Policy Engines: OPA and Cedar
The built-in policy engine handles simple allow/deny rules well, but production deployments need richer policy languages. v2.2 adds pluggable policy backends for Open Policy Agent (Rego) and Cedar (Amazon’s authorization policy language). Configuration is a single environment variable:POST /v1/policies/sync or wire up a git webhook for automatic sync on push.
A2A Bridge: Agent-to-Agent with Grantex Auth
Google’s Agent-to-Agent (A2A) protocol defines how agents discover and communicate with each other. The missing piece was authorization — A2A assumes agents can authenticate, but does not specify how.@grantex/a2a (TypeScript) and grantex-a2a (Python) bridge that gap. They wrap A2A task creation and status polling with Grantex grant token authentication:
Managed Cloud
Self-hosting is still fully supported, but for teams that want to skip the infrastructure work: the managed cloud is live atgrantex-auth-dd4mtrt2gq-uc.a.run.app. Sign up via the developer portal, get an API key, and start authorizing agents.
Usage metering (GET /v1/usage), custom domains with DNS TXT verification, email verification for new accounts, and per-plan dynamic rate limiting are all included.
SDK 0.2.0
All three SDKs — TypeScript (@grantex/sdk), Python (grantex), and Go (grantex-go) — ship at 0.2.0 with full coverage of the v2.2 feature set:
usage.current()/usage.history()— usage meteringdomains.create()/domains.list()/domains.verify()/domains.delete()— custom domain management- Budget controls, event streaming, and vault APIs (shipped in 0.1.9)
@grantex/conformance v0.1.4) validates all of the above.
By the Numbers
| Metric | Count |
|---|---|
| npm packages | 14 |
| PyPI packages | 6 |
| Go modules | 1 |
| Framework integrations | 11 |
| Auth service tests | ~362 |
| SDK tests (combined) | 317 |
| Mintlify doc pages | 174+ |
| IETF draft revision | -01 |
What’s Next
The IETF draft (draft-mishra-oauth-agent-grants-01) has been updated with Budget Controls, Event Streaming, Credential Vault, and External Policy Backends sections plus a full implementation report. We have also submitted a public comment to the NIST NCCoE mapping DAAP capabilities to the AI Risk Management Framework.
Standards alignment is the theme for the next phase. The AuthZEN conformance mapping is published, and we are exploring formal IETF working group adoption.