You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/pages/identity/identity.md
+17-14
Original file line number
Diff line number
Diff line change
@@ -35,9 +35,9 @@ Similarly, as a starting point, the [`AGNTCY`](https://agntcy.org/) supports one
35
35
36
36
<br />
37
37
38
-
:::tip[IMPORTANT]
38
+
```{IMPORTANT}
39
39
Independently of whether the identity is assigned following a convention or a standardized framework, at this stage the main focus of the [`AGNTCY`](https://agntcy.org/) is to provide a common and trustworthy mechanism to **present identifiers** and to **verify them**. More specifically, the [`AGNTCY`](https://agntcy.org/) not only supports various (and heterogeneous) identifiers that are universally unique but also proposes a standard way of presenting and verifying such identifiers, thereby enabling freedom in the selection of interoperable identities in an IoA.
40
-
:::
40
+
```
41
41
42
42
## Identity for Agents
43
43
@@ -49,15 +49,16 @@ Independently of whether the identity is assigned following a convention or a st
49
49
50
50
The figure above depicts the main elements of an Agent's subject identifier:
51
51
52
-
- Each Agent subject has a universally unique identifier named [`ID`](./id/definitions.md).
53
-
- Each `ID` is associated 1:1 to a [`ResolverMetadata`](./id/definitions.md) object, enabling automated resolution and trustworthy verification of Agent IDs.
54
-
- Each `ID` is also associated 1:n to an [`Agent Badge`](./vc/intro.md).
52
+
- Each Agent subject has a universally unique identifier named [`ID`](#identifiers).
53
+
- Each `ID` is associated 1:1 to a [`ResolverMetadata`](#identifiers) object, enabling automated resolution and trustworthy verification of Agent IDs.
54
+
- Each `ID` is also associated 1:n to an [`Agent Badge`](#verifiable-credentials).
55
55
56
56
Hence, in the [`AGNTCY`](https://agntcy.org/), an Agent subject is tied to a unique identifier linked to one or more `Verifiable Credentials (VCs)`, which contain information about the Agent, such as its ID, a schema definition (e.g., an OASF schema), and other metadata used for defining locators, authentication, MFA, etc. Agents can use this Badge for secure presentation, verification, and enabling trusted communications across multi-agent systems.
57
57
58
58
Note that the same approach applies to MCP Servers and MASs, giving rise to ResolverMetadata and Badges also for MCP Servers and MASs.
59
59
60
60
# Identifiers
61
+
61
62
## Definitions
62
63
63
64
The [`AGNTCY`](https://agntcy.org/) supports various types of identities, referred to as IDs, which serve as universally unique identifiers for the main entities or subjects operated by the [`AGNTCY`](https://agntcy.org/), including Agents and Multi-Agent Systems (MAS).
@@ -71,6 +72,7 @@ ResolverMetadata: Metadata, represented in the form of a JSON-LD object, contain
71
72
Concrete examples with various IDs and associated ResolverMetadata can be found [`here`](https://spec.identity.agntcy.org/docs/id/examples)
72
73
73
74
# Verifiable Credentials
75
+
74
76
## Definitions
75
77
76
78
The [`AGNTCY`](https://agntcy.org/) supports various types of verifiable credentials, referred to as VCs. A verifiable credential is a specific way to express and present a set of claims made by an issuer, such as an agent definition (e.g., an [`OASF Definition`](https://schema.oasf.agntcy.org/objects/agent), or an [`A2A Agent Card`](https://github.com/google/A2A/blob/main/specification/json/a2a.json#AgentCard)), a deployment configuration, or an authorization claim that could be used during a MFA process.
@@ -86,27 +88,28 @@ One of the key `VCs` within the [`AGNTCY`](https://agntcy.org/) is the following
86
88
87
89
- An n:1 relationship between Agent Badges and an Agent Passport
88
90
- A 1:1 relationship between an Agent Passport and an Agent `ID`
89
-
- A common element that binds Agent Badges and an Agent Passport, which is the same Agent `ID`.
91
+
- A common element that binds Agent Badges and an Agent Passport, which is the same Agent `ID`.
90
92
91
-
More specifically, the role of the "Agent Passport" is to cryptographically bind an Agent ID to an ISSUER, a public key and a proof of provenance, while the role of the Agent Badges is to enable the binding of the same Agent `ID` to different definitions of the core Agent, including different schemas, versions, locators, etc., as well as to additional `VCs` that may be used during Multi-Factor AuthN/AuthZ (MFA) processes. A concrete example of an Agent Passport can be found [`here`](../vc/agent-passport.md).
93
+
More specifically, the role of the "Agent Passport" is to cryptographically bind an Agent ID to an ISSUER, a public key and a proof of provenance, while the role of the Agent Badges is to enable the binding of the same Agent `ID` to different definitions of the core Agent, including different schemas, versions, locators, etc., as well as to additional `VCs` that may be used during Multi-Factor AuthN/AuthZ (MFA) processes. A concrete example of an Agent Passport can be found [`here`](../vc/agent-passport.md).
