[MINUTES] CCG Atlantic Weekly 2025-10-21

Meeting Summary: CCG Atlantic Weekly - 2025/10/21

*Topics Covered:*

   - Introduction to Agency: Infrastructure for Internet of Agents
   - Agency's approach to identity for agents and tools.
   - Agency's relationship to W3C standards and decentralized identities.
   - Technical details of Agency's Identity Service and architecture.
   - Tool-Based Access Control (TBAC) in Agency.
   - Collaboration opportunities with W3C Community Groups.

*Key Points:*

   - *Agency Overview:* Marcelo Yannuzzi, Jean-Andrei DIACONU, and Herve
   Muyal presented Agency, an infrastructure for the internet of agents,
   focusing on identity, role-based, task-based access control.
   - *Decentralized Identity:* Agency aims to provide open, collision-free,
   and verifiable identities, taking inspiration from W3C standards,
   particularly for verifiable credentials.
   - *DID Methods and Future:* Discussion on the evolution of DID methods
   within Agency, with a focus on potential collaboration with W3C's DID
   working groups and the development of a DID method.
   - *TBAC:* Agency's unique approach to access control, called TBAC, was
   explained.
   - *Collaboration:* A call for collaboration was made, with an email
   exchange proposed to identify common interests.

Text:
https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-atlantic-weekly-2025-10-21.md

Video:
https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-atlantic-weekly-2025-10-21.mp4
*CCG Atlantic Weekly - 2025/10/21 11:58 EDT - Transcript* *Attendees*

Alex Higuera, Benjamin Young, Fireflies.ai Notetaker Ivan, Greg Bernstein,
Harrison Tang, Herve Muyal, Hiroyuki Sano, Jean-Andrei DIACONU, Jennie
Meier, Leo Sorokin, Lucy (Qixue) Yang, Manu Sporny, Marcelo Yannuzzi,
Michael Herman (Bindloss, Alberta), Parth Bhatt, Rob Padula, Ted Thibodeau
Jr, Vanessa Xu, Will Abramson
*Transcript*

Marcelo Yannuzzi: Hello. Welcome.

Harrison Tang: Hey, Masala. Hey, Jean.

Jean-Andrei DIACONU: Hello son.

Harrison Tang: Hey guys. Thank you for taking the time to join us today.

Jean-Andrei DIACONU: Thank you for the invitation. We cannot hear you.

Harrison Tang: stuff. And now portion

Jean-Andrei DIACONU: I think. Yes.

Manu Sporny: Yeah, Harrison, your audio was dropping in and out. We could
hear you every now and then, but not all the

Harrison Tang: Hello. Can you guys hear me? Okay. Great.

Manu Sporny: Yep.

Harrison Tang: Thank All So, we'll start in about a minute and then I'll go
through some administrative stuff and then the Gina Masalo I'll cue you
around 9:07.

Harrison Tang: All right, we'll start right away and we'll let other people
scroll in. but welcome everyone to this week's W3C CCV call. So today we're
very excited to have Marcelo Jean here to actually present and talk about
their data initiative called agency basically an infrastructure for the
internet agents. but before then just want to quickly go over some
administrative matters. So first of all just a quick reminder on the code
of ethics and the professional conduct.

Harrison Tang: just want to make sure that we hold constructive and
respectful conversations here. a quick note about the intellectual
property. Anyone participate in these calls. however, all substitive
contributions to any CCG work items must be member CCG with full IPR
agreement signed. if you have any questions in regards to getting a W3C
account or the W3C community contributor license agreement please feel free
to reach out to any of the culture. these calls are automatically recorded
and transcribed and we will send it out automatically in the next few
hours. All right. Just want to take a quick moment for the introductions
and reintroductions.

Harrison Tang: If you're new to the community or you haven't been active
and want to engage, please feel free to just, unmute. All right.
announcements and remind Any new announcements reminders? I think this week
is the IW. So, I guess some people probably couldn't get 10 because today
is the first day of I just realized that All Any updates to the work items?

Harrison Tang: Money, please.

Manu Sporny: Yeah,…

Manu Sporny: just a couple of updates. we have so the verifiable credential
working group has adopted two more work items from this group. The re
confidence method. those are being published as official standards to track
documents as first public working drafts. I think next week we are now
regularly meeting to move those specifications forward Wednesdays at 11
a.m. which is the same time as the verifiable credential working group
meeting. It was also the same time as our We have moved the incubation
meeting to Thursdays at 10:00 a.m. Eastern to try and accommodate that.
We've just got so many standards calls happening we had to shuffle some
things around.
00:05:00

Manu Sporny: So that new schedule will take effect after this week. as
Harrison mentioned, internet identity workshops happening right now, which
is where a lot of our folks are currently. the other thing to mention is
that we're working on a new charter for the verifiable credential working
group to bring in even more work items from this group. we discussed those
at the incubation meetings. but just a heads up that I'm going to try to
put together a draft for the charter there. and then finally a reminder
that the W3C technical plenary happens in 3 weeks in Coobe Japan. a number
of us will be meeting there.

