AgentBrief: curated daily news for the agentic web. Sign up now →AgentBrief: curated daily news for the agentic web. Sign up now →

The Emerging Agent Discovery Stack

·Agent Community
#aid#.agent#agent-discovery#agent-identity#dns#trust#registries#agentic-web
View Source

The Emerging Agent Discovery Stack

Imagine a client is asked to interact with the support agent for acme.com.

First, the client needs a low-friction starting point: "where should I go, and which protocol should I speak?" A DNS-first mechanism such as AID can answer that with a compact record at _agent.acme.com, while other proposals use richer DNS namespaces, SVCB records, or protocol-specific labels such as _mcp.acme.com.

Second, the client needs description: what can the agent do, which skills or tools does it expose, what authentication does it require, and how should a client invoke it? That information usually belongs in an agent card, manifest, registry entry, or /.well-known document rather than in DNS.

Third, the client needs trust and authorization. DNS control can help anchor a claim, but it does not by itself prove legal authority, delegated permission, or runtime safety. Endpoint proof, domain validation, OAuth-style delegation, workload identity, enterprise governance, and audit all become separate questions.

Fourth, if the task involves money, the client needs a commerce layer: product or service discovery, user intent, payment authorization, settlement, receipts, dispute evidence, and network risk signals. That is where x402, Stripe/OpenAI's Agentic Commerce Protocol, Google's AP2, Google's UCP, Machine Payments Protocol, ERC-8183, and card-network trust efforts enter the picture. They sit above discovery because they depend on finding and trusting the right parties first.

That staged model is the core of the current landscape. A domain or handle gets the client started; a card, manifest, or registry explains the agent; a trust layer verifies who stands behind it; an authorization layer constrains what it may do; and domain-specific surfaces such as marketplaces or commerce networks add ranking, policy, consent, payment, and transaction guarantees.

If the agentic web becomes more than a product metaphor, agents will need to be named, found, described, and trusted across organizational boundaries. That sounds like one problem, but it is really several. "Finding an agent" can mean resolving a stable identifier, locating an endpoint, retrieving machine-readable metadata, verifying who stands behind that endpoint, and deciding whether the agent is authorized to act in context.

As of April 24, 2026, agent discovery has not settled on one protocol. The more interesting signal is that experimentation is making the requirements clearer. Different approaches overlap, sometimes awkwardly, but the overlap is revealing the stack: bootstrap, description, trust, authorization, registries, overlays, governance, and commerce are separating into different responsibilities.

This piece is published by Agent Community, which maintains AID. AID is listed first where it is directly relevant.

Layered diagram of the emerging agent discovery stack, with DNS-first bootstrap beneath richer discovery, trust, governance, overlays, and commerce layers.

Agent Community is also organizing the community bid for the .agent TLD as a naming layer for the agentic web. That context matters to us, but AID is designed for any domain and the broader stack discussed here applies far beyond .agent.

Why This Is Happening Now

Agent discovery sits between two eras of internet infrastructure.

The first era gave us durable identity and metadata building blocks: SAML metadata, WebFinger, OIDC and OAuth discovery, SCIM, OpenID Federation, ACME, DNSSEC, DANE/TLSA, transparency logs, and workload identity patterns. Identity-literate readers will recognize the inheritance: names, issuers, metadata, keys, policy, provisioning, and trust chains.

The agent wave adds a different pressure. Software actors now need to be discoverable as task-performing endpoints across organizational boundaries. They may expose protocols such as MCP or A2A, carry machine-readable capability descriptions, prove endpoint authenticity, receive delegated authority from a user or organization, appear in registries or marketplaces, and participate in commerce flows.

That is why the field does not look like one clean protocol lineage. It is a newer stack forming on top of an older substrate. Most of the artifacts in this map are not finished standards: many are active individual Internet-Drafts, ecosystem drafts, previews, product surfaces, or discussion threads. That does not make them unimportant. It means the useful question is less "which one won?" and more "which responsibility is each effort trying to own?"

The Stack at a Glance

The cleanest way to read the landscape right now is by responsibility, not by logo or standards body.

LayerPrimary jobCurrent evidence statusRepresentative efforts
Cross-protocol DNS-first bootstrapTurn a domain into an initial agent endpoint or protocol hintAgent Community spec plus active individual Internet-DraftsAID, AID I-D, DNS-AID, DN-ANR
Protocol-specific bootstrapHelp one protocol family resolve quickly from a domainActive individual Internet-Drafts plus deployed precedent from adjacent systemsMCP DNS Discovery, Serra MCP discovery, ATP, AT Protocol handles as precedent
DNS-anchored trust and identityProve endpoint control, domain control, or domain-linked identity claimsAgent Community mechanism, active individual Internet-Drafts, DID methods, and implementation activityAID PKA, ANSv2, ApertoID, Agent Identity Registry, did:dns, did:web
Registry, manifest, and HTTP discoveryCarry rich metadata, capability description, search, and invocation detailReleased ecosystem specs, official ecosystem previews, open-source schema systems, and active individual Internet-DraftsA2A Agent Card, MCP Registry, MCP Server Cards, AGNTCY ADS, OASF, ACP Agent Manifest, ANP discovery, NLWeb, AINS
Agent communication and semantic descriptionDescribe agent interactions, payloads, affordances, and machine-readable capability surfacesPublished standards, W3C precedents, and ecosystem specificationsECMA NLIP, W3C WoT Discovery, WoT Thing Description 2.0, Eclipse LMOS, Agent Communication Protocol, ANP Agent Description
On-chain and ENS overlaysAdd portable identifiers, registry pointers, reputation, or cross-ecosystem bridgesEIPs, ENS proposals or discussions, and ecosystem standardsENSIP-25, ENSIP-26 discussion, ERC-8004, HCS-14
Identity, delegation, and governance frameworksRepresent agents as principals with scoped authority, audit, lifecycle control, and policyActive individual Internet-Drafts, IETF/OAuth work, NIST activity, and enterprise product surfacesAIP, AI-Agent Auth, OAuth Protected Resource Metadata, OAuth Identity Chaining, NIST AI Agent Standards Initiative, Microsoft Entra Agent ID
Commerce and platform trustConnect discovery to consent, transaction routing, payment authorization, settlement, and network-level trustLaunched product surfaces, public protocol docs, draft EIPs, and active deployment programsOpenAI instant checkout / Agentic Commerce Protocol, OpenAI product discovery in ChatGPT, Stripe Agentic Commerce Protocol, Stripe x402, Google AP2, Google UCP, MPP, ERC-8183, Visa Trusted Agent Protocol

