- Manifest schema
- Validation
- Compile to standalone and scheduler targets
- JSON output for every command
describe,inspect, and stdio JSON-RPC- Example manifest
- Stable manifest versioning rules (v0.1 and v0.2 coexist, version field accepts both)
- Richer trigger-condition schema
- Local execution adapter for shell-only workflows
- Basic sanitization for inspect output and agent-facing text
- Identity profiles and provider system (
none,env-bearer,oidc-client-credentials,oidc-token-exchange) - Trust levels (
untrusted,restricted,supervised,autonomous) and escalation (fail,human-approval,log-and-proceed) - Authorization proof verification (
jwt,certificate,detached-signatureverifiers) - External authorization via OPA provider (Phase 4.5 hook point)
- Evidence generation (
ssh,noneevidence providers, separate from v0.1 signing) - Credential handoff (downscope and transaction modes)
- Audit enhancements (delegation chain, trust level, authorization decision, runtime instance attribution, handoff mode)
- v0.1 to v0.2 conversion utility (
agentcli convert) - v0.1/v0.2 dual-path execution (zero behavioral change for v0.1 manifests)
- Provider discovery CLI and JSON-RPC (
agentcli identity providers,agentcli identity validate-delegation) - Delegation chain validation with policy enforcement
- Three-stage profile merge (profile, workflow, task) with tightening-only rules
- Backend compilation preserves v0.2 identity, evidence, authorization proof, and authorization metadata
- Enterprise identity providers:
azure-managed-identity,aws-sts-assume-role,gcp-workload-identity,spiffe-jwt-svid - Comprehensive v0.2 profile validation with cross-reference checks for dangling refs
- Converter produces proper identity profile refs (not inline blocks)
- 591 total tests including 12 end-to-end integration tests
- Local approval gate enforcement in
agentcli execwith single-use ssh-signed grants (agentcli approve,agentcli approvals list|revoke,exec --approval-id); approval records stored at~/.agentcli/state/approvals.ndjson; enforcesapproval.policy: manualandapproval.policy: auto-reject
- Additional Entra Agent ID governance features (Conditional Access policy integration, agent lifecycle hooks)
- Mid-execution credential refresh for long-running tasks (runtime-managed session renewal)
- Agent registry export compatibility (structured identity profiles exportable for Entra Agent Registry, organizational CMDBs)
- Multi-runtime credential handoff (cross-backend derived credential propagation)
- CIBA-based human approval for trust escalation (out-of-band approval flow for
require-escalationdecisions) - Richer approval policy model building on the v0.2 local gate (approval quorum/multi-party, approver identity attribution beyond SSH principal, scheduler/local-gate unification)
- Streaming watch / tail surfaces for runtime state
- Scheduler lineage and causality queries
- MCP server
- Event streaming / NDJSON output
- Adapter/plugin boundary for non-scheduler runtimes