Based on investigation in #33, the current A2A authentication implementation is incomplete and doesn''t fully follow the A2A specification. This issue tracks the required improvements.
Summary
The authentication flow should work as specified in the A2A protocol:
- Client retrieves agent card and examines security requirements
- Client authenticates using appropriate security scheme
- Client can request authenticated extended card for additional capabilities
- All subsequent requests use proper authentication
Missing Components
1. agent/getAuthenticatedExtendedCard Method
2. Security Scheme Declaration in Agent Cards
3. Client-Side Authentication Support
4. Security Requirement Validation
5. Extended Security Schemes
Acceptance Criteria
References
Priority
High - Authentication is a core security requirement for production A2A deployments.
Based on investigation in #33, the current A2A authentication implementation is incomplete and doesn''t fully follow the A2A specification. This issue tracks the required improvements.
Summary
The authentication flow should work as specified in the A2A protocol:
Missing Components
1. agent/getAuthenticatedExtendedCard Method
agent/getAuthenticatedExtendedCardJSON-RPC method inserver.go2. Security Scheme Declaration in Agent Cards
securityandsecuritySchemesfields in agent cardssupportsAuthenticatedExtendedCardflag appropriately3. Client-Side Authentication Support
GetAuthenticatedExtendedCard()method to A2A client interface4. Security Requirement Validation
5. Extended Security Schemes
Acceptance Criteria
References
server/middlewares/auth.gotypes/generated_types.go:67-68(security fields)Priority
High - Authentication is a core security requirement for production A2A deployments.