The point of this table is not to imply clean boundaries. Many efforts span more than one layer. The value is that the field becomes easier to reason about once routing, description, trust, authorization, overlays, and commerce are no longer forced into the same bucket.

These approaches are not all substitutes. They are often complements: DNS-first bootstrap gets a client started, cards and registries explain what an agent can do, trust layers establish who stands behind the endpoint, and commerce layers add payment and transaction semantics.

DNS as the Broader First Hop

Across multiple public proposals, DNS-first agent bootstrap has become a visible pattern. AID, DNS-AID, and DN-ANR all treat DNS as a primary starting point, even though they make different design choices.

The disagreement is not really "DNS or no DNS." It is how much meaning DNS should carry.

AID takes the minimalist view. A TXT record at _agent.<domain> provides a compact bootstrap: protocol token, endpoint URI, authentication hint, optional metadata, and optional public-key material. The design intentionally keeps large capability descriptions out of DNS. AID is an Agent Community final specification with a related individual Informational Internet-Draft, draft-nemethi-aid-agent-identity-discovery. It should not be described as an IETF standard.

AID's limitation is also its point. It does not try to be a registry, ranking engine, marketplace, delegation framework, or full authorization system. It answers a narrower question: given this domain, where is the agent entry point and which protocol should a client try next?

That said, AID is not purely "discovery only." Its optional PKA mechanism adds endpoint proof. When the pka field is present, the discovered endpoint proves control of a DNS-published Ed25519 key through an RFC 9421 HTTP Message Signatures handshake. That proves control of the key published for that endpoint. It does not by itself prove legal authority, organizational delegation, or business reputation.

DNS-AID is structurally richer. It uses a namespace under _agents.<domain> and leans into SVCB-based service binding, metadata exchange, and capability advertisement. DN-ANR sits closer to DNS-native naming and resolution: it uses SVCB and optional TXT or DNSSEC-backed integrity material, but is better described as resolving selected agent identifiers than as doing semantic discovery or ranking.

That design split matters. A thinner DNS layer is easier to operate and less likely to duplicate constantly changing metadata. A richer DNS layer can reduce fetches and make the first hop more expressive. The field has not settled that tradeoff.

What is striking is that protocol-specific communities keep rediscovering the same pattern. MCP DNS Discovery uses _mcp.<domain> TXT records for MCP server bootstrap and, in its newer drafts, also introduces an organizational identity bootstrap record. Serra's MCP discovery work combines a mcp:// URI, /.well-known/mcp-server, and optional DNS acceleration. ATP uses _atp.<domain> SVCB but is broader than bootstrap alone, covering agent transport, identity, authentication, messaging, and capability exchange. AgentDNS, now expired, is still useful as evidence that DNS-inspired namespace and service-discovery designs were already being explored before the current wave of drafts. Even the older AT Protocol handle system, while not an AI-agent standard, is a useful precedent for DNS-backed name resolution with HTTPS fallback and bidirectional validation.

Not every first-hop proposal is DNS-native. The active agent:// URI scheme draft tries to create a transport-agnostic addressing layer that can resolve toward descriptors and then delegate communication to protocols such as A2A, MCP, or Agent Communication Protocol. That belongs near bootstrap, but it is a different design move: instead of asking "which DNS label should a client query?", it asks whether agents need their own URI shape at all.

In other words, DNS may or may not become the universal agent-discovery layer. But it remains unusually well-positioned as a first-hop substrate because it is already distributed, operator-controlled, globally deployed, and part of the path to almost every HTTPS service.

One easy way to understate DNS is to treat it as merely a pointer to /.well-known documents. It can do that, but that is not the core advantage.

DNS sits below the web application layer. A domain can publish a DNS record even when there is no web server, no application route, and no /.well-known endpoint. That makes DNS a broader first-hop substrate for agents that may live behind HTTP, WebSocket, gRPC, custom transports, registries, message queues, local networks, enterprise systems, or future protocols that are not naturally represented as an HTTPS origin document.

/.well-known remains valuable, but it is narrower. RFC 8615 reserves the /.well-known/ path prefix for origin-wide metadata. In agent discovery, that pattern shows up in places such as A2A's /.well-known/agent-card.json, MCP server-card work, ACP's /.well-known/agent.yml, ANP's /.well-known/agent-descriptions, OAuth Protected Resource Metadata, DID Configuration, and AI Discovery Endpoint. All of those assume there is an origin capable of serving the relevant HTTP resource.

The practical distinction is important. DNS can point to a /.well-known document, but it does not have to. It can point directly to an endpoint, registry, protocol URI, service binding, or key material. It can also tell the client which protocol family to try before the client commits to HTTP at all.

That does not mean DNS should carry every detail. Large capability graphs, frequently changing skill metadata, pricing rules, policy text, and invocation schemas usually belong in cards, manifests, registries, or HTTP documents. The stronger claim is narrower: DNS is technically more general as a first-hop discovery substrate, while /.well-known is a useful HTTP-origin metadata pattern above it.

