Skip to content
14 · Onboarding · Authorities

Onboarding Authorities

Andi Lamprecht Andi Lamprecht ·· 9 min read· Draft
Lifecycle event. Authorities are the orgs that issue endorsements on Authorization Packages and that perform field verification. This page covers how those orgs are credentialed, how individual field verifiers are credentialed within them, and how one authority federates with another. Substrate model is in Disconnected Operations §2.1.

1. Authority Org Onboarding

Authority orgs onboard the same way operators do — corporate identity, regulatory standing, agreed scope of jurisdiction — and receive an Authority Org Certificate under the Authority Credentialing CA.

Authority TypeExamplesTypical Scope
Civil aviation regulatorFAA Eastern, state aviation officeAirspace authorization within a delegated region
Law enforcementState police, federal LEField verification, incident response
Public safetyFire, EMS, emergency managementField verification during incidents
Airspace managerFederal facility, special-use airspace operatorJurisdiction definition, multi-authority approvals

The org cert is annual. Within the authority, individual users are credentialed separately — see §2.

2. Field Verifier Credentialing

A user inside an authority org with the field-verification permission can perform offline disclosure on a managed device. A field-verification action requires three independent factors at every offline reveal:

FactorPurposeExamples
Person-bound credentialProves who is askingPIV / CAC for federal users; agency SSO + biometric for state and local
Managed device credentialProves what device is askingDevice enrolled in agency MDM, reporting attested OS state
Purpose codeProves whyVerifier picks one option from a short, plain-language list (active incident, safety concern, infrastructure protection); code is logged for after-action review

These are bound together at credential issuance. The person-bound credential is short-lived (typically hours to days of offline validity) and geographically scoped by default. The authority org holds a long-lived org cert; person and device credentials are issued under it and rotate frequently.

3. Field Device Setup

The device is enrolled by the authority org through its MDM (Mobile Device Management) system and registered with ATOMx. Enrollment installs:

  • ATOMx Root public key (trust anchor)
  • Current Manufacturer CA list and revocation snapshots
  • Authority Org Certificate
  • Per-device managed-device certificate
  • Per-person credential template (issued at login)
  • Capsule cache (pre-synced for the jurisdiction)
  • One-tap purpose codes scoped to the user’s role within the authority

Person-bound credentials require live authentication at the start of each shift and re-authentication at policy intervals. The credential carries geographic and time scope; verification outside that scope requires break-glass — see Disconnected Operations §6.5.

4. Slack-Connect Federation

Authorities connect to peer authorities through a Slack-Connect-style federation model rather than schema-level merging. Each authority chooses what to share with each peer:

  • Jurisdiction boundaries (or specific sub-zones)
  • User lists (for cross-agency operations)
  • No-fly geometries
  • Endorsement signing privileges within a peer’s airspace

Cross-agency coordination becomes opt-in selective sharing, not centralized identity federation. See Origins and Decisions §7.2.

5. Form Builder per Authority

Each authority defines its own intake form for flight-authorization requests in its airspace. Fields, validation rules, and required attachments are authority-specific. Versioning of forms across authorities is an open question — see Origins and Decisions §9.

6. Selective NFZ

A no-fly zone may be configured to be invisible to authorized pilots (their map does not show it) while still being enforced for unauthorized aircraft. The geometry exists; disclosure of it is policy-gated. See Origins and Decisions §7.3.

7. Regulatory Anchoring and Inter-Agency Agreements

7.1 What Makes an Org an Authority

Authority status is not self-asserted. An org is admitted as an Authority only on the basis of an explicit regulatory or delegated authority claim, anchored in:

AnchorExamples
Federal aviation statute49 USC; 14 CFR Part 91 / 107 / 108 (FAA)
Federal protection authorityDHS, USSS, DoD installation airspace authorities
State delegation statuteState aviation offices operating under MOA with FAA
Local police-power statuteTribal aviation authorities; municipal emergency-management orgs in delegated zones
Inter-agency agreementJoint operating areas (e.g., NSSE coordination, federal facility ASA delegations)

ATOMx records the citation alongside the Authority Org Certificate so endorsements carry an auditable basis for jurisdiction.

