                                 │
      │  (6) 200 OK                                     │
      │      Payment-Receipt: <receipt>                 │
      │<────────────────────────────────────────────────┤
      │                                                 │
]]></artwork></figure>

</section>
<section anchor="response-status-codes"><name>Status Codes</name>

<t>The following table defines how servers <bcp14>MUST</bcp14> respond to payment-related
conditions.</t>

<texttable>
      <ttcol align='left'>Condition</ttcol>
      <ttcol align='left'>Status</ttcol>
      <ttcol align='left'>Response</ttcol>
      <c>Resource requires payment, no credential provided</c>
      <c>402</c>
      <c>Fresh challenge in <spanx style="verb">WWW-Authenticate</spanx></c>
      <c>Malformed credential (invalid base64url, bad JSON)</c>
      <c>402</c>
      <c>Fresh challenge + <spanx style="verb">malformed-credential</spanx> problem</c>
      <c>Unknown, expired, or already-used challenge <spanx style="verb">id</spanx></c>
      <c>402</c>
      <c>Fresh challenge + <spanx style="verb">invalid-challenge</spanx> problem</c>
      <c>Payment proof invalid or verification failed</c>
      <c>402</c>
      <c>Fresh challenge + <spanx style="verb">verification-failed</spanx> problem</c>
      <c>Payment verified, access granted</c>
      <c>200</c>
      <c>Resource + optional <spanx style="verb">Payment-Receipt</spanx></c>
      <c>Payment verified, but policy denies access</c>
      <c>403</c>
      <c>No challenge (payment was valid)</c>
</texttable>

<t>Servers <bcp14>MUST</bcp14> return 402 with a <spanx style="verb">WWW-Authenticate: Payment</spanx> header when
payment is required or when a payment credential fails validation
(see <xref target="usage-of-402"/> for details).</t>

<t>Error details are provided in the response body using Problem Details
<xref target="RFC9457"/> rather than in the <spanx style="verb">WWW-Authenticate</spanx> header parameters.</t>

</section>
<section anchor="relationship-to-401-unauthorized"><name>Relationship to 401 Unauthorized</name>

<t>This specification uses 402 (Payment Required) consistently for all
payment-related challenges, including failed credential validation.
This diverges from the traditional 401 pattern used by other HTTP
authentication schemes. The distinction is intentional:</t>

<t><list style="symbols">
  <t><strong>402</strong> indicates a payment barrier (initial challenge or retry needed)</t>
  <t><strong>401</strong> is reserved for authentication failures unrelated to payment</t>
  <t><strong>403</strong> indicates the payment succeeded but access is denied by policy</t>
</list></t>

<t>This design ensures clients can distinguish payment requirements from
other authentication schemes that use 401.</t>

</section>
<section anchor="usage-of-402"><name>Usage of 402 Payment Required</name>

<section anchor="when-to-return-402"><name>When to Return 402</name>

<t>Servers <bcp14>SHOULD</bcp14> return 402 when:</t>

<t><list style="symbols">
  <t>The resource requires payment as a precondition for access</t>
  <t>The server can provide a Payment challenge that the client may fulfill</t>
  <t>Payment is the primary barrier to access (not authentication or authorization)</t>
</list></t>

<t>Servers <bcp14>MAY</bcp14> return 402 when:</t>

<t><list style="symbols">
  <t>Offering optional paid features or premium content</t>
  <t>Indicating that a previously-paid resource requires additional payment</t>
  <t>The payment requirement applies to a subset of request methods</t>
</list></t>

</section>
<section anchor="when-not-to-return-402"><name>When NOT to Return 402</name>

<t>Servers <bcp14>SHOULD NOT</bcp14> return 402 when:</t>

<t><list style="symbols">
  <t>The client lacks authentication credentials (use 401)</t>
  <t>The client is authenticated but lacks authorization (use 403)</t>
  <t>The resource does not exist (use 404)</t>
  <t>No Payment challenge can be constructed for the request</t>
</list></t>

<t>Servers <bcp14>MUST NOT</bcp14> return 402 without including a <spanx style="verb">WWW-Authenticate</spanx> header
containing at least one Payment challenge.</t>

</section>
<section anchor="interaction-with-other-authentication-schemes"><name>Interaction with Other Authentication Schemes</name>

<t>When a resource requires both authentication and payment, servers <bcp14>SHOULD</bcp14>:</t>

<t><list style="numbers" type="1">
  <t>First verify authentication credentials</t>
  <t>Return 401 if authentication fails</t>
  <t>Return 402 with a Payment challenge only after successful authentication</t>
</list></t>

<t>This ordering prevents information leakage about payment requirements to
unauthenticated clients.</t>

</section>
</section>
</section>
<section anchor="the-payment-authentication-scheme"><name>The Payment Authentication Scheme</name>

<section anchor="challenge-www-authenticate"><name>Challenge (WWW-Authenticate)</name>

<t>The Payment challenge is sent in the <spanx style="verb">WWW-Authenticate</spanx> header per
<xref target="RFC9110"/>. The challenge uses the auth-param syntax defined in Section 11
of <xref target="RFC9110"/>:</t>

<figure><sourcecode type="abnf"><![CDATA[
challenge       = "Payment" [ 1*SP auth-params ]
auth-params     = auth-param *( OWS "," OWS auth-param )
auth-param      = token BWS "=" BWS ( token / quoted-string )
]]></sourcecode></figure>

<section anchor="required-parameters"><name>Required Parameters</name>

<t><strong><spanx style="verb">id</spanx></strong>: Unique challenge identifier. Servers <bcp14>MUST</bcp14> bind this value to the
  challenge parameters (Section 5.1.3) to enable verification. Clients <bcp14>MUST</bcp14>
  include this value unchanged in the credential.</t>

<t><strong><spanx style="verb">realm</spanx></strong>: Protection space identifier per <xref target="RFC9110"/>. Servers <bcp14>MUST</bcp14>
  include this parameter to define the scope of the payment requirement.</t>

