Network Working Group T. Reddy Internet-Draft Z. Sarker Intended status: Informational Nokia Expires: 23 November 2026 K. Yao China Mobile 22 May 2026 Agentic AI Use Cases and Requirements draft-agentic-ai-usecases-requirements-00 Abstract This document describes use cases for agentic AI communication systems and derives protocol requirements from those use cases. The requirements are intended to guide IETF standardization work on protocols in the context of agent-to-agent communication, agent-to- tool communication, with focus on multimodal communication, session management, discovery, communication security, agent identity and authentication. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 23 November 2026. Copyright Notice Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components Reddy, et al. Expires 23 November 2026 [Page 1] Internet-Draft agentic-ai-ucreq May 2026 extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Common Protocol Requirements . . . . . . . . . . . . . . . . 5 4. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1. Simple Single-Agent Task . . . . . . . . . . . . . . . . 6 4.1.1. Description . . . . . . . . . . . . . . . . . . . . . 6 4.1.2. Interaction Flow . . . . . . . . . . . . . . . . . . 7 4.1.3. Protocol Requirements . . . . . . . . . . . . . . . . 7 4.2. Orchestrator and Agent Collaboration . . . . . . . . . . 8 4.2.1. Description . . . . . . . . . . . . . . . . . . . . . 8 4.2.2. Interaction Flow . . . . . . . . . . . . . . . . . . 9 4.2.3. Protocol Requirements . . . . . . . . . . . . . . . . 9 4.3. Long-Running Delegated Task with Authorization Checkpoint . . . . . . . . . . . . . . . . . . . . . . . 10 4.3.1. Description . . . . . . . . . . . . . . . . . . . . . 10 4.3.2. Interaction Flow . . . . . . . . . . . . . . . . . . 10 4.3.3. Additional Protocol Requirements . . . . . . . . . . 10 4.4. Peer Collaborative Multi-Agent Problem Solving . . . . . 11 4.4.1. Description . . . . . . . . . . . . . . . . . . . . . 11 4.4.2. Interaction Flow . . . . . . . . . . . . . . . . . . 12 4.4.3. Additional Protocol Requirements . . . . . . . . . . 12 4.5. Cooperative Reasoning and Consensus Formation . . . . . . 14 4.5.1. Description . . . . . . . . . . . . . . . . . . . . . 14 4.5.2. Interaction Flow . . . . . . . . . . . . . . . . . . 14 4.5.3. Protocol Requirements . . . . . . . . . . . . . . . . 15 4.5.4. Additional Protocol Requirements . . . . . . . . . . 15 4.6. Tool, Data, and API Mediation Between Agents . . . . . . 15 4.6.1. Description . . . . . . . . . . . . . . . . . . . . . 15 4.6.2. Interaction Flow . . . . . . . . . . . . . . . . . . 16 4.6.3. Additional Protocol Requirements . . . . . . . . . . 16 5. Security Considerations . . . . . . . . . . . . . . . . . . . 17 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 17 Informative References . . . . . . . . . . . . . . . . . . . . . 17 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18 Reddy, et al. Expires 23 November 2026 [Page 2] Internet-Draft agentic-ai-ucreq May 2026 1. Introduction An AI agent is an autonomous, adaptive intelligent software system that uses AI models to complete a specific objective on behalf of a user or another AI agent. It makes decisions, executes actions, and interacts with other agents through tasks and tools. Unlike traditional software workloads that follow fixed execution paths, an AI agent dynamically determines at run time which actions to take, which tools to invoke, and which agents to collaborate with, based on reasoning over its goals and context. This document presents use cases that illustrate the key interaction patterns of agentic AI communication systems, and derives protocol requirements from those use cases. The requirements are intended to drive development of protocols and a protocol framework for agentic AI systems. The use cases in this document cover interaction patterns for agentic AI communication systems. This document takes into account related use case and problem statement documents including [SCRM], [YAO], [SONG], and [ROSENBERG], and existing protocol work including [A2A] and [MCP]. 2. Terminology *AI Agent*: An autonomous software entity that perceives its environment, maintains internal state, and executes actions to achieve specified goals, potentially including communication with other agents or invocation of external tools. *Agent Identity*: Identity information associated with an AI agent, used for authentication and accountability within agentic communication systems. *Agentic AI Communication System*: A system comprising one or more AI agents that communicate with each other, with users, and with external tools or services to complete tasks. The communication interfaces between these entities are the subject of protocol standardization in this document. *Agent-to-Agent Communication*: Direct or brokered communication