7.2 MOU / IGSA Pattern

ATOMx does not act unilaterally to grant authority status. The standard pattern is:

  1. ATOMx and the candidate authority sign an MOU (federal partner) or IGSA (intergovernmental services agreement, state/local) that establishes:
    • Scope of jurisdiction (geographic + operational)
    • Endorsement signing rights and authority key custody (ATOMx-held, see Authorization Package §4)
    • Field-verification permission grant scope
    • Evidentiary export terms (see §7.4)
    • Incident notification and response commitments
    • Termination and transition clauses
  2. ATOMx provisions the Authority Org Certificate
  3. Authority enrolls administrators, who in turn enroll field verifiers

7.3 Jurisdictional Boundary and Concurrent-Claim Disputes

Overlapping authority is the norm, not the exception (federal + state + local; aviation + protection; etc.). ATOMx does not resolve disputes — it surfaces them. When two authorities have overlapping jurisdiction over a flight:

  • Both must endorse before the Authorization Package issues (the approval invariant — see §7.1 Approval Invariant in Origins)
  • If one approves and the other denies, the package does not issue; the operator sees a denial without naming which authority denied
  • Pre-coordination between authorities (handoff at boundaries, NSSE-style joint operating cells) is supported via the federation model — see §4
  • Disputes over jurisdiction itself are out-of-band; ATOMx does not adjudicate which authority is correct

7.4 Evidentiary Export and Court Discovery

Authority operations against ATOMx may be the subject of court discovery, FOIA, IG inquiries, or after-action reviews. ATOMx supports:

  • Read-only audit console for authority-side review of their own org’s signing events, disclosure events, and field-verifier actions
  • Signed evidentiary export — a portable record of a specific incident or time window, signed by ATOMx, that a court or auditing party can verify independently
  • Chain-of-custody preservation — exports include hash-chain anchors so a recipient can confirm no events were dropped or altered between the live audit ledger and the export
  • Body-cam correlation hooks (where the authority captures body-cam during field verification, the disclosure receipt can carry a body-cam reference for joint correlation)

7.5 Classified-Jurisdiction Handling

Some federal facilities operate in airspace whose existence, geometry, or operations are classified at varying levels. ATOMx supports a classified jurisdiction mode:

PropertyBehavior
Public visibilityJurisdiction geometry is not exposed in any public surface; no-fly enforcement happens via the Selective NFZ mechanism
Operator visibilityOperators receive denial without seeing the jurisdiction; appeals are routed through cleared liaison
Authority-side accessCleared personnel see the jurisdiction; uncleared personnel do not
AuditLogs are partitioned; cleared audit-export channel is separate from standard channel

This requires a deployment posture aligned with the classification level (FedRAMP High, IL5/IL6 cloud, isolated tenancy as appropriate). It is a roadmap capability for the broadest ATOMx deployment; MVP does not include classified-jurisdiction handling.

7.6 Incident Command and Scene-Commander Override

For active incidents (active shooter, wildfire, hazmat, mass-casualty event), the senior on-scene commander may need temporary endorsement-signing authority that they do not normally hold. ATOMx supports an Incident Command override path:

  • Pre-authorized at MOU level for specific authority orgs (typically state/local emergency management)
  • Activated by a named scene commander with second-person witness
  • Limited to the geographic and time scope of the active incident
  • Logged distinctly so post-incident review can examine the override use

8. Cross-References

Implementation Readiness — Open Questions

Each entry below identifies a decision not yet locked. Items marked (ADR) should be formalized as an Architecture Decision Record before implementation begins. Items marked (blocking) must be resolved before the relevant feature can be built.