Trust Is Separating from Routing

Once agents represent organizations, spend money, or trigger actions on behalf of others, "where is the endpoint?" stops being enough. The next questions are sharper: who controls the namespace, who controls the endpoint key, who authorized the agent to act, what scope was delegated, and how can the action be audited later?

Those are related identity questions, but they are not the same question.

QuestionTypical layerExamples
Does this domain publish an agent entry point?BootstrapAID, DNS-AID, DN-ANR
Does this endpoint control the key advertised for it?Endpoint proofAID PKA, message signatures, mTLS-style proof of possession
Does this domain or organization authorize the agent?Domain or organization trustANSv2, ApertoID, Agent Identity Registry, DID domain linkage
What may the agent do for this user or organization?Authorization and delegationOAuth, token exchange, scoped credentials, enterprise IAM
Can the agent be governed over time?Lifecycle and auditEntra Agent ID, Okta AI Agents, WorkOS credential patterns, transparency logs

The practical consequence is simple: discovery can tell a client where to go, but authorization decides whether this agent may act for this user, against this resource, under these constraints, at this moment. That is why endpoint proof, domain control, delegated authority, runtime attestation, and audit trail keep showing up as adjacent but distinct concerns.

AID PKA belongs at the narrower end of this trust lane: it proves that the discovered endpoint controls a private key corresponding to public material in DNS. ANSv2 is broader and more trust-centered: ACME-based domain validation, server and identity certificates, transparency logging aligned with SCITT concepts, verification tiers, and domain-anchored lifecycle signals. Discovery is present, but identity and lifecycle control are the center of gravity. The GoDaddy ANS Registration Authority matters because it shows a public implementation path for ANS-style registration authority behavior, not because ANSv2 is a completed standard.

ApertoID makes a similar move in a different form. It publishes DNS declarations under _apertoid.<domain> and references a companion request-signing mechanism. It is less about search and more about authorized declarations, policy, delegation, and proof of control. Agent Identity Registry also belongs here, but it should not be reduced to DNS anchoring. Hardware attestation, federated registrars, public lookup, and governance are central; DNS TXT and SRV are bootstrap pieces inside a broader identity registry proposal.

The same design space appears in DID-adjacent work. did:dns uses DNS records as a DID resolution substrate. did:web binds a DID document to an HTTPS origin. did:webvh adds verifiable history to the did:web style of resolution. DID Configuration links DIDs to web domains through a well-known resource and domain-linkage assertions. High-Assurance DIDs with DNS explores DNS-based cross-validation. These are not agent-discovery standards, but identity readers will recognize them as part of the same domain-control and key-binding conversation.

Adjacent identity work is also relevant even when it is not agent-specific. OAuth Token Exchange gives a vocabulary for delegation and impersonation, while OAuth Identity and Authorization Chaining is closer to the cross-domain chain-of-calls problem that appears when one agent invokes another service on a user's behalf. OAuth Protected Resource Metadata is especially important because it lets a protected API publish how it is protected and where authorization metadata lives; for agent clients, that becomes part of discovering not just "where is the tool?" but "how do I get a usable token for it?" OAuth Dynamic Client Registration and the active OAuth Client ID Metadata Document matter for the same reason: open agent ecosystems cannot assume every client was manually pre-registered.

DPoP, OAuth mTLS, OAuth Resource Indicators, and OAuth Rich Authorization Requests are not agent-discovery protocols, but they provide vocabulary for proof of possession, target-resource binding, and structured authorization details. SPIFFE and the IETF WIMSE working group are part of the workload-identity lineage, with concrete work on workload identifiers and workload credentials. RATS and Entity Attestation Tokens sit nearby when the question becomes "what runtime, device, or software environment is this agent actually running in?"

Web Bot Auth is adjacent because it addresses authenticated automated clients on the web. OpenID Shared Signals is adjacent because agent trust will likely need continuous signals for suspension, compromise, revocation, and remediation rather than one-time authentication. The W3C Verifiable Credentials Data Model 2.0 and related Data Integrity work are also relevant because organization-issued agent credentials, delegation attestations, and capability claims need portable formats if they are to move across registries.

Nearby agent-specific frameworks such as AIP, SAIP, VAIP, and AI-Agent Auth push further into delegation, audit, permission scope, workload identity, and trust scoring. NIST's AI Agent Standards Initiative and NCCoE Software and AI Agent Identity and Authorization project are not protocols, but they are strong evidence that identity, authorization, and interoperability are becoming standards-track concerns. They reinforce the broader point: routing and attestation are being designed together without being the same layer.

Rich Discovery Is Moving Toward Registries and Manifests

If DNS is strongest as a low-friction first hop, the mirror image is also becoming clear: rich discovery keeps moving toward registries, manifests, cards, and HTTP metadata documents.

That shift is visible in AINS, AIDIP, ARDP, AI Discovery Endpoint, and AGTP discovery. The common intuition is that capability detail, richer policy, search, ranking, and invocation metadata belong in JSON documents or registries, not in compact DNS records.

A2A is the clearest released, vendor-backed specification example of that logic. The /.well-known/agent-card.json document acts as a durable description surface for an A2A agent's capabilities, endpoints, authentication requirements, and skills. Broader discovery can happen through direct configuration, curated registries, marketplaces, or catalogs.

MCP now has its own registry and card story as well. The MCP Registry is currently in preview and provides an official centralized metadata repository for publicly accessible MCP servers, with server.json metadata, namespace authentication, and a REST API for aggregators. The MCP Server Card Working Group is working on a standardized MCP Server Card and discovery mechanism, and the MCP roadmap explicitly lists server cards as a standard for exposing structured server metadata through a .well-known URL.

