A new Agent Improvement Proposal (AIP) arrives at A2A with potentially significant implications: using Decentralized Identifiers (DIDs) to establish cryptographic agent identity. The proposal builds on the W3C DID specification to give autonomous agents verifiable, self-sovereign identity credentials.
When two autonomous agents communicate, how does each verify the other's identity? Traditional approaches have limitations:
For enterprise multi-agent systems where agents from different organizations collaborate, none of these cleanly solve the "who are you, and who do you work for?" question.
Decentralized Identifiers provide a foundation for self-sovereign identity. A DID looks like:
did:web:agents.example.com:finance-assistant
The proposal extends A2A's agent card with DID-based identity:
{
"name": "Finance Assistant",
"url": "https://agents.example.com/finance",
"identity": {
"did": "did:web:agents.example.com:finance-assistant",
"verificationMethod": "did:web:agents.example.com:finance-assistant#key-1",
"proofFormat": "JsonWebSignature2020"
},
"skills": [...]
}
Why did:web? The proposal recommends the web-based DID method for initial adoption — it maps naturally to existing DNS infrastructure. More exotic methods (did:ion, did:ethr) can be added as extensions.
When Agent A wants to verify Agent B's identity:
This creates cryptographic proof that messages actually come from the claimed agent, without requiring a centralized authority.
The proposal also addresses delegation chains — when Agent C acts on behalf of Agent B, which acts on behalf of Organization A:
{
"delegationChain": [
{
"delegator": "did:web:org-a.com:root",
"delegate": "did:web:org-a.com:dept-finance",
"scope": ["financial-queries", "budget-reports"],
"proof": "eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9..."
},
{
"delegator": "did:web:org-a.com:dept-finance",
"delegate": "did:web:agents.example.com:finance-assistant",
"scope": ["budget-reports"],
"proof": "eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9..."
}
]
}
Each link in the chain is cryptographically signed, creating a verifiable trail from the acting agent back to the authorizing organization.
This AIP builds on previous A2A identity work:
The DID-based approach consolidates these discussions around an existing W3C standard rather than inventing A2A-specific identity primitives.
Several practical challenges the proposal acknowledges:
As agent ecosystems grow beyond single-organization deployments, identity becomes critical. Consider:
DIDs provide a foundation that doesn't require a single identity provider to rule them all. Each organization can issue and manage its own agent identities while still enabling cross-organization verification.
The proposal is in early discussion phase. Key questions for the community:
Watch GitHub issue #1511 for community discussion.