between two or more AI agents, where brokered communication involves an intermediary agent or coordination service, as distinguished from communication between an agent and a user or between an agent and a tool. *Capability*: A description of what an agent can perform, including inputs, outputs, constraints, and required conditions. Reddy, et al. Expires 23 November 2026 [Page 3] Internet-Draft agentic-ai-ucreq May 2026 *Context*: The set of data, state, and history shared between agents to enable task execution and coordination. *Coordinator Agent*: An agent that distributes a shared problem or task to a group of peer agents, aggregates their outputs, and iteratively drives them toward a collective result or consensus. *Delegation*: The act of an agent requesting another agent to execute a task on its behalf. *Initiating Agent*: An agent that receives an initial request and delegates subtasks to peer agents. Any peer agent may itself delegate further to other agents without routing through the initiating agent. *Mediator*: An entity that serves as a proxy or mediator for external tools, APIs, databases, or other resources that other agents require but cannot directly access. *Message*: A discrete unit of communication exchanged between agents containing structured data such as a task request, response, progress update, event notification, or control signal. *Modality*: A category of data format used for input or output in agent communication, such as text, audio, image, or video. A session may support one or more modalities simultaneously. *Orchestrator Agent*: An agent that acts as a controller, coordinating the activity of other agents by decomposing goals into sub-tasks and delegating those sub-tasks to appropriate agents. *Peer Agent*: An agent that receives delegated subtasks from another agent and may itself delegate further to other agents. *Session*: A logical communication exchange shared between two or more agents over a period of time, which may persist across multiple individual message exchanges and network connections. A session can carry and maintain one or more contexts shared between agents. *Task*: A unit of work submitted by a user to an agent, or delegated by one agent to another. *Task State*: The current execution status of a task (e.g., pending, in-progress, completed, failed). *Tool*: An external service invoked by an agent to retrieve data or perform operations. A tool is not necessarily an agent and may not participate in agent-to-agent communication. Reddy, et al. Expires 23 November 2026 [Page 4] Internet-Draft agentic-ai-ucreq May 2026 *User*: A human that initiates interaction with an AI agent by submitting a request or task. 3. Common Protocol Requirements The following baseline requirements apply to both agent-to-agent and agent-to-tool protocol interactions across all use cases and are not repeated per use case. Each per-use-case requirement is tagged with one or more of the following protocol area tags to allow cross-use-case navigation: * *Discovery*: Requirements related to locating, advertising, or selecting agents, tools, or capabilities. * *Transport*: Requirements related to message delivery, streaming, cancellation, session management, and data transfer. * *Security*: Requirements related to confidentiality, integrity, and authorization. * *Authentication*: Requirements related to identity verification and credential delegation. +========+========================================+================+ | REQ-ID | Description | Tag | +========+========================================+================+ | CMN-1 | The protocol is required to support | Discovery, | | | any client application to communicate | Authentication | | | with any agent service. | | +--------+----------------------------------------+----------------+ | CMN-2 | Mutual authentication is required | Authentication | | | between all communicating parties. | | +--------+----------------------------------------+----------------+ | CMN-3 | All protocol traffic is required to be | Security | | | encrypted and integrity-protected in | | | | transit. | | +--------+----------------------------------------+----------------+ | CMN-4 | Structured error responses are | Security | | | required to include an authorization | | | | scope violation type, reported by the | | | | orchestrator or mediator when an agent | | | | attempts an action that exceeds or | | | | contradicts the scope delegated to it. | | +--------+----------------------------------------+----------------+ | CMN-5 | Structured error responses are | Transport | | | required, distinguishing at minimum: | | | | authentication failure, authorization | | Reddy, et al. Expires 23 November 2026 [Page 5] Internet-Draft agentic-ai-ucreq May 2026 | | failure, timeout, and internal error. | | +--------+----------------------------------------+----------------+ | CMN-6 | The protocol is required to provide a | Transport | | | means to signal task priority so that | | | | critical-path tasks can be scheduled | | | | ahead of lower-priority ones. | | +--------+----------------------------------------+----------------+ | CMN-7 | The protocol is required to support | Security, | | | cryptographic algorithm agility, | Authentication | | | ensuring that cryptographic algorithms | | | | used for encryption, authentication, | | | | credential verification, and integrity | | | | protection can be negotiated and | | | | updated over time, in accordance with | | | | [RFC7696]. | | +--------+----------------------------------------+----------------+ | CMN-8 | The protocol is required to provide a | Authentication | | | means to verify the agent | | | | authentication credentials validity | | | | used by agents at the time of use. | | +--------+----------------------------------------+----------------+ | CMN-9 | The protocol is required to support | Security | | | signaling credential revocation and | | | | invalid credential outcomes. | | +--------+----------------------------------------+----------------+ Table 1 4. Use Cases 4.1. Simple Single-Agent Task 4.1.1. Description A user submits a task to an AI agent via a client application. The agent executes the task by invoking one or more tools and returns results to the user. The tools invoked by the agent may reside in the same or a different administrative domain. The agent protocol is required to support multiple input and output modalities, and the client application and agent are required to be able to negotiate which modalities are active for the session. This use case covers the protocol interface between the client application and the agent. The interaction between the user and the client application is out of scope. This use case assumes that the user communicates with the agent via a client application; direct communication between a user and an agent without an intermediary client application is not covered in this use case. Reddy, et al. Expires 23 November 2026 [Page 6] Internet-Draft agentic-ai-ucreq May 2026 This interaction pattern is described in [ROSENBERG] and [SCRM]. 4.1.2. Interaction Flow +----------------+ +-----------+ | App/agent |<--------------------> | Agent | +----------------+ Protocol +-----------+ | Protocol | v +---------+ | Tool(s) | +---------+ 4.1.3. Protocol Requirements +========+=====================================+================+ | REQ-ID | Description | Tag | +========+=====================================+================+ | A1-1 | The protocol is required to support | Transport | | | incremental streaming of agent | | | | output, allowing partial results to | | | | be delivered to the client before | | | | the agent has completed processing. | | +--------+-------------------------------------+----------------+ | A1-2 | The protocol is required to define | Transport | | | a task cancellation message that | | | | the client can issue at any point | | | | during task execution. | | +--------+-------------------------------------+----------------+ | A1-3 | The protocol is required to define | Transport | | | structured error message types that | | | | distinguish at minimum: transport | | | | failure, tool invocation failure, | | | | and agent processing failure. | | +--------+-------------------------------------+----------------+ | A1-4 | The protocol is required to support | Transport | | | multiple modalities for both input | | | | and output. | | +--------+-------------------------------------+----------------+ | A1-5 | The protocol is required to support | Discovery, | | | modality negotiation at session | Transport | | | setup, allowing the client and | | | | agent to agree on which modalities | | | | are active for the session. | | +--------+-------------------------------------+----------------+ | A1-6 | The protocol is required to support | Transport | | | agent-initiated notifications to | | Reddy, et al. Expires 23 November 2026 [Page 7] Internet-Draft agentic-ai-ucreq May 2026 | | the client during task execution. | | +--------+-------------------------------------+----------------+ | A1-7 | The protocol is required to support | Discovery, | | | concurrent invocation of multiple | Transport, | | | tools within a single agent task, | Security | | | where tools may be operated by | | | | distinct providers across different | | | | administrative domains, each with | | | | independent authentication and | | | | authorization requirements. | | +--------+-------------------------------------+----------------+ | A1-8 | The protocol is required to support | Transport | | | bulk transfer of large data between | | | | communicating parties, applicable | | | | to both agent-to-tool and agent-to- | | | | agent interactions. | | +--------+-------------------------------------+----------------+ | A1-9 | A delegation mechanism is required | Authentication | | | to be defined by which an agent | | | | presents to a tool provider a | | | | credential attesting the | | | | authorization for the requested | | | | tool access, without exposing the | | | | client's primary credentials. | | +--------+-------------------------------------+----------------+ Table 2 4.2. Orchestrator and Agent Collaboration 4.2.1. Description An orchestrator agent acts as a controller, decomposing a task into subtasks and delegating them asynchronously to one or more other agents. The orchestrator decides which other agents to invoke, sequences the delegation, and aggregates results to continue task execution. Each agent executes the respective subtask independently and reports results back to the orchestrator. It should be noted that AI models are stateless by nature — each inference call processes only what is explicitly provided with a particular context, with no persistent memory between calls. The application layer is responsible for maintaining the context across the calls by carrying conversation history, intermediate results, and task state. Session continuity is therefore required to preserve this accumulated context across network interruptions, ensuring that a reconnecting agent can restore the prior task context without having to reconstruct it from scratch. Reddy, et al. Expires 23 November 2026 [Page 8] Internet-Draft agentic-ai-ucreq May 2026 This pattern is described in [ROSENBERG] and reflected in [A2A], and is implemented in deployed multi-agent frameworks including [AUTOGEN], [LANGCHAIN], and [OPENAI-AGENTS]. 4.2.2. Interaction Flow +---------------------+ +------------+ | Orchestrator Agent |---Task Delegation----->| Agent-1 | | |<--Result Reporting-----| | | | +------------+ | | | | +------------+ | |---Task Delegation----->| Agent-2 | | |<--Result Reporting-----| | +---------------------+ +------------+ 4.2.3. Protocol Requirements +========+==============================================+===========+ | REQ-ID | Description | Tag | +========+==============================================+===========+ | B1-1 | The protocol is required to | Transport | | | facilitate task delegation for an | | | | orchestrator to agents that includes | | | | task delegation and acknowledgement | | | | message types. | | +--------+----------------------------------------------+-----------+ | B1-2 | The protocol is required to support | Transport | | | asynchronous delegation, allowing the | | | | orchestrator to delegate to multiple | | | | agents without waiting for each to | | | | complete before proceeding. | | +--------+----------------------------------------------+-----------+ | B1-3 | The protocol is required to define a | Transport | | | result reporting message by which an | | | | agent returns its completed output to | | | | the orchestrator. | | +--------+----------------------------------------------+-----------+ | B1-4 | The protocol is required to support | Transport | | | streaming of intermediate results | | | | from the agent to the orchestrator | | | | during task execution. | | +--------+----------------------------------------------+-----------+ | B1-5 | The protocol is required to define a | Transport | | | task cancellation message that the | | | | orchestrator can send to an agent to | | | | abort a delegated subtask. | | +--------+----------------------------------------------+-----------+ Reddy, et al. Expires 23 November 2026 [Page 9] Internet-Draft agentic-ai-ucreq May 2026 | B1-6 | The protocol is required to support | Transport | | | persistent session identifiers that | | | | survive network interruption, and is | | | | required to define a session | | | | resumption message by which an agent | | | | re-attaches to an interrupted session | | | | restoring the prior task context. | | +--------+----------------------------------------------+-----------+ Table 3 4.3. Long-Running Delegated Task with Authorization Checkpoint 4.3.1. Description An orchestrator agent delegates a long-running task to other agents. The delegated agent executes the task autonomously and sends progress notifications to the orchestrator. At any certain point one or more delegated agents pause and request explicit authorization from the orchestrator before proceeding further. The orchestrator may relay this authorization request to the invoker (user or agent) or resolve it autonomously based on policy. This pattern is reflected in the In-Task Authorization mechanism defined in [A2A]. 4.3.2. Interaction Flow +---------------------+ +------------+ | Orchestrator Agent |---Task Delegation----->| | | |<--Progress Notif.