AINS is worth reading as more than just registry discovery. It combines HTTPS resolution, rich metadata, trust evidence, and signed append-only federation logs. AIDIP emphasizes RESTful discovery and invocation with capability-oriented metadata. ARDP defines a registration and resolution control plane with identifiers, capabilities, presence, and federation. AI Discovery Endpoint proposes a /.well-known/ai document for machine-readable service description. AGTP discovery uses an agent name service and ranked Agent Manifest Documents.

One registry-layer effort worth calling out separately is AGNTCY Agent Directory Service. ADS is a distributed directory proposal for agent records, content addressing, DHT-style lookup, provenance, and capability-based search. It is tightly connected to the Open Agentic Schema Framework, which defines structured records for agent capabilities, interactions, metadata, skills, domains, and modules. That is a different emphasis from AID or DNS-AID: not "how do I get from a domain to a starting endpoint?", but "how do I search and validate a population of agent records?"

There is also an important acronym trap. In commerce, ACP usually means Stripe/OpenAI's Agentic Commerce Protocol. In interoperability discussions, ACP often means the Linux Foundation/BeeAI Agent Communication Protocol. The latter defines an Agent Manifest with identity, capabilities, metadata, runtime status, supported content types, and cataloging fields. Its discovery docs describe direct server queries, public /.well-known/agent.yml manifests, registries, and embedded discovery, while noting that open discovery is not yet part of the official ACP core spec.

ANP approaches the same terrain from a linked-data direction. Its discovery draft uses JSON-LD and /.well-known/agent-descriptions to publish collections of agent description documents, while the broader Agent Network Protocol work leans on DIDs and schema.org-style metadata. NLWeb is not a general agent registry, but it is relevant because it turns websites into structured natural-language endpoints with HTTP, MCP, and A2A-style action bindings. ECMA NLIP is also not discovery-first, but it is a real standards-body protocol for natural-language interaction between AI agents or between humans and agents.

Finally, W3C and Eclipse work are useful precedents for description rather than direct competitors. W3C WoT Discovery already standardizes ways to obtain machine-readable Thing Descriptions through well-known URIs, directories, DNS-SD, DID documents, and local or global discovery flows. WoT Thing Description 2.0 is active draft work on describing affordances, forms, protocols, data schemas, and security metadata. Eclipse LMOS adapts similar ideas to agents and tools, including agent descriptions, local/global discovery, registries, DIDs, and metadata propagation.

The contrast with DNS is the useful part. A card or registry can say: this agent handles refunds, exposes these skills, requires these scopes, accepts these content types, prefers this invocation protocol, and publishes this policy metadata. That is exactly the kind of information that should not be squeezed into a compact first-hop record.

The likely lesson is not DNS versus registries. It is staged discovery. DNS answers "where do I start?" A card or manifest answers "what can this agent do?" A trust layer answers "who stands behind this endpoint?" Authorization answers "what may it do in this context?"

On-Chain and ENS as Compositional Overlays

Crypto and on-chain work should be visible in this conversation, but it should not dominate the core architecture. Most of the strongest public efforts in that lane are better understood as overlays, bridges, or portable identifier systems.

ENSIP-25 is a useful example. It connects ENS names to agent registries through ENS text records. That matters if public agents need portable naming and discoverable registry references, but it is not the same as open-web DNS bootstrap. ENSIP-26-style metadata discussions are worth watching too, though they remain fluid enough to describe cautiously.

ERC-8004 is another important case. It is best framed as draft on-chain identity, reputation, and validation registry work, not a DNS-native discovery protocol. Its relevance comes from composability: an on-chain agent record can point to DNS, ENS, DID, A2A, MCP, or other surfaces without replacing them.

HCS-14 is especially interesting because it behaves like a meta-identifier framework. Its profile registry includes AID DNS/Web and _uaid DNS TXT resolution profiles. In that sense, it looks less like a direct competitor to every naming proposal and more like an attempt to coordinate across them. By contrast, HCS-18 and HCS-21 are better treated, at least for now, as draft ecosystem infrastructure rather than mature open discovery standards.

The broader point is simple: on-chain and ENS systems matter most when they compose with the web stack, not when they are assumed to replace it. They can help with portability, registry linkage, and reputation continuity, but they are not the natural low-latency first hop for a client starting from a bare web domain.

Commerce Is Becoming the Layer Above Discovery

Commerce is not agent discovery, but it is one of the clearest reasons discovery has to become more precise. Once an agent can find a merchant, paid API, service provider, or other agent, the next questions become transactional: what is being bought, who authorized it, how is payment requested, what evidence travels with the transaction, and who is accountable if something goes wrong?

That is why commerce protocols sit above the discovery and identity stack rather than replacing it. x402 revives HTTP 402-style payment challenges for machine payments. Stripe/OpenAI's Agentic Commerce Protocol focuses on checkout and order handoff. Google's Agent Payments Protocol frames payments around verifiable digital credentials and payment mandates, extending A2A and MCP-oriented flows. Google's Universal Commerce Protocol is broader: it tries to create a common commerce language for agents, apps, businesses, and payment providers. MPP aims at per-request machine-to-machine payments for APIs, tool calls, and content. ERC-8183 adds an on-chain job, escrow, provider, and evaluator model for agentic commerce.

These systems do not answer "how do I discover the official support agent for acme.com?" by themselves. They assume that some discovery, identity, authorization, and trust context already exists, then add payment, mandate, settlement, dispute, and risk semantics on top. That is why commerce belongs on the map, but as an upper layer.

Vendor Moves Show Demand, Not Consensus

One reason this category now matters is that large vendors are moving into adjacent parts of it at the same time. But they are not all entering through the same door.