<t><strong><spanx style="verb">method</spanx></strong>: Payment method identifier (<xref target="payment-methods"/>). <bcp14>MUST</bcp14> be a lowercase
  ASCII string.</t>

<t><strong><spanx style="verb">intent</spanx></strong>: Payment intent type (<xref target="payment-intents"/>). The value <bcp14>MUST</bcp14> be a
  registered entry in the IANA "HTTP Payment Intents" registry.</t>

<t><strong><spanx style="verb">request</spanx></strong>: Base64url-encoded <xref target="RFC4648"/> JSON <xref target="RFC8259"/> containing
  payment-method-specific data needed to complete payment. Structure is
  defined by the payment method specification. Padding characters ("=")
  <bcp14>MUST NOT</bcp14> be included. The JSON <bcp14>MUST</bcp14> be serialized using JSON
  Canonicalization Scheme (JCS) <xref target="RFC8785"/> to ensure deterministic
  encoding across implementations. This is critical for challenge binding
  (<xref target="challenge-binding"/>): since the HMAC input includes the base64url-encoded
  request as it appears on the wire, different JSON serialization orders
  would produce different HMAC values, breaking cross-implementation
  interoperability.</t>

</section>
<section anchor="optional-parameters"><name>Optional Parameters</name>

<t><strong><spanx style="verb">digest</spanx></strong>: Content digest of the request body, formatted per <xref target="RFC9530"></xref>.
  Servers <bcp14>SHOULD</bcp14> include this parameter when the payment challenge applies
  to a request with a body (e.g., POST, PUT, PATCH). When present, clients
  <bcp14>MUST</bcp14> submit the credential with a request body whose digest matches this
  value. See Section 5.1.3 for body binding requirements.</t>

<t><strong><spanx style="verb">expires</spanx></strong>: Timestamp indicating when this challenge expires, formatted
  as an <xref target="RFC3339"/> date-time string (e.g., <spanx style="verb">"2025-01-15T12:00:00Z"</spanx>).
  Servers <bcp14>SHOULD</bcp14> include this parameter. Clients <bcp14>MUST NOT</bcp14> submit
  credentials for expired challenges.</t>

<t><strong><spanx style="verb">description</spanx></strong>: Human-readable description of the resource or payment
  purpose. This parameter is for display purposes only and <bcp14>MUST NOT</bcp14> be
  relied upon for payment verification (see <xref target="amount-verification"/>).</t>

<t><strong><spanx style="verb">opaque</spanx></strong>: Base64url-encoded <xref target="RFC4648"/> JSON <xref target="RFC8259"/> containing
  server-defined correlation data (e.g., a payment processor intent
  identifier). The value <bcp14>MUST</bcp14> be a JSON object whose values are strings
  (a flat string-to-string map). Clients <bcp14>MUST</bcp14> return this parameter
  unchanged in the credential and <bcp14>MUST NOT</bcp14> modify it. The JSON <bcp14>MUST</bcp14> be
  serialized using JSON Canonicalization Scheme (JCS) <xref target="RFC8785"/> before
  base64url encoding. Servers <bcp14>SHOULD</bcp14> include <spanx style="verb">opaque</spanx> in the challenge
  binding (<xref target="challenge-binding"/>) to ensure tamper protection.</t>

<t>Unknown parameters <bcp14>MUST</bcp14> be ignored by clients.</t>

<section anchor="challenge-binding"><name>Challenge Binding</name>

<t>Servers <bcp14>SHOULD</bcp14> bind the challenge <spanx style="verb">id</spanx> to the challenge parameters (Section 5.1.1 and Section 5.1.2) to prevent request integrity attacks where a client could
sign or submit a payment different from what the server intended. Servers
<bcp14>MUST</bcp14> verify that credentials present an <spanx style="verb">id</spanx> matching the expected binding.</t>

<t>The binding mechanism is implementation-defined. Servers <bcp14>MAY</bcp14> use stateful
storage (e.g., database lookup) or stateless verification (e.g., HMAC,
authenticated encryption) to validate the binding.</t>

<section anchor="recommended-hmac-sha256-binding"><name>Recommended: HMAC-SHA256 Binding</name>

<t>Servers using HMAC-SHA256 for stateless challenge binding <bcp14>SHOULD</bcp14> compute
the challenge <spanx style="verb">id</spanx> as follows:</t>

<t>The HMAC input is constructed from exactly seven fixed positional
slots. Required fields supply their string value; optional fields use
an empty string (<spanx style="verb">""</spanx>) when absent. The slots are:</t>

<texttable>
      <ttcol align='left'>Slot</ttcol>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c>0</c>
      <c><spanx style="verb">realm</spanx></c>
      <c>Required. String value.</c>
      <c>1</c>
      <c><spanx style="verb">method</spanx></c>
      <c>Required. String value.</c>
      <c>2</c>
      <c><spanx style="verb">intent</spanx></c>
      <c>Required. String value.</c>
      <c>3</c>
      <c><spanx style="verb">request</spanx></c>
      <c>Required. JCS-serialized per <xref target="RFC8785"/>, then base64url-encoded.</c>
      <c>4</c>
      <c><spanx style="verb">expires</spanx></c>
      <c>Optional. String value if present; empty string if absent.</c>
      <c>5</c>
      <c><spanx style="verb">digest</spanx></c>
      <c>Optional. String value if present; empty string if absent.</c>
      <c>6</c>
      <c><spanx style="verb">opaque</spanx></c>
      <c>Optional. JCS-serialized per <xref target="RFC8785"/>, then base64url-encoded if present; empty string if absent.</c>
</texttable>

<t>The computation proceeds as follows:</t>

<t><list style="numbers" type="1">
  <t>Populate all seven slots as described above.</t>
  <t>Join all seven slots with the pipe character (<spanx style="verb">|</spanx>) as delimiter.
Every slot is always present in the joined string; absent optional
fields appear as empty segments (e.g., <spanx style="verb">...|expires||opaque_b64url</spanx>
when <spanx style="verb">digest</spanx> is absent).</t>
  <t>Compute HMAC-SHA256 over the resulting string using a server secret.</t>
  <t>Encode the HMAC output as base64url without padding (<xref target="RFC4648"/>
Section 5).</t>
</list></t>