Manu Sporny: usually it's always less well attended than the US and EU
meetings but we hope to get some good participation from folks in AsPacific
region in Coobe Japan. that's it for me.

Harrison Tang: Thanks man.

Will Abramson: Yeah, thanks I actually just wanted to mention something
that Pierre just mentioned to me a couple of hours ago just to suggest or
propose. He was exploring, he was saying this group CCG produces a lot of
work items that end up getting adopted as working group rec track
documents. And one thing someone suggested to him, part of the staff was
maybe we could explore using the IPR bot in our repos. I don't need an
answer for this today, but we should think about it. And Pier, just the
initial conversation, he's going to be away for two weeks. Maybe we can
talk about it at TAC as well. But maybe that's useful. It might help this
process be a bit more streamlined. I don't know.

Harrison Tang: Any action items that

Will Abramson: No. I just think about it. I don't really know all what is
involved, but I particularly interested to hear from you, man, if that's
something that you think is worthwhile since you're very involved.

Manu Sporny: Yeah, I don't think it would be difficult to set it up. the
IPR bot just makes sure that any commit to any repository we have has a
promise from the individual committing that they're granting basically us
W3C a license to use their content. It just makes it really clean from the
very beginning. Usually we cover that when we do a final community group
specification publication. I will go through every single person that
committed to the repo, check to see if what they contributed was
substantive, and if it was, I will contact them and tell them that you need
to sign the IPR agreement. most people do it, so we don't typically have an
issue, but it's nice to just do it as we go versus having the editors do it
at the last stage.

Will Abramson: Okay, cool.

Harrison Tang: Any other work item related stuff? Last calls for
introductions, announcements, reminders, work items. All right, let's get
to the main agenda. So today very excited here to have Marcelo, Jean and
Herb here to talk about and be the discussions on agency the infrastructure
for the internet of agents.

Harrison Tang: obviously aentic AI is one of the hottest thing in maybe
even 2024 2025 and I think the problem of identities in regards to agents
it's actually a very important one actually just sharing from my personal
experience we're trying to build some aentic AI at Spokio and I think we
encounter some challenges not challenges but we have to deal with
authorization

Harrison Tang: ations in regards to what tools agents can call and what
tools they cannot call right so permissions authorizations and then also
identifying who the agents are I think that's a very important problem and
issues as we try to automate and build AI agents to automate our workflow
so very excited about this topic and again thanks for Dean Marcelo Herve
for spending your time to come here and lead this discussion. the floor is
yours and if you don't mind just a quick introductions about yourself,…
00:10:00

Harrison Tang: that would be amazing. Thanks. Yes.

Marcelo Yannuzzi: Perfect. Harrison,…

Marcelo Yannuzzi: just to manage the time, how much time do we have is for
the rest 50, minutes or, what do you want to do?

Harrison Tang: And then It would be great…

Marcelo Yannuzzi: Okay. Yeah.

Harrison Tang: if we could leave the last five to 10 minutes for questions.
That would be great. Yeah. Mhm.

Marcelo Yannuzzi: And we can make it interactive during we're going to show
a little bit not only the main elements of what we're building but also the
repos access to demos and so on so forth so we can make it interactive so a
quick intro my name is Marello Yanutzi I'm based in Switzerland I'm a
principal engineer working for Cisco the three of us are part of the
innovation arm of Cisco

Marcelo Yannuzzi: the name is basically think about outshift as everything
that is innovation that is not organically developed by the different or
existing business units. We usually look at much more risky investments in
terms of technology understanding the impact for the company the risking
technology some of us we build a lot of IT patents prototypes and we also
land some of these initiatives internally in the business groups agencies
is our first very large source initiative

Marcelo Yannuzzi: And we will describe in a few minutes what agencies
about. Jean, do you want to go next?

Jean-Andrei DIACONU: Yeah, So, hello everyone. So, I'm part of the team in
Switzerland together with Mas and also in the call. I'm the software lead
working on different agency components. one of them being the identity
service and we also have the identity node that we will show to you today.

Jean-Andrei DIACONU: And nice to meet you all and thank you for the
invitation. Want to go next?

Herve Muyal: Yeah, I'm also part of outshift part of the engineering team
with Ron Marcelo and…

Herve Muyal: feel free to interact with us while we present if you have any
question and so on. We let's make it completely interactive. It's usually
more fun.

Marcelo Yannuzzi: Perfect. So, I don't show the window. let me see.

Harrison Tang: Yes.

Marcelo Yannuzzi: Can you see my screen? It generated a little bit of
chaos. Can you see my screen?