------| | | |<--Authz Checkpoint-----| Agent(s) | | |---Authz Response------>| | | |<--Result Reporting-----| | +---------------------+ +------------+ 4.3.3. Additional Protocol Requirements This use case builds on the requirements defined for Section 4.2 and introduces additional requirements specific to authorization checkpoints in delegated tasks. Reddy, et al. Expires 23 November 2026 [Page 10] Internet-Draft agentic-ai-ucreq May 2026 +========+=============================================+============+ | REQ-ID | Description | Tag | +========+=============================================+============+ | B2-1 | The protocol is required to support | Transport | | | agent-initiated progress | | | | notifications to the delegating agent | | | | during task execution. | | +--------+---------------------------------------------+------------+ | B2-2 | The protocol is required to define an | Transport, | | | authorization checkpoint message by | Security | | | which an agent pauses task execution | | | | and requests explicit authorization | | | | from the orchestrator before | | | | proceeding. The message is required | | | | to include sufficient context for the | | | | authorizing party to make an informed | | | | decision, including the action to be | | | | taken and its potential consequences. | | +--------+---------------------------------------------+------------+ | B2-3 | The protocol is required to define | Transport, | | | the valid responses to an | Security | | | authorization checkpoint, including | | | | at minimum: approve, deny, and | | | | approve with modified parameters. A | | | | denial is required to be conveyed as | | | | an explicit error response. | | +--------+---------------------------------------------+------------+ | B2-4 | The protocol is required to support a | Transport | | | response timeout, after which the | | | | agent treats the request as | | | | unresolved and halts the affected | | | | subtask. | | +--------+---------------------------------------------+------------+ Table 4 4.4. Peer Collaborative Multi-Agent Problem Solving 4.4.1. Description A task requires coordinated problem solving across multiple agents, where no single agent has full authority or capability to complete the task alone. The agent that receives the initial request dynamically delegates subtasks to peer agents based on their advertised capabilities. Any agent may itself delegate further to other agents and use other tools, forming a dynamic collaboration graph. Each agent remains opaque to others, collaborating only through the protocol interface. Reddy, et al. Expires 23 November 2026 [Page 11] Internet-Draft agentic-ai-ucreq May 2026 This use case introduces multi-hop delegation chains that are not present in Section 4.2. Each agent in the chain may delegate further to other agents, and authorization scope is required to be progressively constrained at each hop. This use case is described in [A2A] and [ROSENBERG]. 4.4.2. Interaction Flow +------------------+ | Initiating Agent | +------------------+ | | v v +--------+ +--------+ |Agent-2 | |Agent-3 | +--------+ +--------+ | | v v +--------+ +--------+ |Agent-4 | | Tools | +--------+ +--------+ 4.4.3. Additional Protocol Requirements This use case builds on the requirements defined for Section 4.2 and introduces additional requirements specific to multi-hop delegation chains. +========+=====================================+=================+ | REQ-ID | Description | Tag | +========+=====================================+=================+ | B3-1 | The protocol is required to support | Authentication, | | | multi-hop delegation chains, where | Security | | | an agent that receives a delegated | | | | subtask may itself delegate further | | | | to other agents. At each hop, the | | | | delegating agent is required to | | | | present a credential that does not | | | | exceed the authorization scope of | | | | the credential it received. | | +--------+-------------------------------------+-----------------+ | B3-2 | The protocol is required to | Authentication, | | | preserve the identity of the | Security | | | originating entity across all hops | | | | in the delegation chain, such that | | | | any agent in the chain can | | | | determine the identity of the | | Reddy, et al. Expires 23 November 2026 [Page 12] Internet-Draft agentic-ai-ucreq May 2026 | | entity that originally authorized | | | | the task. | | +--------+-------------------------------------+-----------------+ | B3-3 | The protocol is required to support | Authentication, | | | transferable credentials that carry | Security | | | the original authorization | | | | constraints across all hops in the | | | | delegation chain. Each receiving | | | | agent is required to be able to | | | | cryptographically verify that the | | | | credential presented to it was | | | | issued by the delegating agent and | | | | that the chain of delegation traces | | | | back to the original authorization. | | +--------+-------------------------------------+-----------------+ | B3-4 | The protocol is required to ensure | Authentication, | | | that authorization granted to an | Security | | | agent in a delegation chain, | | | | including for tool invocations, is | | | | derived from the authorization | | | | issued by the initiating agent, and | | | | not from the identity or | | | | authorization scope of any | | | | intermediate agent in the chain. | | +--------+-------------------------------------+-----------------+ | B3-5 | The protocol is required to define | Registration, | | | a capability registration mechanism | Discovery | | | by which agents can publish | | | | metadata describing their | | | | capabilities, supported protocols, | | | | rate limits, authentication | | | | methods, authorization mechanisms, | | | | and authorization scopes to a | | | | discovery service or registry. | | +--------+-------------------------------------+-----------------+ | B3-6 | The protocol is required to define | Discovery | | | a capability discovery mechanism by | | | | which agents can query a discovery | | | | service or registry to discover and | | | | select appropriate peer agents at | | | | runtime without requiring prior | | | | peer-specific configuration. | | +--------+-------------------------------------+-----------------+ | B3-7 | The protocol is required to define | Discovery | | | an agent identifier format that | | | | uniquely represents an agent | | | | identity and is resolvable to the | | | | agent's communication endpoint | | Reddy, et al. Expires 23 November 2026 [Page 13] Internet-Draft agentic-ai-ucreq May 2026 | | using an appropriate discovery | | | | mechanism. | | +--------+-------------------------------------+-----------------+ | B3-8 | The protocol is required to ensure | Discovery, | | | that advertised capabilities are | Security | | | integrity-protected, such that a | | | | discovering agent can verify they | | | | have not been tampered with. | | +--------+-------------------------------------+-----------------+ Table 5 4.5. Cooperative Reasoning and Consensus Formation 4.5.1. Description A set of peer agents is tasked with analyzing a shared problem independently and exchanging intermediate reasoning outputs to converge on a collective conclusion. A coordinator agent distributes the problem to all participating agents, collects their reasoning outputs, and drives the convergence process across multiple rounds until a consensus conclusion is reached. Unlike Section 4.4, all agents work on the same problem rather than different subtasks. Two communication topologies are possible. In the first, agents communicate only through the coordinator, which acts as the central hub for all message exchange. In the second, agents may also communicate directly with each other to exchange intermediate reasoning outputs without routing through the coordinator agent. The second topology introduces the same multi-hop authorization requirements defined in Section 4.4. 4.5.2. Interaction Flow The coordinator-mediated topology: +--------------------+ | Coordinator agent | +--------------------+ / | \ v v v +--------+ +--------+ +--------+ |Agent-1 | |Agent-2 | |Agent-3 | +--------+ +--------+ +--------+ The direct agent-to-agent topology: Reddy, et al. Expires 23 November 2026 [Page 14] Internet-Draft agentic-ai-ucreq May 2026 +--------------------+ | Coordinator agent | +--------------------+ / | \ v v v +-------+ +-------+ +-------+ |Agent-1| <-> |Agent-2| <-> |Agent-3| +-------+ +-------+ +-------+ ^ ^ |___________________________| 4.5.3. Protocol Requirements This use case builds on the requirements defined for Section 4.2 and introduces additional requirements specific to group message delivery. 4.5.4. Additional Protocol Requirements +========+=============================================+============+ | REQ-ID | Description | Tag | +========+=============================================+============+ | B4-1 | The protocol is required to support | Transport, | | | one-to-one, one-to-many, and many-to- | Security | | | many message delivery among a defined | | | | group of agents. Group membership is | | | | required to be dynamic, allowing | | | | agents to join or leave the group | | | | during the course of an exchange. | | +--------+---------------------------------------------+------------+ Table 6 4.6. Tool, Data, and API Mediation Between Agents 4.6.1. Description In many multi-agent deployments, access to external resources — APIs, databases, enterprise systems, or hardware interfaces — is intentionally mediated through a designated mediator. Other agents request the mediator to perform actions or retrieve data on their behalf, rather than directly invoking external systems. This architecture allows access control, auditing, rate limiting, and schema normalization to be applied uniformly at the mediation layer. The