Skip to content

docs: add authorization, delegation & audit evidence extension proposal#1583

Open
knuckles-stack wants to merge 1 commit intoa2aproject:mainfrom
knuckles-stack:sep-authorization-delegation-evidence
Open

docs: add authorization, delegation & audit evidence extension proposal#1583
knuckles-stack wants to merge 1 commit intoa2aproject:mainfrom
knuckles-stack:sep-authorization-delegation-evidence

Conversation

@knuckles-stack
Copy link

Addresses outstanding work items on authorization schemes (#19, #71) and
capability-based authorization (#1404).

Summary

This proposal adds three interconnected capabilities to the A2A specification
as an extension:

  • Authorization framework — Capability-based permission model using the A2A
    extension mechanism, replacing ambient authority with explicit, verifiable
    scopes and a hierarchical scope grammar
  • Delegation chains — Multi-hop delegation with cryptographic proofs, scope
    narrowing, temporal bounds, chain continuity verification, and revocation
    propagation
  • Audit evidence — Normative requirements for append-only, tamper-evident
    action records with hash-chained integrity, enabling independent third-party
    verification

Additionally includes a penalty-based trust scoring model, three normative
authorization flows (direct, delegated, trust-gated), worked examples
(financial services, healthcare, supply chain), and security considerations
including post-quantum signature readiness.

Design Decisions

  • Extension, not core change. All capabilities are defined as extension
    parameters using the existing A2A extension mechanism. No core data
    structures are modified. Existing implementations continue to work.
  • Incremental adoption. Authorization, delegation, and evidence can each
    be adopted independently.
  • Algorithm agility. Cryptographic algorithms are parameters (Ed25519,
    ES256, ML-DSA-87), not hardcoded choices.
  • Fail-closed defaults. Verification failures result in denial.
    Evidence write failures trigger action suspension.

Motivation

  • EU AI Act Article 50 transparency requirements (enforcement August 2, 2026)
  • NIST AI Agent Standards Initiative findings on authorization gaps
  • CSA survey: 88% of orgs report agent permission incidents, 21% have
    visibility into multi-agent permission chains

Compatibility

  • Fully backward-compatible (extension parameters only)
  • Complements existing OAuth 2.0 / API key / OIDC authentication
  • Uses standard A2A-Extensions header activation
  • All pseudocode is language-agnostic

File

  • docs/topics/authorization-delegation-evidence.md (~4,200 words)

Closes #19, closes #71, closes #1404

@knuckles-stack knuckles-stack requested a review from a team as a code owner March 4, 2026 04:45
@gemini-code-assist
Copy link
Contributor

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request introduces a comprehensive extension to the A2A protocol, addressing critical gaps in authorization, delegation, and auditability for multi-agent systems. It provides a robust framework for managing agent permissions, enabling secure multi-hop delegation, and ensuring transparent, verifiable records of agent activities, all while maintaining backward compatibility and supporting incremental adoption.

Highlights

  • Authorization Framework: Introduced a capability-based permission model for Agent-to-Agent (A2A) interactions, utilizing the A2A extension mechanism to replace ambient authority with explicit, verifiable scopes and a hierarchical scope grammar.
  • Delegation Chains: Implemented multi-hop delegation with cryptographic proofs, allowing for scope narrowing, temporal bounds, chain continuity verification, and revocation propagation across agents.
  • Audit Evidence: Defined normative requirements for append-only, tamper-evident action records with hash-chained integrity, enabling independent third-party verification of agent actions.
  • Trust Scoring Model: Included a penalty-based trust scoring model to provide quantitative signals for authorization decisions, based on observable evidence and cryptographic verification.
Changelog
  • docs/topics/authorization-delegation-evidence.md
    • Added a new document detailing the proposed extension for authorization, delegation, and audit evidence in A2A interactions.
Activity
  • No human activity has been recorded on this pull request yet.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@knuckles-stack knuckles-stack changed the title SEP: Authorization, Delegation & Audit Evidence for Agent-to-Agent Interactions docs: add authorization, delegation & audit evidence extension proposal Mar 4, 2026
Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a comprehensive and well-structured proposal for adding authorization, delegation, and audit evidence capabilities to the A2A protocol as an extension. The proposal is thorough and covers many important aspects. My review includes suggestions to improve clarity, fix minor bugs in the pseudocode, ensure consistency with protocol conventions, and enhance the completeness of examples.