Herve Muyal: Yeah. Yeah. We see your Google Meet screen. Yeah, I don't see
presentation.

Marcelo Yannuzzi: No, but the presentation.

Herve Muyal: No. Yeah,…

Marcelo Yannuzzi: Let me just stop the sharing. Wow, it really went Stop
sharing. Let me Share the screen. Okay.

Marcelo Yannuzzi: Can you see my screen?

Harrison Tang: Yep. Perfect.

Herve Muyal: we see the slide.

Marcelo Yannuzzi: Okay, perfect. So we will try to provide a high level
view what agency is about how we're building this infrastructure for what
we call the internet of agents and especially a look or we would try to
look at things from the angle of identity role based taskbased access
control and a few other things that we have been doing especially

Marcelo Yannuzzi: in the context of some of the new capabilities we're
introducing with tools/task and in the future transaction level base access
control for identic applications agency is more than just identity there
are other initiatives within the open source collective that they are
dealing with things like new protocols new optimized popsup systems for

Marcelo Yannuzzi: or popsup protocols for agentic applications involving
tools and agent to aagent communications. we have specific work that we
have been carrying out with involving A2A protocol. We also have a track on
observability and eval for agents. We also have a dedicated application for
testing and demo purposes which is called the coffee agency. So there's
much more than just the identity part. Today we're going to be mainly
focused on the identity part and the touching points with deeds and W3C the
work that you guys have been leading for years and let's make it completely
interactive.
00:15:00

Marcelo Yannuzzi: so agency has recently been donated to the Linux
Foundation. the technical security committee is basically Cisco, Google
Cloud, Dell, Redhead and Oracle. We have more than 70 plus organizations
that are members and contributors and the list is growing basically on a
weekly basis I would say. you can see them there. So main links to agency
to everything that has to do with verifiable identities and the initial
thoughts about identity.

Marcelo Yannuzzi: And as Jean was mentioning at the beginning, we started
with a first release of an identity node and a few capabilities that we
will talk about and now in the last few months we advanced both with first
an entire identity service with a software as a service solution hosted by
outshift by Cisco and powered by agency. And last month we actually turned
that entire SAS into an open-source release that during September it was
made available to the entire community and I will be talking about the
details on that. also you have the links here for the different working
groups that we have.

Marcelo Yannuzzi: As I mentioned, it's basically the core working group.
Everything that has to do with protocols with agent directory and a few
other elements that you can see in way more detail directly in our website.
We have one on observal. We have the identity working group which the team
here is basically leading and there will be another one it's in the process
of finalizing I think it will be ready this week if it is not ready yet
about the demo app that I mentioned before the coffee agency with regards
to the approach when we started with agency it was quite clear at the

Marcelo Yannuzzi: beginning that there was not going to be u a single
identity or a single approach that will one sizefits-all. That was quite of
an impossible task. And in fact what we observed is that several companies
what they wanted was to have identities for agents and identities for tools
treated very much like they treated they treat today blue badges red badges
in their own companies. and it was a strong demand to actually bring
traditional IDPs into the mix. At the same time, we saw a lot of demand for
making things decentralized, not really depending on any specific
centralized authority for providing identities for agents and the
collateral with tools and so on and so forth.

Marcelo Yannuzzi: So the three main premises that we adopted was they were
basically open collision free and veri the majority of the identities that
we're providing at this stage they are related to agents and MCP servers
but as part of seration initiatives that are going on we are also enabling
the capability of having what we call mass so multi- aent app systems and
each of them having a unique identifier.

Marcelo Yannuzzi: the other thing that was quite important is to have
verifiable credentials and on that topic specifically we talk we took a lot
of inspiration from W3C and you will see in a minute that we support in
fact decentralized identities even though we don't have a fully
decentralized setup yet. but I would say that the majority of the things
that we have been doing are at least from the mentality they are future
proof for deeds. in terms of the verifiable credentials and Jean will walk
you through the details what we have is what I call identity badges and
those identity badges they apply as I mentioned before to agents MCP
servers or multi- aent systems.
00:20:00

Marcelo Yannuzzi: in terms of how did we actually approach the whole thing
it was a mix of conventions and standards. So in terms of conventions we
adopted both identities provided by traditional IDPs and as you will see we
have today integration with octa duo ori and we're in the process of
integrating key clock and we have Microsoft entra in road mapap and we also
have the possibility and Jean will talk about that automatically on board
if you

Marcelo Yannuzzi: have your agent cards at the A2A in well-known URLs, we
can actually take that out and in a fully automated way generate those
badges and verify our credentials for you as part of either of the SAS that
we have that is hosted and maintained by Cisco for the moment powered by
agency or even in the full source release that you can take the code and
start building on top of it. in addition to that we have this W3C
decentralized identities. we have not only deeds but we took a lot of the
design and the methodology around resolvable metadata deep documents and so
on and so forth.