92
94
93
95
-->
94
96
95
-
The identity framework conceived by the `AGNTCY` allows not only to cryptographically bind an Agent ID to an ISSUER, a public key and a proof of provenance but also to enable the binding of the same Agent `ID` to different definitions of the core Agent, including different schemas, versions, locators, etc., as well as to additional `VCs` that may be used during Multi-Factor AuthN/AuthZ (MFA) processes.
97
+
The identity framework conceived by the `AGNTCY` allows not only to cryptographically bind an Agent ID to an ISSUER, a public key and a proof of provenance but also to enable the binding of the same Agent `ID` to different definitions of the core Agent, including different schemas, versions, locators, etc., as well as to additional `VCs` that may be used during Multi-Factor AuthN/AuthZ (MFA) processes.
96
98
97
99
<br />
98
100
99
-
:::tip[IMPORTANT]
101
+
```{IMPORTANT}
100
102
As detailed in the [`Agent Badge Examples`](https://spec.identity.agntcy.org/docs/vc/agent-badge), the combined use of an `Agent Badge` with `ResolverMetadata` objects enables the automatic and trustworthy discovery not only of the PubKey associated to the Agent issuer but also of the verification material to prove the authenticity and integrity of the Agent Badge, according to the assertionMethod defined in the `ResolverMetadata` object.
101
103
102
104
Furthermore, the use of Agent Badges provides a set of key properties in an IoA:
103
105
104
-
1) It addresses the problem of **Agent impersonation**, by avoiding scenarios where one organization could offer rogue Agents as if they were created by another (trusted) company.
105
-
2) It enables **trustworthy origination, traceability, and lineage of Agents**. Note that Agents will end up having different versions and releases (e.g., due to security patches and updates), so while a company might be using version 2.08 of Agent `ID` = X, another company might be using version 2.1 of Agent Agent `ID` = X. Knowing that there is a key vulnerability and recommended upgrade for Agent `ID` = X, version 2.08, would allow the first company to migrate to version 2.1, while inform the second company that the upgrade is not needed.
106
-
3) It **enables more sophisticated AuthN and AuthZ processes among agents with and without a human in the loop**, including the **capacity to build trust even before an Agent is selected and used**. In subsequent updates to this documentation, the [`AGNTCY`](https://agntcy.org/) will provide examples involving MFA and how to build trust dynamically among Agents.
107
-
:::
106
+
1. It addresses the problem of **Agent impersonation**, by avoiding scenarios where one organization could offer rogue Agents as if they were created by another (trusted) company.
107
+
2. It enables **trustworthy origination, traceability, and lineage of Agents**. Note that Agents will end up having different versions and releases (e.g., due to security patches and updates), so while a company might be using version 2.08 of Agent `ID` = X, another company might be using version 2.1 of Agent Agent `ID` = X. Knowing that there is a key vulnerability and recommended upgrade for Agent `ID` = X, version 2.08, would allow the first company to migrate to version 2.1, while inform the second company that the upgrade is not needed.
108
+
3. It **enables more sophisticated AuthN and AuthZ processes among agents with and without a human in the loop**, including the **capacity to build trust even before an Agent is selected and used**. In subsequent updates to this documentation, the [`AGNTCY`](https://agntcy.org/) will provide examples involving MFA and how to build trust dynamically among Agents.
109
+
```
108
110
109
111
# Flow Diagrams
112
+
110
113
## Agntcy - User Flows
111
114
112
115
### Create a New Agent
@@ -181,4 +184,4 @@ Agent Consumer->>Identity CLI: Search for the Agent Badge<br/>for the Agent ID +
181
184
Agent Consumer->>Identity CLI: Verify the Agent Badge
182
185
```
183
186
184
-
Additional flow diagrams can be found [`AGNTCY`](https://spec.identity.agntcy.org/docs/category/sequence-flows)
187
+
Additional flow diagrams can be found in the [`Identity Spec`](https://spec.identity.agntcy.org/docs/category/sequence-flows).
Copy file name to clipboardExpand all lines: docs/pages/introduction.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ The initial set of IoA components and architecture is outlined below. This is a
37
37
:align: center
38
38
```
39
39
40
-
1.**Identity**: To ensure open, collision-free, and secure agent authentication and metadata validation, fostering trust and reliability across Agents, MCP Servers, and Multi-Agent Systems.
40
+
1.**Identity**: To ensure open, collision-free, secure agent authentication and metadata validation, fostering trust and reliability across Agents, MCP Servers, and Multi-Agent Systems.
41
41
1.**Open Agent Schema Framework (OASF)**: An OCI based extensible data model allowing to describe agents' attributes and ensuring unique identification of agents. Current OASF repo can be found [here](https://github.com/agntcy/oasf), OASF schema documentation can be found [here](https://schema.oasf.agntcy.org).
42
42
1.**Agent Directory**: Allows to announce and discover agents or multi-agent applications. Any organization can run its directory and keep it in sync with others, forming the Internet of Agents inventory.
43
43
1.**Agent Manifest**: A standard format to describes agents, their capabilities, their dependencies, and how to deploy or consume them. The manifest is designed to be used by ACP and the Workflow Server and stored in the Agent Directory with the corresponding OASF extensions.
0 commit comments