Note: Security Review has been skipped due to the limited scope of the PR.

matched = true
else if req starts with g + ".":
matched = true // g is a parent scope
else if g ends with ".*" and req starts with g[:-2]:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The wildcard matching logic req starts with g[:-2] appears to be incorrect for the described behavior. If g is trade.*, g[:-2] would be trade. A check like req.startswith('trade') would incorrectly match scopes like trade-report which are not sub-scopes. The logic should check if req starts with the prefix of g before the .*, which is trade.. In Python-like slicing, this would be g[:-1].

Suggested change
else if g ends with ".*" and req starts with g[:-2]:
else if g ends with ".*" and req starts with g[:-1]:

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Resolved in 101f918.

return VerificationResult(
valid: true,
chain_length: len(chain),
effective_scopes: chain[last].scopes,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The variable last is used here but is not defined in the pseudocode. To get the scopes of the final link in the chain, you should reference the last element directly, for example using chain[-1].scopes (in Python-like syntax) or chain[len(chain) - 1].scopes.

Suggested change
effective_scopes: chain[last].scopes,
effective_scopes: chain[-1].scopes,

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Resolved in 101f918.

score = score - 0.5

// Penalty 2: Outcome failures (up to -0.4)
outcomes = [r for r in records where r.outcome_status is not null]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The outcomes list includes all records where outcome_status is not null, which includes "PENDING". The failure rate calculation then treats pending outcomes as failures. It would be more accurate to exclude records with a "PENDING" status from the trust score calculation until they reach a terminal state (ACHIEVED, FAILED, or PARTIAL). You could filter the outcomes list to exclude the "PENDING" status.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Resolved in 101f918.

| `timestamp_utc` | `string` (ISO 8601) | Yes | When the action occurred, in UTC. |
| `prev_record_hash` | `string` (hex) | Yes | SHA-256 hash of the previous record (or `"0"*64` for the first record). |
| `record_hash` | `string` (hex) | Yes | SHA-256 hash of this record (see Section 7.2). |
| `signature` | `string` (base64url) | No | Cryptographic signature over the record. |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The description for signature states it is a "Cryptographic signature over the record." However, the verification pseudocode in section 7.3 (verify_signature(..., expected_hash, ...) on line 587) indicates the signature is computed over the record_hash. This is a significant ambiguity. Please clarify the description to match the verification logic, for example, by stating it's a "Cryptographic signature over the record_hash."

Suggested change
| `signature` | `string` (base64url) | No | Cryptographic signature over the record. |
| `signature` | `string` (base64url) | No | Cryptographic signature over the `record_hash`. |

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Resolved in 101f918.


| Field | Type | Required | Description |
|-------|------|----------|-------------|
| `authorization_model` | `string` | Yes | One of `"capability"`, `"role"`, or `"attribute"`. |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

low

The values for authorization_model ("capability", "role", "attribute") should be in SCREAMING_SNAKE_CASE (e.g., "CAPABILITY") to align with the A2A protocol's convention for enum values, as specified in the general rules. This change should be applied consistently throughout the document, including in the example on line 110 and the descriptions on lines 138-145.

Suggested change
| `authorization_model` | `string` | Yes | One of `"capability"`, `"role"`, or `"attribute"`. |
| `authorization_model` | `string` | Yes | One of `"CAPABILITY"`, `"ROLE"`, or `"ATTRIBUTE"`. |
References
  1. Enum values in the A2A protocol should be in SCREAMING_SNAKE_CASE to comply with the ProtoJSON specification.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Resolved in 101f918.

Comment on lines +359 to +364
if len(chain) > max_delegation_depth:
return VerificationResult(
valid: false,
failure_point: i,
reason: "exceeds_max_depth"
)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

low

The chain depth check is performed on every iteration within the loop. For efficiency, it's better to perform this check once before the loop starts.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Resolved in 101f918.

Comment on lines +650 to +651
| | |-- delegation(B->C, |
| | | narrowed scopes) |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

low

There's a minor formatting issue in the ASCII art for the delegated authorization flow. The line for the delegation(B->C) is broken across two lines and misaligned, which affects readability.

Suggested change
| | |-- delegation(B->C, |
| | | narrowed scopes) |
| | |-- delegation(B->C, narrowed scopes) -->|

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Resolved in 101f918.