LaneRepresentative movesWhat it signals
Open-web distributionA2A specification, A2A Version 1.0 announcement, Google Cloud Marketplace AI agentsAgent cards, manifests, and marketplace-facing metadata are becoming operational distribution surfaces
Enterprise controlMicrosoft Entra Agent ID, Microsoft Agent 365, Okta for AI Agents, Okta AI agent management docs, WorkOS AuthKit for MCP, WorkOS AI agent credentials, WorkOS MCP auth overviewAgents are being treated as managed principals with lifecycle, scoped access, and governance requirements inside organizations
Platform and commerce trustOpenAI AgentKit and Connector Registry, OpenAI product discovery in ChatGPT, OpenAI instant checkout / Agentic Commerce Protocol, Stripe Agentic Commerce Protocol, Stripe x402 support, AP2, UCP, MPP, Visa Trusted Agent Protocol, Visa agentic commerce overviewDiscovery is colliding with transaction routing, payment authorization, settlement, consent, bot distinction, and network-level trust

This table should be read as product and market evidence, not as proof that one open discovery architecture has won. Google and A2A strengthen the manifest and marketplace lane. Microsoft and Okta strengthen enterprise identity and governance. WorkOS strengthens MCP-oriented OAuth and authorization plumbing. OpenAI, Stripe, Google commerce work, Tempo/Stripe MPP, and Visa strengthen platform and payment-trust surfaces.

The vendor lane also needs maturity nuance. Microsoft Agent 365 is framed as a control plane with early-access paths. Okta's AI agent management material is enterprise-scoped and, in the cited docs, focused on human-to-agent connections rather than open agent-to-agent discovery. OpenAI AgentKit exists, but Agent Builder and Connector Registry have beta availability notes. Stripe/OpenAI's Agentic Commerce Protocol is primarily about transaction and checkout integration, while its discovery mechanisms are still forming. Visa's Trusted Agent Protocol is available through Visa developer channels, but Visa also describes it as being in development and deployment.

That nuance is the point. Enterprise inventory is not the same thing as public-agent routing. Marketplace listing is not the same thing as cross-protocol naming. Commerce authorization is not the same thing as open discovery, even if the layers will eventually need to interoperate.

What Convergence Probably Looks Like

The cleanest interpretation of the current landscape is not winner-take-all. It is composition.

A plausible near-term stack looks something like this: a stable name or handle resolves through DNS, a URI scheme, or another low-friction resolver; a manifest, card, or registry supplies richer metadata; semantic description layers explain capabilities and affordances; a trust layer proves endpoint or domain control; delegation frameworks carry scoped authority; governance systems handle ownership, lifecycle, and audit; optional overlays such as ENS or on-chain registries bridge across ecosystems; and domain-specific layers such as marketplaces, commerce protocols, or payment networks add ranking, policy, consent, settlement, and transaction guarantees.

That does not mean the architecture is settled. Many of the efforts in this map are still Internet-Drafts, ecosystem drafts, previews, or product surfaces. Some will merge. Some will expire. Some will remain protocol-specific. Some overlap because their authors are still discovering the same requirements from different starting points.

That overlap is the signal. Agent discovery is not yet one protocol. It is an active set of experiments around a clearer set of needs: naming, bootstrap, rich metadata, semantic description, trust, delegated authority, governance, and market context. The agentic web is beginning to develop a real discovery and identity stack, but the boundaries are still being negotiated.

For interpretation, the evidence supports a directional claim: distributed naming infrastructure, especially DNS, is unusually well-positioned as the first-hop layer, while richer discovery, trust, authorization, governance, and commerce specialize above it.

This is a living map. If you see missing efforts, outdated classifications, or newer public artifacts we should fold in, send them to hello@agentcommunity.org.

Source Appendix

The table below is a compact glossary of the main artifacts referenced in this piece. It is meant to make the research surface legible at a glance, not to replace the narrative above.