<figure><artwork><![CDATA[
input = "|".join([
    realm,
    method,
    intent,
    request_b64url,
    expires or "",
    digest or "",
    opaque_b64url or "",
])
id = base64url(HMAC-SHA256(server_secret, input))
]]></artwork></figure>

<t>Optional fields use fixed positional slots with empty strings when
absent, rather than being omitted. This avoids ambiguity between
combinations of optional fields — for example, <spanx style="verb">(expires set, no
digest)</spanx> and <spanx style="verb">(no expires, digest set)</spanx> produce distinct inputs — and
ensures that adding a new optional slot in a future revision does not
change the HMAC for challenges that omit it.</t>

</section>
</section>
<section anchor="example-challenge"><name>Example Challenge</name>

<figure><sourcecode type="http"><![CDATA[
HTTP/1.1 402 Payment Required
Cache-Control: no-store
WWW-Authenticate: Payment id="x7Tg2pLqR9mKvNwY3hBcZa",
    realm="api.example.com",
    method="example",
    intent="charge",
    expires="2025-01-15T12:05:00Z",
    request="eyJhbW91bnQiOiIxMDAwIiwiY3VycmVuY3kiOiJVU0QiLCJyZWNpcGllbnQiOiJhY2N0XzEyMyJ9"
]]></sourcecode></figure>

<t>Decoded <spanx style="verb">request</spanx> example:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "amount": "1000",
  "currency": "usd",
  "recipient": "acct_123"
}
]]></sourcecode></figure>

</section>
</section>
<section anchor="request-body-digest-binding"><name>Request Body Digest Binding</name>

<t>Servers <bcp14>SHOULD</bcp14> include the <spanx style="verb">digest</spanx> parameter when issuing challenges for
requests with bodies. The digest value is computed per <xref target="RFC9530"></xref>:</t>

<figure><sourcecode type="http"><![CDATA[
WWW-Authenticate: Payment id="...",
    realm="api.example.com",
    method="example",
    intent="charge",
    digest="sha-256=:X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=:",
    expires="2025-01-15T12:05:00Z",
    request="..."
]]></sourcecode></figure>

<t>When verifying a credential with a <spanx style="verb">digest</spanx> parameter, servers <bcp14>MUST</bcp14>:</t>

<t><list style="numbers" type="1">
  <t>Compute the digest of the current request body per <xref target="RFC9530"></xref></t>
  <t>Compare it with the <spanx style="verb">digest</spanx> value from the challenge</t>
  <t>Reject the credential if the digests do not match</t>
</list></t>

</section>
</section>
<section anchor="credentials-authorization"><name>Credentials (Authorization)</name>

<t>The Payment credential is sent in the <spanx style="verb">Authorization</spanx> header using
base64url encoding without padding per <xref target="RFC4648"/> Section 5:</t>

<figure><sourcecode type="abnf"><![CDATA[
credentials     = "Payment" 1*SP base64url-nopad
base64url-nopad = 1*( ALPHA / DIGIT / "-" / "_" )
]]></sourcecode></figure>

<t>The base64url-nopad value is a base64url-encoded JSON object (without padding)
containing:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c><spanx style="verb">challenge</spanx></c>
      <c>object</c>
      <c>Yes</c>
      <c>Echoed challenge parameters</c>
      <c><spanx style="verb">source</spanx></c>
      <c>string</c>
      <c>No</c>
      <c>Payer identifier (<bcp14>RECOMMENDED</bcp14>: DID format per <xref target="W3C-DID"></xref>)</c>
      <c><spanx style="verb">payload</spanx></c>
      <c>object</c>
      <c>Yes</c>
      <c>Method-specific payment proof</c>
</texttable>

<t>The <spanx style="verb">challenge</spanx> object contains the parameters from the original challenge:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c><spanx style="verb">id</spanx></c>
      <c>string</c>
      <c>Challenge identifier</c>
      <c><spanx style="verb">realm</spanx></c>
      <c>string</c>
      <c>Protection space</c>
      <c><spanx style="verb">method</spanx></c>
      <c>string</c>
      <c>Payment method identifier</c>
      <c><spanx style="verb">intent</spanx></c>
      <c>string</c>
      <c>Payment intent type</c>
      <c><spanx style="verb">request</spanx></c>
      <c>string</c>
      <c>Base64url-encoded payment request</c>
      <c><spanx style="verb">description</spanx></c>
      <c>string</c>
      <c>Human-readable payment purpose (if present in challenge)</c>
      <c><spanx style="verb">opaque</spanx></c>
      <c>string</c>
      <c>Base64url-encoded server correlation data (if present in challenge)</c>
      <c><spanx style="verb">digest</spanx></c>
      <c>string</c>
      <c>Content digest</c>
      <c><spanx style="verb">expires</spanx></c>
      <c>string</c>
      <c>Challenge expiration timestamp</c>
</texttable>

<t>The <spanx style="verb">payload</spanx> field contains the payment-method-specific data needed to
complete the payment challenge. Payment method specifications define the
exact structure.</t>

<section anchor="example-credential"><name>Example Credential</name>

<figure><sourcecode type="http"><![CDATA[
GET /api/data HTTP/1.1
Host: api.example.com
Authorization: Payment eyJjaGFsbGVuZ2UiOnsiaWQiOiJ4N1RnMnBMcVI5bUt2TndZM2hCY1phIiwicmVhbG0iOiJhcGkuZXhhbXBsZS5jb20iLCJtZXRob2QiOiJleGFtcGxlIiwiaW50ZW50IjoiY2hhcmdlIiwicmVxdWVzdCI6ImV5SmhiVzkxYm5RaU9pSXhNREF3SWl3aVkzVnljbVZ1WTNraU9pSlZVMFFpTENKeVpXTnBjR2xsYm5RaU9pSmhZMk4wWHpFeU15SjkiLCJleHBpcmVzIjoiMjAyNS0wMS0xNVQxMjowNTowMFoifSwicGF5bG9hZCI6eyJwcm9vZiI6IjB4YWJjMTIzLi4uIn19
]]></sourcecode></figure>