Comment on lines +737 to +740
1. The orchestration agent evaluates each vendor agent's trust score.
Vendor agents with HIGH trust (>= 0.9) may proceed with standard
authorization. Vendor agents with MODERATE trust (>= 0.5) require
additional scope restrictions.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

low

The worked example for Trust-Gated Authorization only covers HIGH and MODERATE trust levels. For completeness, it would be helpful to briefly describe the expected handling for agents with LOW and NONE trust levels as well (e.g., are they rejected, or restricted to even more limited scopes?).

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Resolved in 101f918.

@knuckles-stack knuckles-stack force-pushed the sep-authorization-delegation-evidence branch 2 times, most recently from 293ae08 to 346b34e Compare March 4, 2026 05:01
@knuckles-stack knuckles-stack force-pushed the sep-authorization-delegation-evidence branch from 346b34e to 101f918 Compare March 4, 2026 05:03
@chorghemaruti64-creator
Copy link

This proposal addresses something we've wrestled with hands-on while building Agenium Messenger — a messenger where AI agents receive messages via A2A.

A few observations from our implementation:

On delegation chains: The scope-narrowing requirement is critical. We found that without explicit scope constraints at each hop, agents tend to delegate the full permission set "just to be safe" — which defeats the purpose entirely. Your temporal bounds approach is clean.

On audit evidence: One thing we'd add to the audit trail: distinguishing between capability possession and capability use. An agent might hold a write-scope but only ever exercise read-operations. The delta is useful signal for trust scoring downstream.

On revocation propagation: Have you considered lazy revocation with a TTL? Eager propagation across multi-hop chains can create latency spikes in long delegation trees. A short TTL (e.g., 30s) with a re-verification endpoint might balance responsiveness vs. overhead.

Happy to share our implementation notes if useful — we've been running this in production for a few weeks.

@knuckles-stack
Copy link
Author

Scope narrowing. The monotonic reduction requirement exists for exactly the failure mode you describe. Section 4.2 enforces child.scopes ⊆ parent.scopes at each hop with verification-time rejection on violation. Production confirmation of this behavior under real delegation pressure is valuable.

Possession vs. use. Valid point. The current audit schema (Section 7.1) captures exercised operations but does not distinguish granted-but-unused capabilities. Adding a granted_scopes field to the evidence record would make that delta computable without modifying the trust scoring model. The penalty-based model (Section 8) could then weight unused-but-held write scopes as a risk signal. Will incorporate.

Lazy revocation. The proposal specifies eager propagation as normative (Section 5, MUST behavior). A TTL-based re-verification endpoint is a sound optimization for deep trees. The risk is a bounded window where revoked capabilities remain honored. I would frame this as a MAY optimization with a normative maximum window (e.g., max_revocation_delay_seconds declared in the agent card). Implementations requiring immediate revocation use eager propagation; those tolerating bounded delay declare the window and accept the tradeoff. This keeps the spec precise without forcing a single propagation strategy.

Implementation notes welcome.

@chorghemaruti64-creator
Copy link

The authorization extension addresses a gap that also exists one step earlier — at discovery time.

When an agent queries a registry to find a capable peer, it currently gets capabilities (what the agent can do) but not authorization topology (what scopes it accepts, whether it supports delegation chains, what audit evidence it can produce). Session initialization is required before any of this is negotiated. For compliance-sensitive deployments (EU AI Act, HIPAA), that means starting a session just to find out the peer's authorization model is incompatible.

The extension schema defined here — authorization types, scope grammar, delegation support flag, evidence format — could serve as a discoverable field in AgentCard. Discovery-time authorization negotiation would let orchestrators pre-screen peers for compliance requirements without initiating a session. A peer that can't produce EU AI Act Article 50 audit evidence gets filtered at the discovery layer, not after task assignment.

This connects to work being done on the Agenium registry (https://agenium.net) — we're mapping AgentCard fields to registry format specifically to make pre-session capability + authorization negotiation possible. The 'what scopes does this agent accept' question is one we're trying to answer from the directory, not from the session handshake.

@amye amye requested review from a team and removed request for a team March 16, 2026 18:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Authentication and Authorization RFC? Delegated User Authorization for Agent2Agent Servers

2 participants