ItemCategoryStatusShort descriptionLink
AID specificationCross-protocol DNS-first bootstrapAgent Community final specDNS TXT bootstrap for agent endpoint, protocol hint, auth hint, and optional key materialaid.agentcommunity.org/docs/specification
AID Internet-DraftCross-protocol DNS-first bootstrapIndividual Informational I-DIETF-submitted draft for AID v1.2 behavior and IANA registration requestsdraft-nemethi-aid-agent-identity-discovery
AID PKADNS-anchored endpoint proofAgent Community spec mechanismDNS-published Ed25519 key with RFC 9421 challenge-response endpoint proofaid.agentcommunity.org/docs/Reference/identity_pka
DNS-AIDCross-protocol DNS-first bootstrapActive individual I-DStructured DNS namespace for agent discovery under _agents.<domain>datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-dnsaid
DN-ANRDNS-native naming and resolutionActive individual I-DDNS-native agent naming and resolution using SVCB and optional integrity materialdatatracker.ietf.org/doc/draft-cui-dns-native-agent-naming-resolution
AgentDNSDNS-inspired agent discoveryExpired individual I-DEarlier agent namespace and discovery proposal using agentdns://, semantic search, authentication, and billing conceptsdatatracker.ietf.org/doc/html/draft-liang-agentdns-00
MCP DNS DiscoveryProtocol-specific DNS bootstrapActive individual I-DDNS-based MCP server bootstrap via _mcp.<domain> with organizational identity additionsdatatracker.ietf.org/doc/draft-morrison-mcp-dns-discovery
Serra MCP discoveryProtocol-specific discoveryActive individual I-Dmcp://, /.well-known/mcp-server, and optional DNS accelerationdatatracker.ietf.org/doc/draft-serra-mcp-discovery-uri
ATPProtocol-specific transport and bootstrapActive individual I-DAgent Transfer Protocol with _atp.<domain> SVCB plus broader identity, auth, and messaging scopedatatracker.ietf.org/doc/draft-li-atp/01
agent:// URI schemeURI addressing / discoveryActive individual Experimental I-DTransport-agnostic URI scheme and descriptor model for identifying, discovering, and invoking agentsdatatracker.ietf.org/doc/html/draft-narvaneni-agent-uri-03
AT Protocol handlesDNS precedentDeployed adjacent protocolDNS TXT or HTTPS fallback for handle-to-DID resolutionatproto.com/specs/handle
ANSv2DNS-anchored trust / identityActive individual I-DDomain-anchored trust layer with ACME verification, certificates, verification tiers, and transparency logsdatatracker.ietf.org/doc/draft-narajala-courtney-ansv2
GoDaddy ANS RADNS-anchored trust / identityPublic implementation pathRegistration authority documentation for ANS-style registration, certificates, DNS provisioning, and transparency logginggodaddy.com/ans/developers
ApertoIDDNS-anchored trust / identityActive individual I-DDNS-published agent declarations, policy records, delegation, and companion signing modeldatatracker.ietf.org/doc/draft-ferro-dnsop-apertoid
Agent Identity RegistryIdentity registry / trustActive individual I-DFederated registry and hardware-anchored identity architecture with DNS bootstrap piecesdatatracker.ietf.org/doc/draft-drake-agent-identity-registry/01
did:dnsDID methodDID method draft/siteDID method using DNS records as the resolution substratedanubetech.github.io/did-method-dns
did:webDID methodCommunity DID method specDID method using HTTPS origins and /.well-known/did.jsonw3c-ccg.github.io/did-method-web
did:webvhDID methodDID method work itemdid:web-style DID method with verifiable historydidwebvh.info/latest
DID ConfigurationDomain-DID linkageDIF draft specificationWell-known resource for domain linkage assertions between web origins and DIDsidentity.foundation/specs/did-configuration
High-Assurance DIDs with DNSDNS-linked DID assuranceActive individual I-DDNS/TLSA/URI-based DID cross-validation precedentdatatracker.ietf.org/doc/draft-carter-high-assurance-dids-with-dns
A2A specificationAgent card / protocolReleased ecosystem specAgent Card format and protocol for agent-to-agent interoperabilitya2a-protocol.org/v1.0.0/specification
A2A Version 1.0Agent protocol milestoneEcosystem announcementA2A 1.0 release announcementa2a-protocol.org/blog/a2a-version-1.0
MCP RegistryRegistry / metadataOfficial previewOfficial centralized metadata repository for publicly accessible MCP serversmodelcontextprotocol.io/registry/about
MCP Server CardsManifest / HTTP discoveryMCP working group draft workMCP Server Card format and discovery mechanismmodelcontextprotocol.io/community/server-card/charter
AGNTCY Agent Directory ServiceDistributed registry / capability discoveryActive individual Informational I-DDistributed directory for agent records, content addressing, DHT lookup, skills, claims, and capability-based discoverydatatracker.ietf.org/doc/draft-mp-agntcy-ads
Open Agentic Schema FrameworkAgent record schemaAGNTCY open-source schema frameworkStructured schema system for defining agent capabilities, interactions, metadata, skills, domains, and modulesgithub.com/agntcy/oasf
Agent Communication ProtocolAgent communication / manifestLinux Foundation / BeeAI ecosystem protocolAgent interoperability protocol with manifest and discovery concepts; distinct from Agentic Commerce Protocolagentcommunicationprotocol.dev
ACP Agent ManifestManifest / metadataEcosystem documentationAgent manifest describing identity, capabilities, metadata, runtime status, content types, and cataloging fieldsagentcommunicationprotocol.dev/core-concepts/agent-manifest
ACP Agent DiscoveryManifest / registry discoveryEcosystem documentation; open discovery not yet core specDirect server queries, public /.well-known/agent.yml, registry discovery, and embedded discovery patternsagentcommunicationprotocol.dev/core-concepts/agent-discovery
ANP discoveryLinked-data discoveryEcosystem draft/spec docsJSON-LD /.well-known/agent-descriptions discovery for agent description documentsagent-network-protocol.com/specs/agent-discovery
ANP Agent Description ProtocolLinked-data descriptionEcosystem draft/spec docsJSON-LD agent description model using DID and schema.org-aligned metadataagent-network-protocol.com/specs/agent-description
ECMA NLIPAgent communicationEcma standard, December 2025Natural Language Interaction Protocol for AI agent-to-agent or human-to-agent communicationECMA-430