<t>Decoded credential:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "challenge": {
    "id": "x7Tg2pLqR9mKvNwY3hBcZa",
    "realm": "api.example.com",
    "method": "example",
    "intent": "charge",
    "request": "eyJhbW91bnQiOiIxMDAwIiwiY3VycmVuY3kiOiJVU0QiLCJyZWNpcGllbnQiOiJhY2N0XzEyMyJ9",
    "expires": "2025-01-15T12:05:00Z"
  },
  "payload": {
    "proof": "0xabc123..."
  }
}
]]></sourcecode></figure>

</section>
</section>
<section anchor="payment-receipt-header"><name>Payment-Receipt Header</name>

<t>Servers <bcp14>SHOULD</bcp14> include a <spanx style="verb">Payment-Receipt</spanx> header on successful responses:</t>

<figure><sourcecode type="abnf"><![CDATA[
Payment-Receipt = base64url-nopad
]]></sourcecode></figure>

<t>The decoded JSON object contains:</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c><spanx style="verb">status</spanx></c>
      <c>string</c>
      <c><spanx style="verb">"success"</spanx> — receipts are only issued on successful payment</c>
      <c><spanx style="verb">method</spanx></c>
      <c>string</c>
      <c>Payment method used</c>
      <c><spanx style="verb">timestamp</spanx></c>
      <c>string</c>
      <c><xref target="RFC3339"/> settlement timestamp</c>
      <c><spanx style="verb">reference</spanx></c>
      <c>string</c>
      <c>Method-specific reference (tx hash, invoice id, etc.)</c>
</texttable>

<t>Payment method specifications <bcp14>MAY</bcp14> define additional fields for receipts.</t>

<section anchor="receipt-status-semantics"><name>Receipt Status Semantics</name>

<t>The <spanx style="verb">status</spanx> field <bcp14>MUST</bcp14> be <spanx style="verb">"success"</spanx>, indicating the payment was
verified and settled successfully. Receipts are only issued on
successful payment responses (2xx status codes).</t>

<t>Servers <bcp14>MUST NOT</bcp14> return a <spanx style="verb">Payment-Receipt</spanx> header on error responses.
Payment failures are communicated via HTTP status codes and Problem
Details <xref target="RFC9457"/>. Servers <bcp14>MUST</bcp14> return 402 with a fresh challenge
and appropriate problem type when payment verification fails.</t>

</section>
</section>
</section>
<section anchor="payment-methods"><name>Payment Methods</name>

<section anchor="method-identifier-format"><name>Method Identifier Format</name>

<t>Payment methods are identified by lowercase ASCII letters:</t>

<figure><sourcecode type="abnf"><![CDATA[
payment-method-id = 1*LOWERALPHA
]]></sourcecode></figure>

<t>Method identifiers are case-sensitive and <bcp14>MUST</bcp14> be lowercase.</t>

</section>
<section anchor="method-registry"><name>Method Registry</name>

<t>Payment methods are registered in the HTTP Payment Methods registry
(<xref target="payment-method-registry"/>). Each registered method has an associated specification
that defines the <spanx style="verb">request</spanx> and <spanx style="verb">payload</spanx> schemas.</t>

</section>
</section>
<section anchor="payment-intents"><name>Payment Intents</name>

<t>Payment intents describe the type of payment being requested.</t>

<section anchor="intent-identifiers"><name>Intent Identifiers</name>

<figure><sourcecode type="abnf"><![CDATA[
intent = 1*( ALPHA / DIGIT / "-" )
]]></sourcecode></figure>

</section>
<section anchor="intent-specifications"><name>Intent Specifications</name>

<t>Payment intents are defined in separate intent specifications that:</t>

<t><list style="symbols">
  <t>Define the semantic meaning of the intent</t>
  <t>Specify required and optional <spanx style="verb">request</spanx> fields</t>
  <t>Specify <spanx style="verb">payload</spanx> requirements</t>
  <t>Define verification and settlement semantics</t>
  <t>Register the intent in the Payment Intent Registry (<xref target="payment-intent-registry"/>)</t>
</list></t>

<t>See the Payment Intent Registry for registered intents.</t>

</section>
<section anchor="intent-negotiation"><name>Intent Negotiation</name>

<t>If a server supports multiple intents, it <bcp14>MAY</bcp14> issue multiple challenges:</t>

<figure><sourcecode type="http"><![CDATA[
WWW-Authenticate: Payment id="abc", realm="api.example.com", method="example", intent="charge", request="..."
WWW-Authenticate: Payment id="def", realm="api.example.com", method="example", intent="authorize", request="..."
]]></sourcecode></figure>

<t>Clients choose which challenge to respond to. Clients that do not
recognize an intent <bcp14>SHOULD</bcp14> treat the challenge as unsupported.</t>

</section>
</section>
<section anchor="error-handling"><name>Error Handling</name>

<section anchor="error-response-format"><name>Error Response Format</name>

<t>Servers <bcp14>SHOULD</bcp14> return Problem Details <xref target="RFC9457"/> error bodies with 402
responses:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "type": "https://paymentauth.org/problems/payment-required",
  "title": "Payment Required",
  "status": 402,
  "detail": "Human-readable description"
}
]]></sourcecode></figure>

<t>The <spanx style="verb">type</spanx> URI <bcp14>SHOULD</bcp14> correspond to one of the problem types defined
below, and the canonical base URI for problem types is
<spanx style="verb">https://paymentauth.org/problems/</spanx>.</t>