Marcelo Yannuzzi: what we don't have is a sort of distributed ledger or the
decentralized network that enables that capability. initially in agency we
had two parallel programs. One another one was everything that has to do
with identity. we're finalizing the integration between directory and
identity. directory itself is completely distributed.

Marcelo Yannuzzi: behind the scenes we have Cademia and EHTs for making
enabling lookups of different agents at scale and even the possibility to
have connectivity between different agent directories provided by different
entities and I think that if that those capabilities start to roll out and
becoming more widely adopted then there's an interesting possib possibility
to also turn those hosting environments for these directories into identity
nodes that can interplay in a fully decentralized way.

Marcelo Yannuzzi: But just to make sure that everybody understands today
the identity services that we have you can build your own decentralized
network and have that already develop and managed by you in the way you
want by taking the source release that mimic the SAS that we had before or
if you go for the SAS just as a reference implementation and trying to gain
some insights about the art of the possible. For the moment, this is
centralized. I pause here for Any questions before we move into more
details?

Manu Sporny: Yeah, Marcel, this is all wonderful, fantastic stuff. So, when
this announcement first came out to the mailing list, I was really
interested in the work that you were doing and spend a lot of time looking
at your documentation. really neat stuff. and I can already see there are
number of overlaps between work that's happening in other market verticals,
retail, banking, finance, individual identity. I've got some thoughts on so
there are questions around the DID method which one's being used now and
then into the future and I think I'm most interested in finding out from
you is how can we collaborate on this?

Manu Sporny: So what you're building has not total overlap but 60% overlap
with some other projects that we're seeing and I think it would be
beneficial to both to work together and so we're really interested in
trying to figure out how to do that. I guess the core question though is
how do you see the did method evolving over time? So for example to me it
seems like maybe it would be helpful for you to start with did web there is
a who is mechanism that looks like the wellout known identifiers thing that
you're doing here and then eventually transitioning into your cadmia DHT
based DID method and then maybe supporting other DID methods.
00:25:00

Manu Sporny: What's the strategy around how do you see this thing evolving
from what you have today to the DI methods you'd want to use in the future?

Marcelo Yannuzzi: very very good question.

Marcelo Yannuzzi: In fact I would say that I would stage this into two
parts. the beginning we started with u very basic did methods and John will
walk you through what we have today especially for those that are not
familiar with the rep or didn't look at the details so far but I think the
most interesting part is what comes next which is we really would like to
build a leazison between the identity working group and W3C so we can
actually understand

Marcelo Yannuzzi: and cross-pollinate which methods might be a better fit
for some of the use cases that we are seeing and among the things that I
will show you is we have several sub several tracks within the identity
working group and some of those are looking at things like your agent DCRS
they're looking at how do you actually transfer context of different users
in a multi- aent environment or stages where an agent might be invoking
another agent and so on and so forth. we're also having discussions with
octa about cross app and their capabilities that are in draft state today.

Marcelo Yannuzzi: So I see a lot of opportunity but I think what we
probably need to do is try to think about a potentially zone between the
different activities and start with concrete use cases because right now I
would say that we are very open about the potential methods that could be
used and we do not have strong feelings about a specific direction in terms
of deeds as of today.

Manu Sporny: That's very helpful. Thank so the great news is one of the
chairs of the didd working group is here. That's Will Abramson on the call
today. I think maybe some of the other chairs are here. So that's good. I
think that would be wonderful to have that coboration. two thoughts on
that. One of them is we're getting ready to launch a standards track did
methods working group where we will create global standards around a
specific set of DID methods and your requirements I think are really
important to feed into that process so that when we get done you have a DID
method that actually meets your future needs right that would be the ideal
so I think collaboration around that would be wonderful the other thing
that I did not

Manu Sporny: So that's The second thing is the thing I didn't see on this
list is some of the work that we've been doing with DIDs and VCs have to do
with an delegating authorization to a secondary agent where the original
person that delegated might not know about the downstream delegations that
need to happen. We are working on a technology called authorization
capabilities. it's part of the object capabilities work that seems like it
might be useful.

Marcelo Yannuzzi: Nice. Yeah.

Manu Sporny: I don't know, there would be a lot more discussion that would
need to happen. but there's kind of a cryptographic delegated authority use
case in here that I'm kind of hearing you potentially hint at that I wanted
to make sure was on your radar, right? is that in scope for the work that
you're doing beyond identity?

Marcelo Yannuzzi: spot on two things that are important.

Marcelo Yannuzzi: regarding your first comment agency per se is not a
standardization body and I don't think I'm also part of the technical
steering committee I don't think that we're going to go there actually what
we want is to work with different standardization groups to actually push
for what it will be needed and for instance in the next session which is
going to be on Thursday we're going to have people from tales that are
really trying and other companies that are trying to bring this common
vision about UBA requirements use cases and what will be needed as I would
say food thought for standardization bodies.