W3C WoT DiscoveryDiscovery precedentW3C RecommendationDiscovery architecture for machine-readable descriptions through well-known URIs, directories, DNS-SD, and DID documentsw3.org/TR/wot-discovery
W3C WoT Thing Description 2.0Semantic description precedentW3C First Public Working DraftJSON/JSON-LD model for describing affordances, forms, protocols, data schemas, and security metadataw3.org/TR/wot-thing-description-2.0
Eclipse LMOSAgent description / discoveryEclipse project documentationAgent and tool descriptions, local/global discovery, registries, DIDs, and metadata propagation patternseclipse.dev/lmos
NLWebAgent-facing web endpointOpen project/spec, v0.55Natural-language endpoint model with structured responses and HTTP, MCP, and A2A action bindingsnlweb.ai/docs/specification
AINSRegistry / HTTP discovery / trustActive individual I-DHTTPS registry, rich metadata, trust evidence, and signed append-only federation logsdatatracker.ietf.org/doc/draft-vandemeent-ains-discovery
AIDIPRegistry / HTTP discoveryActive individual I-DRESTful discovery and invocation protocol with capability-oriented metadatadatatracker.ietf.org/doc/draft-cui-ai-agent-discovery-invocation/01
ARDPRegistry / HTTP discoveryActive individual I-DFederated registration and resolution protocol for agentsdatatracker.ietf.org/doc/draft-pioli-agent-discovery/01
AI Discovery EndpointHTTP discoveryActive individual I-D/.well-known/ai document for machine-readable service descriptiondatatracker.ietf.org/doc/draft-aiendpoint-ai-discovery
AGTP discoveryManifest / name serviceActive individual I-DAGTP name service and ranked manifest discoverydatatracker.ietf.org/doc/draft-hood-agtp-discovery
ENSIP-25ENS / on-chain overlayENS proposalENS text record linking an ENS name to an agent registry identityens.domains/blog/post/ensip-25
ENSIP-26 discussionENS / on-chain overlayForum discussionENS-native AI identity discussion and metadata directiondiscuss.ens.domains
ERC-8004On-chain overlayDraft ERCOn-chain identity, reputation, and validation registries for agentseips.ethereum.org/EIPS/eip-8004
HCS-14Meta-identifier overlayHedera ecosystem specificationUniversal agent identifier framework with profile-based resolutionhol.org/docs/standards/hcs-14
HCS-18Hedera ecosystem discoveryHedera ecosystem specificationFlora discovery protocol in the Hedera ecosystemhol.org/docs/standards/hcs-18
HCS-21Hedera ecosystem infrastructureHedera ecosystem specificationAdapter registry for deterministic software packageshol.org/docs/standards/hcs-21
AIPIdentity / delegationActive individual I-DDID-based agent identity and delegation frameworkdatatracker.ietf.org/doc/draft-singla-agent-identity-protocol/01
SAIPIdentity / delegationActive individual I-DSigned agent identity with optional DNS-based attestation discoverydatatracker.ietf.org/doc/draft-jovancevic-saip
VAIPIdentity / delegationActive individual I-DAgent identity with permission scopes, trust scoring, and audit traildatatracker.ietf.org/doc/draft-nyantakyi-vaip-agent-identity
AI-Agent AuthAgent authentication / authorizationActive individual Informational I-DModel for composing WIMSE, SPIFFE, OAuth, attestation, audit, and policy for AI-agent authentication and authorizationdatatracker.ietf.org/doc/draft-klrc-aiagent-auth
WIMSEWorkload identityActive IETF working groupWorkload identity and access management across multi-system environmentsdatatracker.ietf.org/wg/wimse/about
WIMSE Workload IdentifierWorkload identityActive WIMSE WG I-DURI-based workload identifiers for authentication, authorization, and auditdatatracker.ietf.org/doc/draft-ietf-wimse-identifier
WIMSE Workload CredentialsWorkload identity credentialsActive WIMSE WG I-DCredential formats and claims for representing workload identitydatatracker.ietf.org/doc/draft-ietf-wimse-workload-creds
Web Bot AuthAutomated-client authenticationActive IETF working groupAuthenticated automated-client identity on the web; concrete mechanisms remain active draftsdatatracker.ietf.org/wg/webbotauth/about
Web Bot Auth draftsAutomated-client authenticationActive IETF WG draftsHTTP message-signature and directory-style work for authenticating automated web trafficdatatracker.ietf.org/group/webbotauth/documents
OAuth Protected Resource MetadataAuthorization metadata discoveryIETF Standards Track RFC/.well-known/oauth-protected-resource metadata for discovering how a protected resource is securedrfc-editor.org/rfc/rfc9728
OAuth Dynamic Client RegistrationClient registrationIETF Standards Track RFCDynamic registration of OAuth clients with authorization serversrfc-editor.org/rfc/rfc7591
OAuth Client ID Metadata DocumentClient metadata discoveryActive OAuth WG I-DURL-shaped client identifier metadata without prior manual registrationdatatracker.ietf.org/doc/draft-ietf-oauth-client-id-metadata-document
OAuth Token ExchangeDelegation / impersonationIETF Standards Track RFCToken exchange for delegation and impersonation semanticsrfc-editor.org/rfc/rfc8693
OAuth Identity ChainingCross-domain delegationActive OAuth WG I-DIdentity and authorization context chaining across domainsdatatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/08
OAuth Resource IndicatorsToken audience / resource bindingIETF Standards Track RFCOAuth parameter for indicating the target protected resourcerfc-editor.org/rfc/rfc8707
OAuth Rich Authorization RequestsStructured authorizationIETF Standards Track RFCStructured authorization details for fine-grained requestsrfc-editor.org/rfc/rfc9396
DPoPProof of possessionIETF Standards Track RFCOAuth proof-of-possession mechanismrfc-editor.org/rfc/rfc9449
OAuth mTLSProof of possessionIETF Standards Track RFCMutual-TLS client authentication and certificate-bound access tokensrfc-editor.org/rfc/rfc8705
OAuth Attestation-Based Client AuthenticationClient attestationActive OAuth WG I-DOAuth client authentication using attestation evidencedatatracker.ietf.org/doc/draft-ietf-oauth-attestation-based-client-auth
OAuth SPIFFE Client AuthenticationWorkload OAuth bridgeActive OAuth WG I-DOAuth client authentication using SPIFFE workload identitiesdatatracker.ietf.org/doc/draft-ietf-oauth-spiffe-client-auth
SPIFFEWorkload identityCNCF project/spec ecosystemWorkload identity framework for services and workloadsspiffe.io/docs/latest/spiffe-about/overview