</section>
<section anchor="error-codes"><name>Error Codes</name>

<texttable>
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>HTTP</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c><spanx style="verb">payment-required</spanx></c>
      <c>402</c>
      <c>Resource requires payment</c>
      <c><spanx style="verb">payment-insufficient</spanx></c>
      <c>402</c>
      <c>Amount too low</c>
      <c><spanx style="verb">payment-expired</spanx></c>
      <c>402</c>
      <c>Challenge or authorization expired</c>
      <c><spanx style="verb">verification-failed</spanx></c>
      <c>402</c>
      <c>Proof invalid</c>
      <c><spanx style="verb">method-unsupported</spanx></c>
      <c>400</c>
      <c>Method not accepted</c>
      <c><spanx style="verb">malformed-credential</spanx></c>
      <c>402</c>
      <c>Invalid credential format</c>
      <c><spanx style="verb">invalid-challenge</spanx></c>
      <c>402</c>
      <c>Challenge ID unknown, expired, or already used</c>
</texttable>

</section>
<section anchor="retry-behavior"><name>Retry Behavior</name>

<t>Servers <bcp14>SHOULD</bcp14> use the <spanx style="verb">Retry-After</spanx> HTTP header <xref target="RFC9110"/> to indicate
when clients may retry:</t>

<figure><sourcecode type="http"><![CDATA[
HTTP/1.1 402 Payment Required
Retry-After: 60
WWW-Authenticate: Payment ...
]]></sourcecode></figure>

</section>
</section>
<section anchor="extensibility"><name>Extensibility</name>

<section anchor="payment-method-specifications"><name>Payment Method Specifications</name>

<t>Payment method specifications <bcp14>MUST</bcp14> define:</t>

<t><list style="numbers" type="1">
  <t><strong>Method Identifier</strong>: Unique lowercase string</t>
  <t><strong>Request Schema</strong>: JSON structure for the <spanx style="verb">request</spanx> parameter</t>
  <t><strong>Payload Schema</strong>: JSON structure for credential payloads</t>
  <t><strong>Verification Procedure</strong>: How servers validate proofs</t>
  <t><strong>Settlement Procedure</strong>: How payment is finalized</t>
  <t><strong>Security Considerations</strong>: Method-specific threats and mitigations</t>
</list></t>

</section>
<section anchor="versioning"><name>Versioning</name>

<t>The Payment scheme uses a layered versioning strategy:</t>

<section anchor="core-protocol"><name>Core Protocol</name>

<t>The <spanx style="verb">Payment</spanx> scheme name is the stable identifier. The core protocol
does NOT carry a version on the wire, consistent with all deployed HTTP
authentication schemes (<spanx style="verb">Basic</spanx>, <spanx style="verb">Bearer</spanx>, <spanx style="verb">Digest</spanx>). Evolution happens
through adding optional parameters and fields; implementations <bcp14>MUST</bcp14>
ignore unknown parameters and fields. If a future change is truly
incompatible, a new scheme name (e.g., <spanx style="verb">Payment2</spanx>) would be registered.</t>

</section>
<section anchor="versioning-payment-methods"><name>Payment Methods</name>

<t>Payment method specifications <bcp14>MAY</bcp14> include a <spanx style="verb">version</spanx> field in their
<spanx style="verb">methodDetails</spanx>. The absence of a <spanx style="verb">version</spanx> field is implicitly
version 1. When a breaking change is needed, the method specification
adds a <spanx style="verb">version</spanx> field starting at <spanx style="verb">2</spanx>. Compatible changes (adding
optional fields, defining defaults) do not require a version change.
Methods <bcp14>MAY</bcp14> also register a new identifier for changes fundamental
enough to warrant a distinct name.</t>

</section>
<section anchor="versioning-payment-intents"><name>Payment Intents</name>

<t>Payment intents do not carry a version. They evolve through the same
compatibility rules as the core: adding optional fields with defined
defaults is compatible, and breaking changes require a new intent
identifier (e.g., <spanx style="verb">charge-v2</spanx>).</t>

</section>
</section>
<section anchor="custom-parameters"><name>Custom Parameters</name>

<t>Implementations <bcp14>MAY</bcp14> define additional parameters in challenges:</t>

<t><list style="symbols">
  <t>Parameters <bcp14>MUST</bcp14> use lowercase names</t>
  <t>Unknown parameters <bcp14>MUST</bcp14> be ignored by clients</t>
</list></t>

</section>
<section anchor="size-considerations"><name>Size Considerations</name>

<t>Servers <bcp14>SHOULD</bcp14> keep challenges under 8KB. Clients <bcp14>MUST</bcp14> be able to handle
challenges of at least 4KB. Servers <bcp14>MUST</bcp14> be able to handle credentials
of at least 4KB.</t>

</section>
</section>
<section anchor="internationalization-considerations"><name>Internationalization Considerations</name>

<section anchor="character-encoding"><name>Character Encoding</name>

<t>All string values use UTF-8 encoding <xref target="RFC3629"/>:</t>

<t><list style="symbols">
  <t>The <spanx style="verb">request</spanx> and credential payloads are JSON <xref target="RFC8259"/></t>
  <t>Payment method identifiers are restricted to ASCII lowercase</t>
  <t>The <spanx style="verb">realm</spanx> parameter <bcp14>SHOULD</bcp14> use ASCII-only values per <xref target="RFC9110"/></t>
</list></t>

</section>
<section anchor="human-readable-text"><name>Human-Readable Text</name>

<t>The <spanx style="verb">description</spanx> parameter may contain localized text. Servers <bcp14>SHOULD</bcp14>
use the <spanx style="verb">Accept-Language</spanx> request header <xref target="RFC9110"/> to determine the
appropriate language.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="threat-model"><name>Threat Model</name>

<t>This specification assumes:</t>

<t><list style="symbols">
  <t>Attackers can observe all network traffic</t>
  <t>Attackers can inject, modify, or replay messages</t>
  <t>Attackers may control malicious servers or clients</t>
</list></t>