Marcelo Yannuzzi: So on the first topic fully aligned that it will be great
to start providing inputs to standardization bodies like those in W3C that
can actually take into account the things that we are seeing and providing
also some recommendations for potential specs but not at the level that you
guys have usually work. That is number two, we have been doing a lot of
work around delegated authorization but much more oriented to delegated
authorization with traditional centralized IDPs. So everything that is OIDC
or 2.0.1
00:30:00

Marcelo Yannuzzi: 0.1 Jean has implemented a lot of the stuff that is today
part of taskbased access control and how do you actually exchange those
tokens as part of delegated authorizations and without a human in the loop
but we have not done anything in the space of deeds regarding decentralized
delegated authorization. So it will be very interesting to get potential
hints about direction recommendations on how we should thought about that
in the context of deeds because yes we are it's definitely part of the
charter but so far the only things that we have done in the context of
delegated authorization are much more related to what will be the changes
required for instance for O2 or what type of metadata should be carried to
solve

Marcelo Yannuzzi: some of the problems and octa is actively working on
additional elements of metadata additional talking like ID jacks involving
crossup but will be really good to do this in the context of deeds any
other questions Okay.

Harrison Tang: Let's continue. Yeah.

Marcelo Yannuzzi: So cons considering the time that we have I will speed a
little bit. So here you have direct links both to our SAS the top one here
is the one that I mentioned before and this one you can go there you can
register yourself start using the capabilities offered by our SAS.

Marcelo Yannuzzi: This as I mentioned before is hosted by Cisco by Outshift
and the same capabilities that you have in the SAS you have it available so
you can kickstart your own program with the same capabilities as part of
the source collective and here you have the link to actually get access to
everything including also the good documentation that we have there around
identity service. So what can you do here? then you can start registering
your own IDPS you can bring your own IDP as part of the services that we
offer. You can start registering MCP servers. In terms of agents we support
two types of specs. I will describe that in a moment. you can start
publishing searching and verifying identity badges.

Marcelo Yannuzzi: You can also onboard your own devices for multiffactor
authentication and that will enable what we call typically tback and
without human in the loop. Today we have a reference implementation both in
the SAS and the OSS that is quite elementary…

Marcelo Yannuzzi: but it start Yeah.

Herve Muyal: Marlo,…

Herve Muyal: sorry to interrupt. Are you sharing something?

Marcelo Yannuzzi: Yeah. I am supposed to be sharing my screen.

Herve Muyal: Because we completely lost your screen.

Marcelo Yannuzzi: That's really No,…

Herve Muyal: Maybe when you switch from the slides I guess to the browser
or No. Yeah.

Marcelo Yannuzzi: I didn't touch anything. You see why we need to use WebEx
Allow to share the screen. Very strange. So let's go back.

Harrison Tang: We can reshare it. Yep.

Marcelo Yannuzzi: Can you see the screen?

Herve Muyal: Yeah. It's back.

Marcelo Yannuzzi: very strange I didn't touch anything.

Marcelo Yannuzzi: Anyways, so what I thank you for that one. I will share
the slides afterwards so you have access to everything. and here you can
see of the main features of the SAS that I mentioned before. You have also
available in the open source. And today when it comes to more granular
controls and what we typically call tac the granularity is at the level of
tool per MCP server and we're actively working to actually go much deeper
into that granularity and go into taskbased access control at transaction
level in the future and as I mentioned before with and without human
approval.
00:35:00

Marcelo Yannuzzi: there is a demo application that you can actually use.
and this applies both to the SAS or the open source. Typically what you
will get is there is a financial assistant the chat user interface that is
linked to an agent. this is what we call an agency spec. It uses OA SF
which is the type of data model and the type of agent specification that we
developed as part of agency.

Marcelo Yannuzzi: We also support agents using A2A and there is an MCP
server and Jean will talk about how do we typically see the possibility to
create verifiable budgets and for those MCP servers and also how actually
from a spec on board in the SAS or the open source reference implementation
automatically infer the different tools that are aail available and
automatically render those tools and make it available as part of the
service so that you can start defining policy for those specific tools and
defining access controls. we will walk you a little bit through that.

Marcelo Yannuzzi: as mentioned before today we have support for dua and AI
as well as decentralized identities provided through agency and we are
going to integrate also kicklo in the near future and Microsoft and the
typical you will see in a moment we have very detailed demos that you can
watch with voice over that actually provide multiple different
configurations and capabilities to start testing tabback in the context of
this implementation. And here you have the link in fact this is a almost 18
minute video in YouTube. It is quite detailed. It has several sections.