#QuestionOwnerADR?Blocking?
1MDM platform support matrix. Which MDM platforms (Intune, Jamf, AirWatch/Workspace ONE, Kandji, MaaS360) must we integrate for managed-device attestation, and what attestation surface (compliance API, certificate enrollment, attestation token) is acceptable for each? Authorities will not all standardize on one vendor.Engineering + ProductYes — ADR: Managed-Device Attestation Sources for Field-Verifier DevicesYes
2Purpose-code catalog ownership. Is the purpose-code vocabulary an ATOMx-standard taxonomy (with authority extensions), fully per-authority, or a hybrid (core codes globally defined, authority-local codes namespaced)? Drives schema, audit, and federation behavior.Product + LegalYes — ADR: Purpose-Code Catalog Governance and NamespacingYes
3Slack-Connect federation protocol mechanics. What is actually exchanged across a Slack-Connect-style federation channel — authority-cert metadata only, signed endorsement artifacts, full Authorization Package references, or live disclosure events? Need wire-level spec and trust boundary.EngineeringYes — ADR: Inter-Authority Federation Wire Protocol and Trust SurfaceYes
4Form-builder version management. How are authority-defined form versions tracked, deprecated, migrated, and bound to historical authorizations? Does an in-flight authorization remain on its original form version through completion?Engineering + ProductYes — ADR: Authority Form Versioning, Migration, and Historical BindingNo
5Classified-jurisdiction deployment posture. Do classified jurisdictions run on a partitioned ATOMx instance, a wholly separate air-gapped deployment, or a logical partition with cross-domain guard? Drives certificate-authority topology and disclosure model.Engineering + Legal + External AgencyYes — ADR: Classified-Jurisdiction Deployment TopologyYes
6Incident-command override approval workflow. What is the minimum quorum, time-bound expiry, and post-hoc review process for an incident-command override of normal authority scope? What audit format captures the override decision chain?Product + LegalYes — ADR: Incident-Command Override Quorum and Audit SchemaYes
7Body-cam correlation protocol. How does field-verifier action data correlate to body-worn camera footage (timestamp sync, device-ID binding, evidentiary chain)? Is correlation pushed by ATOMx, pulled by the agency DEMS, or both?Engineering + External AgencyYes — ADR: Body-Cam / Field-Verifier Correlation ChannelNo
8Evidentiary-export schema and signing. What is the canonical export schema (JSON-LD, signed manifest, sealed bundle), which signing cert anchors it, and what is the verification toolchain provided to receiving agencies?Engineering + LegalYes — ADR: Evidentiary Export Format, Signing, and VerificationYes
9MOU / IGSA template content. What baseline legal terms (data handling, jurisdictional scope, revocation, breach notice, term length) belong in the standard MOU/IGSA, and which are authority-negotiable? Drives the onboarding pipeline gating.Legal + ProductNo (legal artifact, not architecture)Yes
10Two-person rule trigger conditions. Which combinations of jurisdiction sensitivity, purpose code, and authorization class require a two-person disclosure? Is the rule a system-enforced policy or an authority-configurable toggle?Product + LegalYes — ADR: Two-Person Disclosure Rule Policy ModelNo
11Audit-export retention period. How long are authority-side audit logs and disclosure records retained, where (ATOMx-side, authority-side, both), and what is the deletion / legal-hold workflow? Different government contracts impose different floors.Legal + EngineeringYes — ADR: Authority Audit Retention and Legal-Hold ModelYes
12Jurisdictional dispute resolution (out-of-band). When two authorities overlap and disagree on a disclosure or endorsement, what is the out-of-band escalation path? Is it documented contractually only, or surfaced in-product as a dispute case?Product + Legal + External AgencyNo (process, not architecture)No
13Role permissions matrix inside an authority org. What are the canonical roles inside an authority (admin, field-verifier, endorser, auditor, observer), and are they fixed by ATOMx or composable per authority? Drives RBAC schema.Product + EngineeringYes — ADR: Authority Org Internal RBAC ModelYes
Last updated on