Protocols
Agent-to-Agent Protocol: What A2A Is, How It Works, and How It Differs From MCP
Learn what Agent-to-Agent Protocol is, how A2A handles cross-agent communication, and when builders should care about A2A versus MCP.

Guide coverage
Protocols
Agent News Watch for teams building and operating AI agents.
Use A2A when separate agent systems need a standard way to discover each other, delegate work, and track task state. Do not use it as a substitute for tool access standards or for basic workflow design inside one bounded system.
Agent-to-Agent Protocol, often shortened to A2A, is a standard for communication between agentic applications. It is about one agent system discovering another, negotiating how work should be handed off, and collaborating over longer-running tasks without exposing internal chain-of-thought or implementation details. The live A2A v1.0.0 brief covers the release signal. This guide explains the architecture meaning behind it.
The most common confusion is treating A2A and Model Context Protocol as if they solve the same problem. They do not. MCP helps a model or host application access tools and context. A2A helps separate agent systems collaborate as networked participants. If you want the workflow-control view around those handoffs, pair this page with AI Agent Orchestration. If you are mapping the system boundary around those handoffs, keep AI Agent Architecture nearby as well, and use Multi-Agent Architecture when the real question is which coordination pattern fits.
What Agent-to-Agent Protocol is
A2A is an interoperability standard for agent systems that need to communicate across process, service, vendor, or framework boundaries. The protocol focuses on capability discovery, task creation, state updates, and the secure exchange of structured task information between participants.
The useful mental model is simple: A2A standardizes how one agent service asks another agent service to do work and report progress. It does not define your whole application architecture, and it does not replace the model-to-tool layer.
1Client or coordinator agent2 -> discover remote agent capability3 -> create or delegate task4 -> receive task status and outputs5 -> decide to continue, retry, or escalate6Remote agent service7 -> accepts scoped task8 -> executes local workflow9 -> reports progress or result
The problem A2A is trying to solve
As teams build more agent systems, many handoffs stop fitting inside one prompt loop or one framework runtime. A research agent may need a specialized coding agent. A support workflow may need a compliance review service. A platform team may want multiple teams to expose agent capabilities without rewriting a custom integration for each one.
Without a protocol, those handoffs often become bespoke RPC calls, hidden prompts, or brittle webhook conventions. A2A exists to replace that improvised layer with a more explicit contract for discovery, delegation, and task progress tracking.
How A2A works at a high level
At a high level, an A2A interaction starts when one agent service discovers another service and learns what kinds of tasks it can handle. The initiating system then submits a task, monitors progress, and receives the result or follow-up state changes over a defined protocol surface.
11. Discover a remote agent and its capabilities22. Negotiate auth and task expectations33. Create or delegate a task with structured input44. Receive task identifiers and progress updates55. Inspect outputs, status, or follow-up requirements66. Continue locally, delegate again, or escalate to a human
That flow matters because it gives operators a more inspectable way to reason about delegated work. Instead of hiding the handoff inside prompt text, the workflow can point to a concrete task boundary with a state model around it.
A2A vs MCP: what each standard covers
1Question | A2A | MCP2Primary job | Agent-to-agent task delegation | Model or host access to tools and resources3Main boundary | Between separate agent systems | Between a client and capability servers4Typical use case | Planner delegates to a remote specialist | Agent reads docs or calls a tool through a standard interface5State emphasis | Task lifecycle, progress, and handoff status | Capability discovery and resource or tool access6What it does not replace | Workflow design, auth policy, security | Application logic, orchestration, security policy
That comparison is why the two standards often complement each other instead of competing. A bounded agent architecture may use MCP to reach tools and context, and use A2A only when work must cross into another agent service with its own runtime and trust boundary.
A simple multi-agent example
Consider a planner, researcher, and executor pattern. The planner receives a goal, decides that external research is needed, and delegates a scoped task to a research agent. The research agent returns findings, and the planner then asks a separate executor agent to turn the approved findings into an operational action. The handoffs matter because each specialized agent may live in a different service, with different policies and tools.
1Planner agent2 -> create research task on remote researcher3 -> receive findings and confidence notes4 -> create execution task on remote executor5 -> review result and request approval if needed
Use AI Agent Architecture to decide whether that specialization is worth the coordination cost at all. Many workflows should stay single-agent until the need for separation is real.
Adoption signals and ecosystem momentum
The reason builders should care now is not only the idea of agent interoperability. It is that the standard has moved into a more serious implementation phase. The stable 1.0.0 release, ecosystem examples, and adjacent framework moves covered in the weekly AI agent launch roundup all point to a market that is formalizing delegation and task handoff semantics instead of leaving them implicit.
That does not mean every team should adopt A2A immediately. It does mean teams building multi-agent platforms, framework integrations, or cross-service agent workflows should at least know how the standard carves up the problem.
Security and trust considerations in agent-to-agent communication
Interoperability increases the need for explicit trust boundaries. Before one agent can delegate to another, teams need to know who is calling, on whose behalf, with what scope, and how task state is audited. Otherwise a clean protocol surface can still carry unsafe delegation.
That is why AI Agent Security belongs next to this guide. Identity, scoped auth, approval rules, and output validation matter more once work starts crossing agent-service boundaries.
When builders should care now vs later
Care now if your team runs multiple agent services, evaluates framework portability, or expects handoffs across independent runtimes. Monitor for later if one bounded agent and a few internal tools still cover the job. A2A is not a requirement for every useful workflow. It is a standard that becomes valuable when coordination itself becomes an engineering problem.
What to read next
Use Model Context Protocol to separate tool access from cross-agent delegation, AI Agent Architecture to decide whether delegation belongs in the design at all, AI Agent Orchestration to govern the workflow around handoffs, and AI Agent Security to lock down trust boundaries. Then keep the A2A v1.0.0 brief nearby for live spec momentum and migration context.
Continue the guide path
Move from this topic into the next pilot, architecture, stack, protocol, or live-release decision.

Guide coverage
Protocols
Agent News Watch for teams building and operating AI agents.
Protocols
Learn what Model Context Protocol is, how MCP clients and servers work, and when it beats bespoke tool integrations for AI agents.

Guide coverage
Implementation
Agent News Watch for teams building and operating AI agents.
Implementation
Learn AI agent orchestration patterns for coordinating state, tools, retries, approvals, and multi-step workflows without overbuilding your stack.

Guide coverage
Architecture
Agent News Watch for teams building and operating AI agents.
Architecture
Learn when multi-agent architecture outperforms single-agent systems, which coordination patterns fit best, and how to manage context, reliability, security, and cost.

Guide coverage
Security
Agent News Watch for teams building and operating AI agents.
Security
Learn how to secure AI agents against prompt injection, over-permissioned tools, unsafe memory, insecure handoffs, and risky outputs with practical controls.

News coverage
Protocols / Interoperability
Agent News Watch for teams building and operating AI agents.
Protocols / Interoperability
A2A v1.0.0 adds tasks/list, modern OAuth flows, multitenant gRPC support, and breaking spec cleanup. Here is what agent builders need to test.