Two significant proposals dropped this week addressing how A2A agents establish trust when communicating across organizational boundaries. As multi-agent systems proliferate, the question of agent identity becomes critical: how does Agent A know Agent B is who it claims to be, and how do we hold agents accountable for their actions?
A2A Protocol v1.0 provides communication primitives but leaves identity largely to implementers. This works within a single organization where you control all agents, but falls apart in federated scenarios:
Proposes using WTRMRK (watermarking) technology as a foundational trust primitive for A2A agent identity verification.
The WTRMRK proposal suggests embedding cryptographic watermarks into agent responses that can be verified by receiving agents. Key concepts:
Agents embed imperceptible signatures in their outputs — not just text, but across modalities including generated images, structured data, and even behavioral patterns:
{
"agent_card": {
"id": "urn:a2a:agent:delta-booking-v2",
"wtrmrk": {
"algorithm": "WTRMRK-v1",
"verification_endpoint": "https://verify.delta.com/.well-known/wtrmrk",
"embedded_signals": ["text", "structured_response", "timing"]
}
}
}
Addresses accountability for first-contact A2A transactions when organizations don't share an Authorization Server.
This proposal focuses less on identity verification and more on creating enforceable accountability trails:
A federated registry where organizations publish:
Every cross-org A2A transaction generates a cryptographically signed receipt:
{
"transaction_id": "txn_abc123",
"initiator": "urn:a2a:agent:my-travel-agent",
"responder": "urn:a2a:agent:delta-booking-v2",
"timestamp": "2026-04-04T15:30:00Z",
"operation": "flight_booking_request",
"result_hash": "sha256:...",
"signatures": {
"initiator_sig": "...",
"responder_sig": "..."
}
}
When issues arise:
| Aspect | WTRMRK (#1712) | Accountability Layer (#1713) |
|---|---|---|
| Focus | Identity verification | Post-transaction accountability |
| Timing | Real-time verification | Asynchronous resolution |
| Infrastructure | Per-org watermarking | Federated registry |
| Trust Model | Cryptographic proof | Reputation-based |
WTRMRK provides real-time identity verification ("this agent is authorized by Delta"). The accountability layer provides recourse when things go wrong ("Delta's agent double-booked me"). A complete trust framework likely needs both.
If either proposal gains traction:
Both proposals are in early discussion. The A2A TSC has not yet scheduled formal review, but the timing — shortly after v1.0 release — suggests identity/trust will be a major focus for v1.1 or a dedicated extension.
For now, implementers building cross-org A2A systems should: