April 1st, 2026
When today's AI agents interact, they have no standard way to prove who they are, what they are qualified to do, or on whose authority they act.
The Agent2Agent (A2A) protocol addresses agent communication by defining a common language for structured, interoperable agent-to-agent interaction. However, traditional security mechanisms (OAuth 2.0, API keys) leave a gap when it comes to decentralized trust, meaning agents cannot easily prove qualifications, certifications, or regulatory status issued by independent third parties.
Self-Sovereign Identity (SSI) and Verifiable Credentials (VCs) offer a compelling answer to this gap. VCs are cryptographically signed claims that can be verified without contacting the issuer, providing a portable trust layer well-suited for autonomous agent interactions. On the protocol side, OpenID for Verifiable Presentations (OID4VP) provides a great option to build VC-based this trust layer on top of the familiar OAuth 2.0 foundation.
This article presents the OID4VP In-Task Authorization Extension for the A2A protocol. The extension enables Server Agents to dynamically request Verifiable Presentations from clients during task execution, providing Just-In-Time (JIT) authorization without breaking the protocol flow. We describe the motivation behind this work, explain how A2A and OID4VP complement each other, and provide references to open-source implementations (including integration with Heka Identity Platform and LFDT Hiero project) to help explore the approach in practice.
The Agent2Agent (A2A) Protocol is an open standard designed to enable structured, interoperable communication between independent, potentially opaque AI agent systems. At its core, A2A defines a common language and interaction model for ecosystems where agents might be built using different frameworks, languages, or by different vendors.
Originally developed by Google and now donated to the Linux Foundation, A2A is collaboratively driven by an open community with contributions and alignment from major industry players. The A2A Technical Steering Committee (TSC), responsible for technical oversight of the protocol specification and official SDKs, includes representatives from Google, Microsoft, Cisco, AWS, Salesforce, ServiceNow, SAP, and IBM.
Technical Concept
In contrast to wrapping agents as "tools," A2A treats each entity as an opaque agent. Agents collaborate effectively without exposing their internal logic, memory, or proprietary tools. Instead, interactions rely on declared capabilities and exchanged context. This enables agents to operate as true peer collaborators rather than siloed components or tool proxies (as illustrated below).
The A2A design uses a set of core concepts that define agent interaction:
A2A addresses key challenges in multi-agent ecosystems. The lack of standard agent discovery mechanisms, limited interoperability, and scalability constraints are common problems for decentralized systems. These issues become more relevant for agent ecosystems at scale. A2A's core consideration is that agents are powerful individually but fragmented collectively, and should be able to collaborate as peers to reach in order to increase effectiveness.
Core Use Cases
While A2A is designed for standard multi-agent ecosystems, several real-life use cases stand out:
Adoption Perspectives
A2A positions agent communication as a standard, interoperable layer, similar to how web protocols enable services to interoperate across the internet. While multiple agent-to-agent communication standards are expected to develop, A2A stands in a strong position for widespread adoption in the near future.
The key factors include:
In the long term, A2A has the potential to become a foundational protocol for multi-agent systems, enabling a shift from isolated AI applications to fully networked agent ecosystems.
Self-Sovereign Identity (SSI) represents a shift from platform-controlled identity to entity-controlled identity, where users, organizations, or agents manage their own credentials without relying on centralized intermediaries. A core concept of SSI is Verifiable Credentials (VCs), which are cryptographically signed digital credentials that allow an issuer to make claims about a subject, which can be independently verified without contacting the issuer directly.
The VC-based trust model introduces a new paradigm:
VCs provide the foundation for answering key trust questions for agent ecosystems where autonomous decision-making, cross-domain interactions, and limited human oversight are the norm.
In effect, VCs form a portable trust layer that complements communication protocols like A2A, enabling a secure and trusted interaction between agents.
