A2A (Agent-to-Agent) Integration¶
ContextForge supports A2A (Agent-to-Agent) integration, allowing you to register external AI agents and expose them as MCP tools for seamless integration with other agents and MCP clients.
Overview¶
A2A integration enables you to:
- Register external AI agents (OpenAI, Anthropic, custom agents)
- Expose agents as MCP tools for universal discovery and access
- Support multiple protocols (JSONRPC, custom formats)
- Manage agent lifecycle through admin UI and APIs
- Monitor performance with comprehensive metrics
- Configure authentication with various auth methods
Quick Start¶
Base URL
- Direct installs (
uvx, pip, ordocker run):http://localhost:4444 - Docker Compose (nginx proxy):
http://localhost:8080
1. Enable A2A Features¶
# In your .env file or environment variables
MCPGATEWAY_A2A_ENABLED=true
MCPGATEWAY_A2A_METRICS_ENABLED=true
2. Register an A2A Agent¶
Via Admin UI:
- Go to
http://localhost:4444/admin - Click the "A2A Agents" tab
- Fill out the "Add New A2A Agent" form
- Click "Add A2A Agent"
Via REST API:
curl -X POST "http://localhost:4444/a2a" \
-H "Authorization: Bearer $MCPGATEWAY_BEARER_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "hello_world_agent",
"endpoint_url": "http://localhost:9999/",
"agent_type": "jsonrpc",
"description": "External AI agent for hello world functionality",
"auth_type": "api_key",
"auth_value": "your-api-key",
"tags": ["ai", "hello-world"]
}'
3. Test the Agent¶
Via Admin UI:
- Click the blue "Test" button next to your agent
- See real-time test results
Via API:
curl -X POST "http://localhost:4444/a2a/hello_world_agent/invoke" \
-H "Authorization: Bearer $MCPGATEWAY_BEARER_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"parameters": {
"method": "message/send",
"params": {
"message": {
"messageId": "test-123",
"role": "user",
"parts": [{"type": "text", "text": "Hello!"}]
}
}
},
"interaction_type": "test"
}'
4. Create Virtual Server with A2A Agent¶
curl -X POST "http://localhost:4444/servers" \
-H "Authorization: Bearer $MCPGATEWAY_BEARER_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "AI Assistant Server",
"description": "Virtual server with AI agents",
"associated_a2a_agents": ["agent-id-from-step-2"]
}'
5. Use Agent via MCP Protocol¶
# A2A agents are now available as MCP tools
curl -X POST "http://localhost:4444/rpc" \
-H "Authorization: Bearer $MCPGATEWAY_BEARER_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"jsonrpc": "2.0",
"method": "tools/call",
"params": {
"name": "a2a_hello_world_agent",
"arguments": {
"method": "message/send",
"params": {"message": {"messageId": "test", "role": "user", "parts": [{"type": "text", "text": "Hi!"}]}}
}
},
"id": 1
}'
Agent Types¶
Generic/JSONRPC Agents¶
For agents that expect standard JSONRPC format:
OpenAI-compatible Agents¶
{
"agent_type": "openai",
"endpoint_url": "https://api.openai.com/v1/chat/completions",
"auth_type": "api_key",
"auth_value": "your-openai-api-key"
}
Anthropic-compatible Agents¶
{
"agent_type": "anthropic",
"endpoint_url": "https://api.anthropic.com/v1/messages",
"auth_type": "api_key",
"auth_value": "your-anthropic-api-key"
}
Custom Agents¶
{
"agent_type": "custom",
"endpoint_url": "https://your-custom-agent.com/api",
"auth_type": "bearer",
"auth_value": "your-token",
"capabilities": {"streaming": true, "functions": false},
"config": {"max_tokens": 1000, "temperature": 0.7}
}
Authentication Methods¶
| Auth Type | Description | Example |
|---|---|---|
api_key | API key in Authorization header | Authorization: Bearer your-key |
bearer | Bearer token authentication | Authorization: Bearer your-token |
oauth | OAuth 2.0 flow (stored tokens) | Handled automatically |
none | No authentication required | - |
Protocol Detection¶
The gateway automatically detects agent protocols:
- JSONRPC Format: For
agent_type: "jsonrpc"or URLs ending with/ - Custom A2A Format: For other agent types
Monitoring and Metrics¶
A2A agents provide comprehensive metrics:
- Execution Count: Total number of invocations
- Success Rate: Percentage of successful calls
- Response Times: Min/max/average response times
- Last Interaction: Timestamp of most recent call
- Error Tracking: Failed call details and error messages
Lifecycle Management¶
Agent-Tool State Cascade¶
When an A2A agent is registered, a corresponding MCP tool is automatically created (with integration_type: "A2A"). The agent and its tool share a linked lifecycle:
- Deactivating an agent automatically deactivates its associated tool, removing it from virtual server tool listings. (Invocation of disabled A2A tools was already rejected; this fix ensures the tool's own
enabledflag stays in sync so it no longer appears as available.) - Reactivating an agent automatically reactivates its associated tool, restoring it to virtual server tool listings.
This mirrors how MCP server (gateway) deactivation cascades to all child tools, prompts, and resources. Since each A2A agent creates a single tool, the cascade updates exactly one tool record.
Note
If the tool is already in the desired state (e.g., already disabled when the agent is deactivated), no redundant database update occurs.