Marcelo Yannuzzi: It shows you on board and connect your IDP, how to start
registering your identic services including agents and MCP servers. how to
start playing with a financial assistant that has two agents and one MCP
server. it shows also the developer experience including cases where you
might not have an MCP server or an agent that is deployed online and it's
accessible via local host that is also covered as part of the demo. Then
how to start defining policy and on boarding mobile devices for MFA and
then start playing with TBACK in action.

Marcelo Yannuzzi: this is not for seale type of profiles. This is for
developers and identity and access management practitioners. but it's quite
detailed and it shows how to actually get kick started with the entire
service. ideal to go watch then register an account and start playing with
a SAS. if you like it then you can actually go to the open-source
collective and get the software. In terms of the different tracks that we
have as I mentioned before as part of the identity working group we have
several swim lens or subgroups. We have one subgroup that is dealing with
dynamic client registration and know your agent.

Marcelo Yannuzzi: and there are several things that are going on there with
let's say from not so dynamic environments up to fully dynamic environments
and for instance Skyfire Cisco and a few others are involved in that
initiative. We also have tracks around context transfer in that context
transfer that we are particularly involved and there will be more
contributions to the open source from our side and other and other
potential partners in crime here. in that one is where we're looking at
very specific elements of delegated authorizations using claims may act on
behalf of but as I mentioned before everything in the context of more
traditional oath rather than what W3C is conducting.

Marcelo Yannuzzi: So very interested in actually looking at what W3C would
recommend here. cross app multiffactor and several other things. we have
members including Cisco, Dell and others that are actively looking at
potential zones with different groups including other initiatives within
W3C and as part of the technical steering committee. we have people for
instance from Google and Cisco that are both part of A2A and agency and we
are starting to define which are the things that might be pollinating
between the two different initiatives. I think with that if you have any
questions we pause here or I pass the talking to Jean
00:40:00

Harrison Tang: There's a question in the chat do you mind actually clarify
what Tback is and then how is it different from a back rback and…

Harrison Tang: can it be used in combination with a back rback? Yeah.

Marcelo Yannuzzi: Yeah, exactly.

Marcelo Yannuzzi: If you think about it, so rolebased access control in
very simple terms could be seen as a subgroup of Aback attribute-based
access control where the only attribute that you're using is a role. Then
attribute-based access control can be seen as a subgroup of something that
can be more complex which is reback relationship based access control where
the relationships might be entirely based on attributes but of course you
can have relationships that go beyond attributes.

Marcelo Yannuzzi: what we have seen is that typically with rebback those
policies as they can start be becoming quite wild especially for instance
in eback the number of boolean combinations that you may have can become
quite brutal for large companies and also the disse I would say the
disconnect that exists between intense So when you have a workflow agent
that complete might be completely headless and it might be entirely
programmed without a human in the loop or when you have a chat interface
that might interact with an agent and you have human agent interactions at
the end of the day there is an intention that is what the agent should be
doing.

Marcelo Yannuzzi: Then when you go with traditional oc workflows at the end
of the day there is a certain exchange and the agent might require access
to certain tools and when you require access to certain tools there might
be certain scopes defined and there will be a request to access certain
scopes. there is a real disconnect between those two intents. the intent of
what a human might be or a programmer might be asking an agent to do. That
is one intent and the second space of intent is what the agent is asking in
terms of scopes and those two things are completely disconnected today in
industry.

Marcelo Yannuzzi: So TACK is the first attempt to try to bridge this
disconnect in terms of intents and try to add additional metadata that can
reach an outserver so that the out server can actually perform semantic
inspection and start understanding the potential connect between the
original intent and the intent convey as part of the scope requests. so
today we are doing in the reference implementation what we have is
toolbased access control. So the granularity of the controls that you have
is at the tool level and if we think about the sets that I mentioned before
airbback aback and rebback then Tback is actually a set that overlaps with
the three of them but does not contain any of them.

Marcelo Yannuzzi: So TBC is a new approach and for the moment as I
mentioned before it's at the granularity of tool but we plan to go much
deeper into task multitask transactions and so on and so forth. That's
10,000 foot level view of what we're doing.

Harrison Tang: Got it.

Marcelo Yannuzzi: Any other questions?

Harrison Tang: And just to clarify, I think attri attribute based access
control and role based access control. A lot of times we're talking about
which user can have what permission right to what resources.

Harrison Tang: So for the toolbased access control is just about which
agents can access to Is that what it is? Or conceptually? Yeah.
00:45:00

Marcelo Yannuzzi: So in ro attribute relationship there is a lot of
emphasis in the principle and…

Marcelo Yannuzzi: in taskbased access control it's really centered on the
task that is being requested right here right now even with things like one

Marcelo Yannuzzi: time access and that's so the role of that principle
might not be that relevant depending on the use case but of course you can
combine traditional airbag with aback rebback and of course elements of
tback but then the complexity of the policies might be quite high. so
they're not incompatible and…

Harrison Tang: No. Okay.