</section>
<section anchor="transport-security"><name>Transport Security</name>

<t>This specification REQUIRES TLS 1.2 <xref target="RFC5246"/> or later for all Payment
authentication flows. TLS 1.3 <xref target="RFC8446"/> is <bcp14>RECOMMENDED</bcp14>.</t>

<t>Implementations <bcp14>MUST</bcp14> use TLS when transmitting Payment challenges and
credentials. Payment credentials contain sensitive authorization data
that could result in financial loss if intercepted.</t>

<t>Servers <bcp14>MUST NOT</bcp14> issue Payment challenges over unencrypted HTTP. Clients
<bcp14>MUST NOT</bcp14> send Payment credentials over unencrypted HTTP. Implementations
<bcp14>SHOULD</bcp14> reject Payment protocol messages received over non-TLS connections.</t>

<section anchor="credential-handling"><name>Credential Handling</name>

<t>Payment credentials are bearer tokens that authorize financial transactions.
Servers and intermediaries <bcp14>MUST NOT</bcp14> log Payment credentials or include them
in error messages, debugging output, or analytics. Credential exposure could
enable replay attacks or unauthorized payments.</t>

<t>Implementations <bcp14>MUST</bcp14> treat Payment credentials with the same care as
authentication passwords or session tokens. Credentials <bcp14>SHOULD</bcp14> be stored
only in memory and cleared after use.</t>

</section>
</section>
<section anchor="replay-protection"><name>Replay Protection</name>

<t>Payment methods used with this specification <bcp14>MUST</bcp14> provide single-use
proof semantics. A payment proof <bcp14>MUST</bcp14> be usable exactly once; subsequent
attempts to use the same proof <bcp14>MUST</bcp14> be rejected by the payment method
infrastructure.</t>

</section>
<section anchor="idempotency-and-side-effects"><name>Idempotency and Side Effects</name>

<t>Servers <bcp14>MUST NOT</bcp14> perform side effects (database writes, external API
calls, resource creation) for requests that have not been paid. The
unpaid request that triggers a 402 challenge <bcp14>MUST NOT</bcp14> modify server
state beyond recording the challenge itself.</t>

<t>For non-idempotent methods (POST, PUT, DELETE), servers <bcp14>SHOULD</bcp14> accept
an <spanx style="verb">Idempotency-Key</spanx> header to enable safe client retries. When a client
retries a request with the same <spanx style="verb">Idempotency-Key</spanx> and a valid Payment
credential, the server <bcp14>SHOULD</bcp14> return the same response as the original
successful request without re-executing the operation.</t>

</section>
<section anchor="concurrent-request-handling"><name>Concurrent Request Handling</name>

<t>Servers <bcp14>MUST</bcp14> ensure that concurrent requests with the same Payment
credential result in at most one successful payment settlement and one
resource delivery. Race conditions between parallel requests could
otherwise cause double-payment or double-delivery.</t>

<t>Implementations <bcp14>SHOULD</bcp14> use atomic operations or distributed locks when
verifying and consuming Payment credentials. The credential verification
and resource delivery <bcp14>SHOULD</bcp14> be performed as an atomic operation where
possible.</t>

</section>
<section anchor="amount-verification"><name>Amount Verification</name>

<t>Clients <bcp14>MUST</bcp14> verify before authorizing payment:</t>

<t><list style="numbers" type="1">
  <t>Requested amount is reasonable for the resource</t>
  <t>Recipient/address is expected</t>
  <t>Currency/asset is as expected</t>
  <t>Validity window is appropriate</t>
</list></t>

<t>Clients <bcp14>MUST NOT</bcp14> rely on the <spanx style="verb">description</spanx> parameter for payment
verification. Malicious servers could provide a misleading description
while the actual <spanx style="verb">request</spanx> payload requests a different amount.</t>

</section>
<section anchor="privacy"><name>Privacy</name>

<t><list style="symbols">
  <t>Servers <bcp14>MUST NOT</bcp14> require user accounts for payment.</t>
  <t>Payment methods <bcp14>SHOULD</bcp14> support pseudonymous options where possible.</t>
  <t>Servers <bcp14>SHOULD NOT</bcp14> log Payment credentials in plaintext</t>
</list></t>

</section>
<section anchor="credential-storage"><name>Credential Storage</name>

<t>Implementations <bcp14>MUST</bcp14> treat <spanx style="verb">Authorization: Payment</spanx> headers and
<spanx style="verb">Payment-Receipt</spanx> headers as sensitive data.</t>

</section>
<section anchor="intermediary-handling-of-402"><name>Intermediary Handling of 402</name>

<t>HTTP intermediaries (proxies, caches, CDNs) may not recognize 402 as an
authentication challenge in the same way they handle 401. While this
specification uses <spanx style="verb">WWW-Authenticate</spanx> headers with 402 responses following
the same syntax as <xref target="RFC9110"/>, intermediaries that perform special
processing for 401 (such as stripping credentials or triggering
authentication prompts) may not apply the same behavior to 402.</t>

<t>Servers <bcp14>SHOULD NOT</bcp14> rely on intermediary-specific handling of 402 responses.
Clients <bcp14>MUST</bcp14> be prepared to receive 402 responses through any intermediary.</t>

</section>
<section anchor="caching"><name>Caching</name>

<t>Payment challenges contain unique identifiers and time-sensitive payment
data that <bcp14>MUST NOT</bcp14> be cached or reused. To prevent challenge replay and
stale payment information:</t>

<t>Servers <bcp14>MUST</bcp14> send <spanx style="verb">Cache-Control: no-store</spanx> <xref target="RFC9111"/> with 402 responses; this ensures no shared cache reuse.</t>

<t>Responses containing <spanx style="verb">Payment-Receipt</spanx> headers <bcp14>MUST</bcp14> include
<spanx style="verb">Cache-Control: private</spanx> to prevent shared caches from storing
payment receipts.</t>

</section>
<section anchor="cross-origin-considerations"><name>Cross-Origin Considerations</name>

