| Internet-Draft | A2A Trust | May 2026 |
| Trujillo | Expires 21 November 2026 | [Page] |
This document defines a trust model for agent-to-agent (A2A) interactions in multi-agent AI systems. It specifies how agents obtain verifiable identities via CA-signed templates, how spawn chains are cryptographically established and validated, how dynamic policies are governed under a dual-signature model, and how cross-organizational agent interactions are explicitly authorized. The model applies existing PKI primitives (X.509, CRL, CSR) and established identity patterns (OAuth 2.0, On-Behalf-Of) to the problem of agent provenance. This document does not address agent-to-resource access control, human-in-the-loop orchestration, or agent behavior, as those concerns belong to the resource enforcement layer and the orchestration layer respectively.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 2 November 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
Multi-agent AI systems introduce identity and authorization gaps that existing standards do not fully address. When Agent A spawns Agent B, and Agent B calls a resource, no current standard defines how the resource verifies that Agent B was legitimately spawned, that its scope has not been escalated, or that its origin template is trusted.¶
This document proposes a trust model based on:¶
The model reuses proven PKI primitives and applies them to a new surface -- agent identity -- rather than inventing new cryptographic mechanisms.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].¶
Multi-agent orchestration creates identity and authorization gaps:¶
Agent A --> spawns --> Agent B --> calls --> Resource
No current standard (W3C, IETF, or vendor) fully addresses agent provenance in multi-hop chains.¶
Microsoft Entra ID OBO provides user-to-service delegation:¶
User --> Agent A (token A) --> Agent A requests token for Agent B on behalf of user --> Entra validates the chain --> Issues scoped delegated token
Key insight: a trusted third party validates the delegation chain. Agents do not self-assert trust.¶
OBO breaks down for agent-to-agent because agents are ephemeral, agent spawning is dynamic, and no registry exists for agent templates.¶
[RFC8693] defines scope constraint across delegation hops -- downstream tokens MUST be a subset of upstream grants. This document adopts that principle for agent scope inheritance.¶
Agent identity MUST be established using X.509 certificate chains [RFC5280]. This reuses the same trust model used by TLS and existing workload identity systems.¶
Template Author
| defines template (scopes, spawn rules, TTL, owner)
| generates CSR
v
Template Registry CA
| validates template conformance
| signs the template certificate
v
Signed Agent Template (registered)
|
v
Orchestrator spawns agent from signed template
| agent receives certificate derived from template certificate
| CA chain proves provenance
v
Resource validates certificate chain:
- certificate signed by trusted template?
- template signed by CA?
- scope within bounds?
- ALLOW or DENY
Template Registry CA (root of trust)
|
v
Orchestrator Agent Certificate
Subject: orchestrator-v1
Issuer: Template Registry CA
Owner: owner@example.com
OrgID: org-123
KeyUsage: spawn, delegate
AllowedScopes: read:data, write:data
CanSpawn: [reader-template-v1], MaxChildren: 5
PolicyRef: policy-store/orchestrator-v1/current
TTL: 1h
|
v
Child Agent Certificate
Subject: reader-agent-v1
Issuer: orchestrator-v1
CA Chain: orchestrator-v1 -> Template Registry CA
KeyUsage: read only
AllowedScopes: read:data (MUST be subset of parent)
TTL: 15min (SHOULD be shorter than parent)
The following fields MUST be present in every agent template certificate and MUST NOT be modified without full re-certification:¶
| Field | Required | Description |
|---|---|---|
| Subject | REQUIRED | Unique template identifier |
| Issuer | REQUIRED | Template Registry CA |
| Owner | REQUIRED | Verified identity of template owner |
| OrgID | REQUIRED | CA-validated organization identifier |
| KeyUsage | REQUIRED | Permitted operations |
| AllowedScopes | REQUIRED | Maximum scopes this agent may hold |
| CanSpawn | REQUIRED | Whitelist of permitted child templates |
| MaxChildren | REQUIRED | Maximum concurrent child agents |
| ScopeInherit | REQUIRED | Scope inheritance constraint |
| PolicyRef | REQUIRED | Pointer to dynamic policy store |
| TTL | REQUIRED | Maximum agent lifetime |
Dynamic policies MUST be bounded by the static template fields. A dynamic policy MUST NOT grant scopes beyond AllowedScopes. A dynamic policy MUST NOT add spawn targets beyond CanSpawn.¶
Every spawn MUST pass two independent checks. Either check failing MUST result in spawn denial with no fallback.¶
Check 1 -- Static (CanSpawn in certificate): The requested child template MUST appear in the spawning agent's CanSpawn list.¶
Check 2 -- Dynamic (Registry live lookup): The requested child template MUST be currently registered, CA-signed, not self-signed, owned by an authorized party, and not present in the current CRL.¶
Rationale: CanSpawn alone is insufficient because the certificate may be stale and a template may have been revoked since issuance. Registry lookup alone is insufficient because any party could forge a request claiming any template. Both checks MUST pass.¶