Marcelo Yannuzzi: they can be implemented in a win scenario.

Marcelo Yannuzzi: John, do you want to show

Ted Thibodeau Jr: Before we jump into that,…

Ted Thibodeau Jr: raised my hand a minute ago. just to be clear, this is
not actually the first effort in this direction. open links rulebook and
request broker technologies in use for decades in our data access and more
recently within virtuoso our flagship product incorporate the application
which is making a connection and the IP address that from which the request
is being made as well as traditional username and password and other
factors in evaluating

Ted Thibodeau Jr: what is allowed. For instance, a given client using
Microsoft Access might be only given 50 rows of any result set because
they're in the sales department and they're expected to jump ship at some
point and we don't want them to take the entire thousands of contacts from
the corporate database into their own personal world.

Ted Thibodeau Jr: Just an example.

Marcelo Yannuzzi: Yeah. it's a good point.

Marcelo Yannuzzi: As far as I understand the majority of this initiatives
what they really lack is two main elements. One is how do you actually
carry in a standardized way additional metadata so that the original intent
actually reaches the out server. And the second one is how do you actually
start empowering this new breed of outs servers with genai capabilities so
that they can actually start understanding semantically speaking the
objective of the task and being able to match that with specific predefined
scopes.

Marcelo Yannuzzi: So that is a complex research area and I have not seen
commercial products at that level yet. the majority of them they end up
dissecting these things into a number of attributes but not really into
that semantic layer but we can take that offline pedals.

Jean-Andrei DIACONU: I guess you can see my screen. so just basically I
will show you the components that we have today in agency and I know that
now we are discussing the Tback and toolbased access control. I will get
there with our SAS and the Tback layer. But just to start at the beginning
so when we created agency one of the things that we wanted to solve first
was agent identity and we were discussing mostly pre-eployment time so not
at runtime but the idea was together with the directory to have a nice way
to provide identities to agents and MCP servers and what we did is actually
we combined IDP so identity providers like octa duo ori that are typically
available in companies

Jean-Andrei DIACONU: in enterprise environment with the badges that Marcelo
presented before and here we took inspiration from W3C verifiable
credential deeds. So thank you for all this work that helped us to reach
this stage. just to present the repository. So the first one is identity
and actually what we created here was and is actually because this is used
in the identity service. I will explain that as well. is where we based on
standards like client credentials and using clients and identity what we
call identity nodes we create the badges and badges being verifiable
credentials.

Jean-Andrei DIACONU: So obviously the issuers of the badges are the
identity providers themselves and basically we combine the client
credentials flow in or with VCs to create this identity CLI and node that
are available in this repository. we have documentation, we have ways to
deploy it. So here there is no user context, there is no users, it's
actually just a CLI connected to an identity node with the idea that at
some point we would actually have a decentralized approach where we'll have
multiple identity nodes and basically some ledger that can help with that.
For the moment it's just simple implementation like a CLI identity node
that works standalone. And here of course the deeds and the methods are
mostly web known exactly what you said before.
00:50:00

Jean-Andrei DIACONU: So this was the initial step. So because we have lots
of components I will just share with you also the documentation. So here we
provide different examples of a fiber credentials for server badges. we
explain how we connect to identity providers and finally we have
implementation of the node and API endpoints. it's things that look very
familiar to you like the VC service where we can publish revoke etc. issuer
service with wellknowns where we can actually link the badges to issuers
and then ways to generate the identifiers and this is actually based on the
identity provider. So B what we do here is actually we take a proof and the
proof comes from the ADP.

Jean-Andrei DIACONU: So it's usually in the form of client credential token
issued component that comes here to actually first generate the issuer but
then secondly generate badges and ids. So this component is actually the
foundation of the next component which is the identity service. So what we
did there is that we automatized a bit the clients. So now the identity
service and the repository is actually here. so the identity service
becomes a SAS. We have a back end and behind the scenes we still use the
identity node. the back end now becomes a client for the node and we
actually provide u easy ways for people to onboard IDPS.

Jean-Andrei DIACONU: And when I say onboard is actually through APIs for
octad or we are working today as you saw in the working groups to add ID
metadata dynamic client registrations to make it even more standardly
available for the moment we support kloe do and octa and also agency ownsh
which is based based n presented before and the identity service itself
actually acts as a client to that node, it onboards The IDP becomes the
issuer. So when I say issuer, it's actually the tenant in the IDP. So
usually it's something like some ID octa.com or dual.com. So it's exactly
let's say the tenant domain of the IDP in a specific company. So in a
tenant you can have only one. It's unique per node of course.