Virtual Server Integration¶
Associate A2A agents with virtual servers to:
- Organize agents by purpose or team
- Control access via server-specific endpoints
- Group capabilities for specific use cases
- Enable MCP discovery for client tools
Configuration¶
| Variable | Description | Default |
|---|---|---|
MCPGATEWAY_A2A_ENABLED | Master toggle for A2A features | true |
MCPGATEWAY_A2A_MAX_AGENTS | Maximum agents allowed | 100 |
MCPGATEWAY_A2A_DEFAULT_TIMEOUT | HTTP timeout (seconds) | 30 |
MCPGATEWAY_A2A_MAX_RETRIES | Retry attempts | 3 |
MCPGATEWAY_A2A_METRICS_ENABLED | Enable metrics collection | true |
Security Considerations¶
- Encrypted Storage: Agent credentials are encrypted in the database
- Rate Limiting: Configurable limits on agent invocations
- Access Control: Full authentication and authorization
- Audit Logging: All agent interactions are logged
- Network Security: HTTPS support and SSL verification
Local Testing¶
Demo A2A Agent¶
The repository includes a demo A2A agent with calculator and weather tools for local testing.
Prerequisites¶
Before running the demo agent, ensure the following configuration:
- Allow localhost in .env (required for local agent registration)
Restart ContextForge after adding this. The default blocks loopback addresses as an SSRF safeguard. This is intentional for production, but must be opted into locally.
- Pass your admin email at runtime
The script creates a JWT signed with your instance's secret. The token subject must match a user in the database (typically your PLATFORM_ADMIN_EMAIL). See the "Running the Demo" section below for the actual commands.
Running the Demo¶
# Terminal 1: Start ContextForge
make dev
# Terminal 2: Start the demo agent (auto-registers with ContextForge)
# Override the token subject if your admin email differs from the default:
# export PLATFORM_ADMIN_EMAIL=you@example.com
uv run python scripts/demo_a2a_agent.py
# Optional: Generate a token for the curl test commands below
export TOKEN=$(python -m mcpgateway.utils.create_jwt_token \
--username "admin@example.com" --exp 60)
Note: The script reads JWT_SECRET_KEY and PLATFORM_ADMIN_EMAIL from environment variables (defaults: my-test-key… and admin@example.com).
The demo agent supports these query formats:
| Query | Example | Response |
|---|---|---|
| Calculator | calc: 7*8+2 | 58 |
| Weather | weather: Dallas | The weather in Dallas is sunny, 25C |
Test via Admin UI:
- Go to
http://localhost:8000/admin - Click the "A2A Agents" tab
- Add a new agent "demo-calculator-agent" with Endpoint URL of http://localhost:9100/run
- In "demo-calculator-agent" click on Test
- Enter a query like
calc: 100/4+25in the modal - Click Run Test to see the result
Test via API:
# Get a token
export TOKEN=$(python3 -m mcpgateway.utils.create_jwt_token \
--username admin@example.com --exp 60)
curl -X POST "http://localhost:8000/a2a/demo-calculator-agent/invoke" \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"parameters": {"query": "calc: 15*4+10"}}'
A2A SDK HelloWorld Sample¶
Test with the official A2A Python SDK sample:
# Clone and run the HelloWorld agent
git clone https://github.com/google/a2a-samples.git
cd a2a-samples/samples/python/agents/helloworld
uv run python __main__.py # Starts on port 9999
# Register with ContextForge (in another terminal)
export TOKEN=$(python3 -m mcpgateway.utils.create_jwt_token \
--username admin@example.com --exp 60 --secret my-test-key-but-now-longer-than-32-bytes)
curl -X POST "http://localhost:8000/a2a" \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"agent": {
"name": "Hello World Agent",
"endpoint_url": "http://localhost:9999/",
"agent_type": "jsonrpc",
"description": "Official A2A SDK HelloWorld sample"
},
"visibility": "public"
}'
Admin UI Query Input¶
The Admin UI test button opens a modal where you can enter custom queries:
- Open Modal: Click the blue Test button next to any A2A agent
- Enter Query: Type your query in the textarea (e.g.,
calc: 5*10+2) - Run Test: Click Run Test to send the query to the agent
- View Response: The agent's response appears in the modal
This allows testing A2A agents with real user queries instead of hardcoded test messages.
Testing via MCP Tools¶
A2A agents are automatically exposed as MCP tools. After registration, invoke them via the MCP protocol:
curl -X POST "http://localhost:8000/rpc" \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"jsonrpc": "2.0",
"method": "tools/call",
"params": {
"name": "a2a_demo-calculator-agent",
"arguments": {"query": "calc: 99+1"}
},
"id": 1
}'
Troubleshooting¶
Agent Not Responding¶
- Check agent status in Admin UI (should be "Active" and "Reachable")
- Verify endpoint URL is correct and accessible
- Test authentication credentials
- Check agent logs for protocol format issues
Protocol Format Issues¶
- Verify agent expects JSONRPC format vs custom format
- Check required fields in agent's API documentation
- Use Admin UI test button to validate communication
- Review gateway logs for request/response details
Authentication Problems¶
- Verify auth_type matches agent's expected authentication
- Check auth_value is correct and not expired
- Test direct agent communication outside gateway
- Review agent's authentication documentation
For more information on ContextForge features and configuration, see the main documentation.