<t>Clients (particularly browser-based wallets) <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Clearly display the origin requesting payment</t>
  <t>Require explicit user confirmation before authorizing payments</t>
  <t>Not automatically respond to Payment challenges</t>
</list></t>

</section>
<section anchor="denial-of-service"><name>Denial of Service</name>

<t>Servers <bcp14>SHOULD</bcp14> implement rate limiting on challenges issued and
credential verification attempts.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="authentication-scheme-registration"><name>Authentication Scheme Registration</name>

<t>This document registers the "Payment" authentication scheme in the
"Hypertext Transfer Protocol (HTTP) Authentication Scheme Registry"
established by <xref target="RFC9110"/>:</t>

<t><list style="symbols">
  <t><strong>Authentication Scheme Name</strong>: Payment</t>
  <t><strong>Reference</strong>: This document, <xref target="the-payment-authentication-scheme"/></t>
  <t><strong>Notes</strong>: Used with HTTP 402 status code for proof-of-payment flows</t>
</list></t>

</section>
<section anchor="header-field-registration"><name>Header Field Registration</name>

<t>This document registers the following header fields:</t>

<texttable>
      <ttcol align='left'>Field Name</ttcol>
      <ttcol align='left'>Status</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>Payment-Receipt</c>
      <c>permanent</c>
      <c>This document, <xref target="payment-receipt-header"/></c>
</texttable>

</section>
<section anchor="payment-method-registry"><name>Payment Method Registry</name>

<t>This document establishes the "HTTP Payment Methods" registry. This
registry uses the "Specification Required" policy defined in <xref target="RFC8126"/>.</t>

<t>Registration requests must include:</t>

<t><list style="symbols">
  <t><strong>Method Identifier</strong>: Unique lowercase ASCII letters (<spanx style="verb">a-z</spanx>)</t>
  <t><strong>Description</strong>: Brief payment-method description</t>
  <t><strong>Specification pointer</strong>: Reference to the specification document</t>
  <t><strong>Registrant Contact</strong>: Contact information for the registrant</t>
</list></t>

</section>
<section anchor="payment-intent-registry"><name>Payment Intent Registry</name>

<t>This document establishes the "HTTP Payment Intents" registry. This
registry uses the "Specification Required" policy defined in <xref target="RFC8126"/>.</t>

<t>Registration requests must include:</t>

<t><list style="symbols">
  <t><strong>Intent Identifier</strong>: Unique lowercase ASCII string</t>
  <t><strong>Description</strong>: Brief description of the intent semantics</t>
  <t><strong>Specification pointer</strong>: Reference to the specification document</t>
  <t><strong>Registrant Contact</strong>: Contact information for the registrant</t>
</list></t>

<t>The registry is initially empty. Intent specifications register their
identifiers upon publication.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC3339;
&RFC3629;
&RFC4648;
&RFC5234;
&RFC5246;
&RFC8126;
&RFC8174;
&RFC8259;
&RFC8446;
&RFC8785;
&RFC9110;
&RFC9111;
&RFC9457;
&RFC9530;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="W3C-DID" target="https://www.w3.org/TR/did-core/">
  <front>
    <title>Decentralized Identifiers (DIDs) v1.0</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="W3C-PMI" target="https://www.w3.org/TR/payment-method-id/">
  <front>
    <title>Payment Method Identifiers</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

</references>


<?line 857?>

<section anchor="abnf-collected"><name>ABNF Collected</name>

<figure><sourcecode type="abnf"><![CDATA[
; HTTP Authentication Challenge (following RFC 7235 Section 2.1)
payment-challenge = "Payment" [ 1*SP auth-params ]
auth-params       = auth-param *( OWS "," OWS auth-param )
auth-param        = token BWS "=" BWS ( token / quoted-string )

; Required parameters: id, realm, method, intent, request
; Optional parameters: expires, digest, description, opaque

; HTTP Authorization Credentials
payment-credentials = "Payment" 1*SP base64url-nopad

; Payment-Receipt header field value
Payment-Receipt = base64url-nopad

; Base64url encoding without padding per RFC 4648 Section 5
base64url-nopad = 1*( ALPHA / DIGIT / "-" / "_" )

; Payment method identifier (lowercase only)
payment-method-id   = 1*LOWERALPHA
LOWERALPHA          = %x61-7A  ; a-z

; Payment intent
intent-token = 1*( ALPHA / DIGIT / "-" )
]]></sourcecode></figure>

</section>
<section anchor="examples"><name>Examples</name>

<section anchor="one-time-charge"><name>One-Time Charge</name>

<t>A client requests a resource, receives a payment challenge, fulfills
the payment, and receives the resource with a receipt.</t>

<figure><artwork><![CDATA[
Client                                 Server
   │                                      │
   │  (1) GET /resource                   │
   ├─────────────────────────────────────>│
   │                                      │
   │  (2) 402 Payment Required            │
   │      WWW-Authenticate: Payment ...   │
   │<─────────────────────────────────────┤
   │                                      │
   │  (3) Fulfill payment challenge       │
   │      (method-specific)               │
   │                                      │
   │  (4) GET /resource                   │
   │      Authorization: Payment ...      │
   ├─────────────────────────────────────>│
   │                                      │
   │  (5) 200 OK                          │
   │      Payment-Receipt: ...            │
   │<─────────────────────────────────────┤
   │                                      │
]]></artwork></figure>

<t><strong>Challenge:</strong></t>

<figure><sourcecode type="http"><![CDATA[
HTTP/1.1 402 Payment Required
Cache-Control: no-store
Content-Type: application/problem+json
WWW-Authenticate: Payment id="qB3wErTyU7iOpAsD9fGhJk",
    realm="api.example.com",
    method="invoice",
    intent="charge",
    expires="2025-01-15T12:05:00Z",
    request="eyJhbW91bnQiOiIxMDAwIiwiY3VycmVuY3kiOiJVU0QiLCJpbnZvaWNlIjoiaW52XzEyMzQ1In0"