While VCs define the trust model, a standardized protocol is needed to exchange them in practice. OpenID for Verifiable Credentials (OID4VC), a family of specifications developed by the OpenID Foundation, does just that, by operationalizing the VC trust layer at the protocol level. OID4VC defines interoperable flows for both VC issuance and presentation, represented by two separate protocols:
A key design principle of OID4VC is its' foundation on existing web identity standards, making SSI compatible with OAuth 2.0 / OpenID Connect ecosystems rather than introducing an entirely separate stack. This alignment has driven widespread adoption, including large-scale deployments such as the European Digital Identity Wallet (EUDI) and mobile driver's license (mDL) ecosystems. These recent adoptions are confirming OID4VC's role as a crucial part of emerging decentralized identity infrastructure.
OpenID for Verifiable Presentations (OID4VP) defines how a holder proves possession of one or more VCs to a verifier in a secure, standardized, and privacy-preserving way.
At a high level, the interaction follows a structured request-response model:
The following diagram illustrates the high-level OID4VP cross-device flow:
Building on OAuth 2.0, OID4VP reuses familiar concepts like authorization requests, client identifiers, redirect-based flows, and also inherits established security models. OID4VP also supports flexible interaction patterns, from browser-based flows to mobile wallet integration and cross-device scenarios (QR-based flows, Digital Credentials API). This makes it straightforward for organizations to extend existing identity infrastructure rather than rebuild it.
Taking into account synergy between SSI concepts and emerging multi-agent infrastructure, a DSR team has developed an A2A extension that provides an option to use OID4VP protocol for In-Task Authorization.
The integration of OID4VP flow allows A2A Server Agents to perform additional authorization by requesting Verifiable Presentations (VPs) from the A2A Client. This mechanism enables Just-In-Time (JIT) authorization, where the server can dynamically request information from specific VCs during a task execution without breaking the protocol flow.
Motivation
The motivation behind the extension is based on common limitations of the traditional security model leveraged by the core A2A spec. A2A relies on standard web security schemes (OAuth2, APIKey, mTLS). While these effectively handle service identity and access control, they have limitations regarding decentralized trust:
scope: "tasks.read"). They do not easily prove inherent qualifications, certifications, or regulatory status of the agent itself (e.g., "This agent is a Licensed Financial Advisor").OID4VP is a natural fit for the A2A extensibility model, by layering VC-based trust on top of A2A's existing communication flow without requiring changes to the core protocol. As VC-based trust frameworks become more widely adopted, this integration has the potential to become a common pattern for A2A deployments.
Benefits for A2A Use Cases
The extension addresses each of the limitations above and brings additional capabilities to A2A interactions:
How It Works
The extension integrates into A2A through its standard extensibility mechanisms. At the protocol level, the key elements are:
extensionssection of its AgentCapabilities, including supported OID4VP versions. This makes the capability machine-discoverable.TASK_STATE_AUTH_REQUIRED: When a Server Agent determines that additional authorization is needed during task execution, it transitions the task to this state and includes an authorizationRequestobject in the message metadata.authorizationRequest object follows Section 5 of the OID4VP specification and contains the parameters needed for the Client to initiate the OID4VP flow (e.g., client_id, request_uri or request object).The diagram below shows a non-normative example of an OID4VP A2A in-task authorization flow:
At the moment, there are two open-source reference implementations that leverage the extension.
Both implementations aim to provide practical examples of how to implement and use the extension. Feel free to try them out, explore the provided capabilities, and see how they can be applied to the scenarios you might have in mind.
With multi-agent ecosystems emerging rapidly and VC-based trust frameworks gaining adoption, it's important to maintain a robust extension specification and provide implementors with practical guidance and reference implementations.
At DSR, we're committed to long-term stewardship of the OID4VP In-Task Authorization extension and to driving its recognition in the A2A community.
The A2A Extension Governance defines a specific process for recognition and adoption of extensions. Extensions supported by the community and approved by the A2A TSC can ultimately be promoted to the core protocol specification. We're committed to following this process, with the next steps being:
In this context, open community discussion for the extension and its use cases is crucial. If you have any feedback or questions regarding the concept, feel free to contact our team at contact@dsr-corporation.com