

Agent to Agent (A2A) Protocol: An Architectural and Security Deep Dive
Speaker - Anshu Gupta
Session Description
As AI ecosystems evolve from single-purpose bots to complex multi-agent systems, the need for a "lingua franca" has never been greater. This session introduces the Agent-to-Agent (A2A) protocol—an open standard designed to enable seamless collaboration between AI agents regardless of their underlying frameworks or vendors. We will explore how A2A utilizes familiar web standards like JSON-RPC and HTTPS to manage stateful tasks and discovery. The latter half of the session will shift into a rigorous security deep dive, examining the protocol’s zero-trust principles, its approach to identity via "Agent Cards," and the defensive strategies required to protect against agent-specific threats like prompt injection and authorization creep in decentralized environments.
Session Agenda
The Interoperability Challenge: Understanding why a standardized protocol is necessary to break down silos between disparate AI frameworks (e.g., LangGraph, CrewAI, and AutoGen).
A2A Core Architecture: A breakdown of the client-server model, the lifecycle of a Task, and how Messages and Artifacts facilitate complex, multi-turn collaborations.
Discovery & The Agent Card: How agents "find" each other using standardized metadata to advertise skills, modalities, and security requirements without exposing internal logic.
Communication Mechanics: A look at the transport layer, including JSON-RPC 2.0 for payloads and Server-Sent Events (SSE) for real-time streaming and task updates.
Security Foundation: Authentication & Transport: Deep dive into mandatory HTTPS/TLS requirements and how A2A handles diverse authentication schemes (OAuth2, mTLS, and API keys) via out-of-band credential management.
Advanced Security & Threat Modeling: Analyzing the attack surface, including Agent Card spoofing, "confused deputy" scenarios, and the implementation of granular, capability-based authorization.
Enterprise Governance & Observability: Best practices for deploying secure A2A systems, utilizing OpenTelemetry for cross-agent tracing and maintaining immutable audit trails for autonomous actions.