1. CanSpawn check -- child template in CanSpawn list?
NO --> DENY, audit log
YES --> continue
2. Registry check -- registered, CA-signed, not revoked?
NO --> DENY, audit log
YES --> continue
3. Scope check -- requested scope subset of parent scopes?
NO --> DENY, audit log
YES --> continue
4. MaxChildren check -- current children < MaxChildren?
NO --> DENY, audit log
YES --> spawn approved
5. Child certificate issued with:
- parent identity embedded (delegation chain)
- scope equal to requested scope (not exceeding parent)
- spawn timestamp and nonce (replay prevention)
- audit log entry written
A child agent's AllowedScopes MUST be a strict subset of the parent agent's AllowedScopes. Scope escalation across agent hops is explicitly prohibited.¶
Example:¶
Parent has: read:data, write:data Child gets: read:data -- valid Child gets: read:data, write:data -- valid (same as parent) Child gets: admin:data -- MUST be rejected
Every spawn event MUST be logged with: spawning agent identity, child template identity, requested scope, granted scope, timestamp, outcome (ALLOWED or DENIED), and reason if denied.¶
Template certificate (static): WHO the agent is and WHO it can spawn. Changes require full re-certification.¶
Dynamic policy (fast lane): WHAT the agent can do within the bounds of the template certificate. Changes require dual signature (Section 9.3).¶
Dynamic policies MUST NOT exceed the bounds defined in the static template certificate.¶
Template ownership MUST be established at certificate signing time and embedded in the Owner and OrgID fields. Only the verified owner of the organization that signed the template MAY submit policy changes.¶
Every policy change MUST be signed by two independent parties:¶
Neither signature alone is sufficient. Both MUST be present and valid for a policy to be accepted.¶
Owner key + Policy Authority key = policy accepted
^ ^
who owns it passed the gates
1. Identity and ownership verification
- requester matches Owner in template certificate?
- requester OrgID matches certificate OrgID?
NO --> rejected, audit logged
2. Automated gate (OPA):
- scope within AllowedScopes?
- spawn targets within CanSpawn?
- no conflicts with active policies?
ANY FAIL --> rejected
3. Dual signature applied:
Owner signs, Policy Authority countersigns
4. Policy stored with dual signature, version, timestamp,
and content hash
5. Agent validates at runtime:
- both signatures valid?
- version current? (replay prevention)
- hash matches? (tamper detection)
- policy within template certificate bounds?
ANY FAIL --> DENY, audit logged
| Scenario | Single Sig Gap | Dual Sig Fix |
|---|---|---|
| Rogue Policy Authority | Pushes bad policy | Owner key missing |
| Rogue owner | Bypasses OPA gates | PA won't countersign |
| Compromised owner key | Attacker modifies | OPA gates enforced |
| Compromised Policy Auth | Pushes bad policy | Owner key missing |
A new template version MUST undergo full re-verification from scratch. Trust MUST NOT be inherited from a previous version.¶
Rationale: inheriting trust from v1 would allow a compromised v1 certificate to bootstrap trust for v2.¶
Everything on the old template chain continues to work unchanged as long as the certificate is valid. New connections and functionality are opt-in -- only available after the new template chain is fully verified and explicitly adopted.¶
The following MUST NOT be inherited from a previous version:¶
Disable SHOULD precede delete. Implementations SHOULD enforce a mandatory waiting period between DISABLED and DELETED.¶
Cross-organizational grants MUST be explicitly re-issued for each new template version. Grants MUST NOT automatically roll over on version upgrade.¶
Cross-organizational agent spawning MUST be explicitly authorized by the resource-owning organization. No implicit trust exists between organizations.¶
A cross-organizational grant MUST contain:¶
| Field | Description |
|---|---|
| Grantor | Resource-owning organization |
| Grantee | Requesting organization |
| Template | Specific template identifier |
| AllowedScopes | MUST be subset of template scopes |
| TTL | Grant validity period |
| MaxSpawns | Maximum concurrent agents permitted |
| Signature | Dual signature (grantor owner + Policy Authority) |
The granting organization MAY revoke a cross-organizational grant without the cooperation of the receiving organization. Upon revocation, all agents spawned under the affected grant MUST be treated as untrusted on next validation.¶
Each organization MUST maintain its own independent audit trail. Audit records MUST NOT depend on the other organization's systems.¶
Template revocation MUST be performed by adding the template certificate to the CA's CRL. All agent certificates derived from a revoked template MUST be treated as untrusted on next CRL check.¶
Individual agents MAY be revoked by explicit certificate revocation or by removal of authorization relationships at the resource layer.¶
Routine revocation (TTL expiry, task completion) MUST be fully automated. Human involvement SHOULD be reserved for incident response and high-impact decisions.¶
Any verification step that cannot be completed MUST result in DENY. This includes:¶
Implementations MUST NOT provide a degraded mode that allows partial spawning or execution when verification infrastructure is unavailable.¶
Implementations MUST place every field in the location specified by this document. Variable element placement is NOT permitted.¶
Non-conforming CSRs MUST be rejected by the CA. A non-conforming template MUST NOT be signed.¶
Implementations MUST provide test vectors -- concrete examples of valid and invalid template chains -- for conformance validation.¶
Implementations claiming conformance with this document MUST pass conformance certification before shipping.¶
This document has no IANA actions.¶
Implementations MUST enforce that child agent scopes are a strict subset of parent scopes at every hop. Failure to enforce this allows privilege escalation across the agent chain.¶
Spawn requests MUST include a timestamp and nonce. Implementations MUST reject spawn requests where the timestamp exceeds a defined freshness window or the nonce has been seen previously.¶
A compromised template certificate MUST be revoked immediately. A single CRL update invalidates all downstream agent certificates derived from that template.¶
The dual signature requirement (Section 9.3) ensures no single compromised party can push unauthorized policy changes. CA compromise requires full ecosystem re-issuance.¶
Cross-organizational grants MUST be explicitly issued. Implicit trust between organizations is prohibited.¶
Audit logs MUST be tamper-evident. Logs MUST NOT be deletable by agents or orchestrators. Audit log infrastructure SHOULD be outside the control of the agent ecosystem itself.¶