RATS ArchitectureRemote attestationIETF RFCArchitecture for remote attestation of device, software, or environment claimsdatatracker.ietf.org/doc/rfc9334
Entity Attestation TokenRemote attestation tokenIETF Standards Track RFCCWT/JWT-based attested claims set for entity state and characteristicsrfc-editor.org/rfc/rfc9711
OpenID Shared Signals / CAEP / RISCContinuous trust signalsOpenID Final SpecificationsContinuous access, risk, and security-event signal standards for trust changes after loginopenid.net shared signals announcement
Verifiable Credentials Data Model 2.0Portable credentialsW3C RecommendationData model for portable credentials that could express agent credentials, delegation claims, or capability attestationsw3.org/TR/vc-data-model-2.0
NIST AI Agent Standards InitiativeStandards coordinationNIST initiative launched February 2026U.S. standards initiative for secure, interoperable AI agentsnist.gov AI Agent Standards Initiative
NIST NCCoE Software and AI Agent Identity and AuthorizationIdentity / authorization project contextNIST NCCoE project concept paper; comment period closed April 2, 2026Standards and best-practice project context for software and AI-agent identity and authorizationnccoe.nist.gov project
Google Cloud Marketplace AI agentsVendor / open-web distributionProduct documentationMarketplace listing requirements for AI agentscloud.google.com/marketplace/docs/partners/ai-agents
Microsoft Entra Agent IDVendor / enterprise controlProduct documentationMicrosoft identity and governance layer for agentslearn.microsoft.com/en-us/entra/agent-id
Microsoft agent metadata and discoverabilityVendor / enterprise discoverabilityProduct documentationEnterprise guidance for agent manifests, skills, security schemes, collections, and discoverability policylearn.microsoft.com/en-us/entra/agent-id/agent-metadata-discoverability
Microsoft Agent 365Vendor / enterprise controlProduct documentation / early access pathMicrosoft control-plane framing for enterprise agentslearn.microsoft.com/en-us/microsoft-agent-365
Okta for AI AgentsVendor / enterprise controlEarly-access product announcementOkta AI-agent identity and governance product directionokta.com/blog/ai/okta-ai-agents-early-access-announcement
Okta AI agent docsVendor / enterprise controlProduct documentationOkta documentation for AI agent management inside enterpriseshelp.okta.com/oie/en-us/content/topics/ai-agents/ai-agents.htm
WorkOS AuthKit for MCPVendor / auth plumbingProduct documentationMCP-oriented OAuth authorization surface for enterprise-ready deploymentsworkos.com/docs/authkit/mcp
WorkOS AI agent credentialsVendor / auth plumbingProduct blogWorkOS framing for agent-native credentials and delegated accessworkos.com/blog/ai-agent-credentials
WorkOS MCP overviewVendor / auth plumbingProduct pageWorkOS overview of MCP authentication and authorization surfaceworkos.com/mcp
OpenAI AgentKit / Connector RegistryVendor / platform distributionProduct announcement with beta notesOpenAI connector governance and integration surfaceopenai.com/index/introducing-agentkit
OpenAI product discovery in ChatGPTVendor / platform commerceProduct announcementChatGPT product-discovery layer powered by Agentic Commerce Protocol expansionopenai.com/index/powering-product-discovery-in-chatgpt
OpenAI instant checkout / Agentic Commerce ProtocolVendor / platform commerceProduct and protocol announcementOpenAI checkout flow for agentic product interactionsopenai.com/index/buy-it-in-chatgpt
Stripe Agentic Commerce ProtocolVendor / commerce trustProtocol documentationAgentic Commerce Protocol support for commerce and checkout flowsdocs.stripe.com/agentic-commerce/protocol
Agentic Commerce Protocol FAQVendor / commerce trustProtocol site FAQAgentic Commerce Protocol discovery mechanisms and adoption notesagenticcommerce.dev
Stripe x402Vendor / machine paymentsProduct documentationStripe support for machine-payment rails using x402docs.stripe.com/payments/machine/x402
Google AP2Agent paymentsPublic protocol documentationAgent Payments Protocol using verifiable digital credentials and payment mandates for agent-led paymentsap2-protocol.org/specification
Google UCPAgentic commercePublic protocol siteUniversal Commerce Protocol for agents, apps, businesses, and payment providersucp.dev
Machine Payments ProtocolMachine paymentsPublic protocol sitePer-request machine-to-machine payments for API requests, tool calls, or contentmpp.dev
ERC-8183On-chain agentic commerceDraft ERCOn-chain job, budget, escrow, provider, evaluator, and settlement primitive for agentic commerceeips.ethereum.org/EIPS/eip-8183
Visa Trusted Agent ProtocolVendor / commerce trustDeveloper program / protocol docsNetwork-led trust model for agentic commercedeveloper.visa.com/capabilities/trusted-agent-protocol
Visa agentic commerce overviewVendor / commerce trustProduct overviewVisa framing for agent-mediated commerce infrastructurecorporate.visa.com/en/solutions/acceptance/agentic-commerce.html
SAML metadataHistorical substrateOASIS standardLongstanding metadata artifact for enterprise federationdocs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf
Well-Known URIsHistorical substrate / HTTP metadataIETF Standards Track RFCReserved /.well-known/ URI prefix for origin-wide metadata discoveryrfc-editor.org/rfc/rfc8615
WebFingerHistorical substrateIETF RFCIdentifier-based web discovery mechanismrfc-editor.org/rfc/rfc7033
OIDC DiscoveryHistorical substrateOpenID specificationCanonical OpenID Provider metadata discoveryopenid.net/specs/openid-connect-discovery-1_0.html
OAuth AS metadataHistorical substrateIETF RFCCanonical OAuth server metadata publicationrfc-editor.org/rfc/rfc8414
SCIM 2.0Historical substrateIETF RFCIdentity provisioning and service self-description substraterfc-editor.org/rfc/rfc7644
OpenID FederationHistorical substrateOpenID specificationTrust-chain and federation-policy layer for multilateral ecosystemsopenid.net/specs/openid-federation-1_0.html
DINRG "Why Naming Matters"FramingIETF meeting materialArchitecture framing for why globally meaningful names still matterdatatracker.ietf.org/meeting/125/materials/slides-125-dinrg-why-naming-matters-identifier-design-for-decentralized-digital-infrastructure-in-the-age-of-agi-01