mediator may also serve as an adapter between the agent protocol and non-agent systems or other services that do not natively support agent communication protocols, or between different agent Reddy, et al. Expires 23 November 2026 [Page 15] Internet-Draft agentic-ai-ucreq May 2026 communication protocols such as translating between the agentic protocol suite being developed at the IETF and existing protocols such as [MCP] and [A2A]. In this role, the mediator is responsible for protocol translation and for presenting the appropriate credentials to the target system on behalf of the requesting agent. The mediator may additionally act as a request router, dispatching requests to appropriate agents or tools based on the content and context of the request, without requiring the requesting agent to have prior knowledge of which agent or tool is most appropriate. The mediator may also validate agent requests before invocation, checking whether the action being requested matches the authorization granted to the agent and whether execution would cause unintended or irreversible side effects. Note that mediating can be a function within an orchestrator. This pattern is reflected in the MCP server architecture defined in [MCP] and the agent routing patterns discussed in [A2A]. 4.6.2. Interaction Flow +--------------+ | Agent | +--------------+ | v +--------------+ | Mediator | +--------------+ / | \ v v v +--------+ +---------+ +--------+ | Agent-1 | | Tool | | Agent-2 | +--------+ +---------+ +--------+ 4.6.3. Additional Protocol Requirements +========+============================================+============+ | REQ-ID | Description | Tag | +========+============================================+============+ | B5-1 | The protocol is required to define error | Transport, | | | response types for request validation | Security | | | failure (rejected due to potential | | | | unintended or irreversible side effects) | | | | and protocol translation failure (rejected | | | | on unsuccessful translation of a request | | Reddy, et al. Expires 23 November 2026 [Page 16] Internet-Draft agentic-ai-ucreq May 2026 | | or response between supported protocols), | | | | distinct from authorization failure. | | +--------+--------------------------------------------+------------+ | B5-2 | The protocol is required to support | Security | | | exchange of structured (audit) record for | | | | each action performed on behalf of a | | | | requesting agent, including the requesting | | | | agent's identity, the authorization | | | | credential presented, the action taken, | | | | and the outcome. | | +--------+--------------------------------------------+------------+ Table 7 5. Security Considerations Security considerations are addressed throughout this document via the Identity, Authentication, and Delegation requirements defined for each use case. Agent identity and authentication mechanisms are further discussed in [KLRC]. Agent identity information is considered to be sensitive, particularly in multi-domain deployments. Use of persistent identifiers across sessions and domains can enable tracking and correlation of agent activity. Protocol designers need to consider mechanisms such as pseudonymous or temporary identifiers to reduce linkability, while preserving the ability to audit and enforce accountability where required. The trade-offs between privacy, accountability, and traceability need to be considered in the design of agent identity mechanisms. 6. IANA Considerations This document has no IANA actions. Acknowledgements Thanks to Borislava Gajic, Julien Maisonneuve, Parisa Foroughi, Laurent Ciavaglia, Peter Leis and Sina Khatibi for the discussions and comments. Informative References [A2A] "Agent2Agent Protocol Specification", n.d., . [AUTOGEN] "AutoGen: A Framework for Multi-Agent Conversation", n.d., . Reddy, et al. Expires 23 November 2026 [Page 17] Internet-Draft agentic-ai-ucreq May 2026 [KLRC] "AI Agent Authentication and Authorization", n.d., . [LANGCHAIN] "LangChain Agent Framework", n.d., . [MCP] "Model Context Protocol Specification", n.d., . [OPENAI-AGENTS] "OpenAI Agents SDK", n.d., . [RFC7696] "Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms", n.d., . [ROSENBERG] "Framework, Use Cases and Requirements for AI Agent Protocols", n.d., . [SCRM] "Agentic AI Use Cases", n.d., . [SONG] "Problem Statement and Requirements for Dynamic Multi- agent Secured Collaboration", n.d., . [YAO] "Problem Space Analysis of AI Agent Protocols in IETF", n.d., . Authors' Addresses Tirumaleswar Reddy Nokia Bangalore Karnataka India Email: kondtir@gmail.com Reddy, et al. Expires 23 November 2026 [Page 18] Internet-Draft agentic-ai-ucreq May 2026 Zaheduzzaman Sarker Nokia Sweden Email: zaheduzzaman.sarker@nokia.com Kehan Yao China Mobile Email: yaokehan@chinamobile.com Reddy, et al. Expires 23 November 2026 [Page 19]