Jean-Andrei DIACONU: And then what we do is we create a services and I can
show you the SAS a bit so you can see how it looks. and you can check that
So in the demo we show end to end how we onboard the issuer issue the
badges of the agentic services and finally we show the runtime with
policies and tbac just to come back to this. so these are the three that we
use So in the repo you will find this sample that is composed of two agents
and one MCP server and we explain a bit how you deploy it how you onboard
it in the platform and how you even explain back just to come back to this
one. if I show you for example and maybe let's take an MCP server because
it's a bit interesting. So you see so at the end of the day what we do is
we create an identity using the IDP.

Jean-Andrei DIACONU: So here is the IDP. so this is actually unique in the
ADP. It's a client ID that is created automatically by the platform and
then when you issue a badge and here something that looks familiar to you.
We are using the issuer which is the tenant IDP in the badge. we have the
ID of the agent that is part of the badge and then depending on the schema
that we use and the MCP is actually part of the tools and we use the tools
and the resources contain something that we can use use cases for example
sometimes verifying a badge before connecting to an MCP server and before
an agent connects to an MCP server and so on.

Jean-Andrei DIACONU: and of course we have different representation of the
badge. We have the ros we can see the claims in a nice way and of course
anyone can come to the platform and verify specific identity to check that
this badge is not revoked and it's still active. yeah so once you actually
onboard the badges on board the agents and issue the badges then you are
ready to for the next step which is actually the runtime and here we use
the tback that Marcelo explained before. So what you need to do is actually
define policies. so for example in the previous example we have different
flows if you check also the demo you will see that we control some of the
flows between those agents and the MCP server and what we actually define
let me take this one because it has more rules.
00:55:00

Jean-Andrei DIACONU: For example, the financial assistant can invoke the
currency exchange MCP server and basically we can choose the tools and
allow the tools that are allowed for these exchanges without human in the
loop. So basically when we use human in the loop we have the possibility to
onboard devices and have notifications when the agent is trying to invoke
those tools or it can be also an agent invoking an agent. So in this case
we have a currency exchange agent which is actually doing the currency
exchange and this can be invoked by the financial assistant can ask a rate
but it cannot exchange itself because it's the currency exchange agent that
does a real grades of currency.

Jean-Andrei DIACONU: so yeah this is the type of policies that we can
define and of course when you have the policy definition part of it is
actually inherited from the badge. So if there's no badge for that service
we will not be seeing these tools here. So when the different services are
changing or updating then the patch needs to be reissue reissued and this
is something that we allow typically by nice APIs or integrated with the
directory which is let's say the part where we could see the agents and
have identities automatically and the identity service acts like the back
end for that directory.

Jean-Andrei DIACONU: in terms of documentation, we also have this portal
here where this is actually the SAS documentation where we explain how you
can connect an identity provider and we have guides for how you actually
create a genic services verifying creating policies and then finally the
same we have the open API clients and protobuffs that you can use and
generate SDKs for the platform. and it was open source I think two weeks
ago but it's also available deployed by agency in a SAS scenario where you
can create a tenant and experiment different things free and there's not
much time so if you have any questions I'm stopping here but we can still
take two minutes of questions

Harrison Tang: Any questions?

Manu Sporny: This was all really great. lots of questions, but I guess what
would be the best way to collaborate concretely? what's the next step?
Should it be an email to the list? Do you want to join the list meeting?
What do you think?

Marcelo Yannuzzi: Yeah, I think it could be birectional. So I think
probably we should have a followup discussion could be via email trying to
identify the things that we see as more relevant. Clearly the delegated
authorization part with deeds is one of them. I also posted a message in
the chat on things that we had this initial idea about the digs resolve the
metadata the badges but it will be great if some of you can try it out and
potentially provide recommendations of feedback about things that we should
consider or improve and then I think it's much more on the specific use
cases that we're seeing and the prioritization that we are observing in the
discussions within

Marcelo Yannuzzi: industry. So, yeah, I would say an email trying to say
maybe these are the lists of things that we see. you can provide feedback
about the list of things that you see and we can find common touching
points.

Manu Sporny: Sounds great. Thank

Harrison Tang: All right,…

Marcelo Yannuzzi: Thank you.

Harrison Tang: any last question? All right, so we're at time. So, Thank
you, Michelle, and…
01:00:00

Harrison Tang: thank you, John, and thank you, Herv, for coming on. And
this is fascinating. So, big thanks.

Marcelo Yannuzzi: Thank you.

Marcelo Yannuzzi: I'll share with you via email the deck.

Herve Muyal: Thanks everyone.

Jean-Andrei DIACONU: much.

Marcelo Yannuzzi: Thank you very much. Bye-bye.

Harrison Tang: Sounds good. Thanks a lot.

Herve Muyal: Bye everyone.
Meeting ended after 01:00:36 👋

*This editable transcript was computer generated and might contain errors.
People can also change the text after it was created.*

Received on Tuesday, 21 October 2025 22:12:48 UTC