← All Articles
A2A Proposal Security February 18, 2026

A2A Agent Identity and Trust Framework Proposal

A comprehensive proposal addresses the "who are you?" problem for autonomous agents — proposing verification levels, trust signals, and delegation chain security for the Agent-to-Agent Protocol.

About the Contributor

abdelsfane has been an active contributor to the A2A community, previously proposing security-focused enhancements. This proposal builds on the cryptographic identity work from February 13, offering a more comprehensive framework approach.

The Problem

The A2A protocol currently recommends TLS certificate validation and allows optional JWS signatures on AgentCards for agent identity. These mechanisms verify the domain hosting an agent but do not verify the agent itself. In a world where autonomous agents delegate tasks to each other, this gap creates serious security concerns:

These aren't edge cases. As A2A moves past 1.0 and into production deployments, these gaps become blockers for enterprises that need to know which agents they're trusting with sensitive operations.

The Proposal: Three Verification Levels

The proposal introduces a tiered verification system that balances accessibility with security:

Level Verification Use Case
Self-Asserted Agent claims identity via AgentCard Development, testing, low-risk operations
Domain-Verified DNS/TLS proves domain control Standard production deployments
Organization-Verified Third-party attestation of legal entity Enterprise, financial, healthcare

Consuming agents can set minimum verification requirements based on operation sensitivity. A weather lookup might accept self-asserted; a financial transaction might require organization-verified.

Key Components

1. Standardized Trust Signals

Beyond verification levels, the framework proposes standardized signals that agents can use to evaluate each other:

These signals would be communicated via the existing AgentExtension and metadata fields, maintaining backwards compatibility.

2. Mandatory AgentCard Signing

Breaking Change: The proposal recommends mandatory AgentCard signing for production deployments. This would require all production agents to cryptographically sign their AgentCards, enabling verification of card integrity and origin.

Currently, JWS signatures on AgentCards are optional. The proposal argues this should flip: unsigned cards would be acceptable only for development/testing.

3. Revocation Endpoints

When an agent is compromised or decommissioned, there's currently no standardized way to revoke its identity. The proposal adds:

4. Delegation Chain Security

When agents delegate tasks to each other, the proposal introduces:

This is particularly important for enterprise deployments where a company's agent might delegate to third-party specialists but needs to maintain governance.

5. Message Signing

Beyond AgentCard signing, the proposal adds message-level signing for individual A2A requests and responses. This provides:

Comparison with UCP Signing

Interestingly, this proposal lands the same day that UCP's message signing specification merged. The approaches share philosophical similarities:

The key difference: UCP focuses on commerce transactions (agent-to-business), while A2A focuses on agent-to-agent delegation. A complete agentic ecosystem will need both.

Implementation Considerations

The proposal acknowledges several challenges:

The full proposal includes design rationale documents addressing these tradeoffs.

What's Next

The proposal is currently open for community discussion. Key questions being debated:

Related: See also A2A Cryptographic Identity Verification (February 13) and A2A Agent-Mesh Trust Layer (February 7) for earlier identity proposals.