{
  "type": "https://paymentauth.org/problems/payment-required",
  "title": "Payment Required",
  "status": 402,
  "detail": "Payment required for access.",
  "challengeId": "qB3wErTyU7iOpAsD9fGhJk"
}
]]></sourcecode></figure>

<t>Decoded <spanx style="verb">request</spanx>:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "amount": "1000",
  "currency": "usd",
  "invoice": "inv_12345"
}
]]></sourcecode></figure>

<t><strong>Credential:</strong></t>

<figure><sourcecode type="http"><![CDATA[
GET /resource HTTP/1.1
Host: api.example.com
Authorization: Payment eyJpZCI6InFCM3dFclR5VTdpT3BBc0Q5ZkdoSmsiLCJwYXlsb2FkIjp7InByZWltYWdlIjoiMHhhYmMxMjMuLi4ifX0
]]></sourcecode></figure>

<t>Decoded credential:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "challenge": {
    "id": "qB3wErTyU7iOpAsD9fGhJk",
    "realm": "api.example.com",
    "method": "invoice",
    "intent": "charge",
    "request": "eyJhbW91bnQiOiIxMDAwIiwiY3VycmVuY3kiOiJVU0QiLCJpbnZvaWNlIjoiaW52XzEyMzQ1In0",
    "expires": "2025-01-15T12:05:00Z"
  },
  "payload": {
    "preimage": "0xabc123..."
  }
}
]]></sourcecode></figure>

<t><strong>Success:</strong></t>

<figure><sourcecode type="http"><![CDATA[
HTTP/1.1 200 OK
Cache-Control: private
Payment-Receipt: eyJzdGF0dXMiOiJzdWNjZXNzIiwibWV0aG9kIjoiaW52b2ljZSIsInRpbWVzdGFtcCI6IjIwMjUtMDEtMTVUMTI6MDA6MDBaIiwicmVmZXJlbmNlIjoiaW52XzEyMzQ1In0
Content-Type: application/json

{"data": "..."}
]]></sourcecode></figure>

</section>
<section anchor="signed-authorization"><name>Signed Authorization</name>

<t>A payment method using cryptographic signatures:</t>

<t><strong>Challenge:</strong></t>

<figure><sourcecode type="http"><![CDATA[
HTTP/1.1 402 Payment Required
Cache-Control: no-store
WWW-Authenticate: Payment id="zL4xCvBnM6kJhGfD8sAaWe",
    realm="api.example.com",
    method="signed",
    intent="charge",
    expires="2025-01-15T12:05:00Z",
    request="eyJhbW91bnQiOiI1MDAwIiwiYXNzZXQiOiJVU0QiLCJyZWNpcGllbnQiOiIweDc0MmQzNUNjNjYzNEMwNTMyOTI1YTNiODQ0QmM5ZTc1OTVmOGZFMDAiLCJub25jZSI6IjB4MTIzNDU2Nzg5MCJ9"
]]></sourcecode></figure>

<t>Decoded <spanx style="verb">request</spanx>:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "amount": "5000",
  "currency": "usd",
  "recipient": "0x742d35Cc6634C0532925a3b844Bc9e7595f8fE00",
  "methodDetails": {
    "nonce": "0x1234567890"
  }
}
]]></sourcecode></figure>

<t><strong>Credential:</strong></t>

<figure><sourcecode type="json"><![CDATA[
{
  "challenge": {
    "id": "zL4xCvBnM6kJhGfD8sAaWe",
    "realm": "api.example.com",
    "method": "signed",
    "intent": "charge",
    "request": "eyJhbW91bnQiOiI1MDAwIiwiYXNzZXQiOiJVU0QiLCJyZWNpcGllbnQiOiIweDc0MmQzNUNjNjYzNEMwNTMyOTI1YTNiODQ0QmM5ZTc1OTVmOGZFMDAiLCJub25jZSI6IjB4MTIzNDU2Nzg5MCJ9",
    "expires": "2025-01-15T12:05:00Z"
  },
  "source": "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK",
  "payload": {
    "signature": "0x1b2c3d4e5f..."
  }
}
]]></sourcecode></figure>

</section>
<section anchor="multiple-payment-options"><name>Multiple Payment Options</name>

<t>Servers <bcp14>MAY</bcp14> return multiple Payment challenges in a single 402 response,
each with a different payment method or configuration:</t>

<figure><sourcecode type="http"><![CDATA[
HTTP/1.1 402 Payment Required
Cache-Control: no-store
WWW-Authenticate: Payment id="pT7yHnKmQ2wErXsZ5vCbNl", realm="api.example.com", method="invoice", intent="charge", request="..."
WWW-Authenticate: Payment id="mF8uJkLpO3qRtYsA6wDcVb", realm="api.example.com", method="signed", intent="charge", request="..."
]]></sourcecode></figure>

<t>When a server returns multiple challenges, clients <bcp14>SHOULD</bcp14> select one
based on their capabilities and user preferences. Clients <bcp14>MUST</bcp14> send
only one <spanx style="verb">Authorization: Payment</spanx> header in the subsequent request,
corresponding to the selected challenge.</t>

<t>Servers receiving multiple Payment credentials in a single request
<bcp14>SHOULD</bcp14> reject with 400 (Bad Request).</t>

</section>
<section anchor="failed-payment-verification"><name>Failed Payment Verification</name>

<figure><sourcecode type="http"><![CDATA[
HTTP/1.1 402 Payment Required
Cache-Control: no-store
Content-Type: application/problem+json
WWW-Authenticate: Payment id="aB1cDeF2gHiJ3kLmN4oPqR", realm="api.example.com", method="invoice", intent="charge", request="..."

{
  "type": "https://paymentauth.org/problems/verification-failed",
  "title": "Payment Verification Failed",
  "status": 402,
  "detail": "Invalid payment proof."
}
]]></sourcecode></figure>

<t>The server returns 402 with a fresh challenge, allowing the client to
retry with a new payment credential.</t>

</section>
</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>TBD</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

