Enterprise AI Agent Interoperability Through Canonical Schema

by Nick Clark | Published March 27, 2026 | PDF

Every large enterprise now runs agents from multiple frameworks: LangChain pipelines for customer service, AutoGen multi-agent systems for code generation, vendor-specific copilots for productivity, custom RAG systems for internal knowledge, and an accelerating wave of MCP-connected tools. Each framework defines agents differently, stores memory differently, exposes capabilities differently, and handles governance differently or not at all. Communication standards including MCP, OpenAPI, AsyncAPI, and the historical OASIS lineage of UDDI, SOAP, and CMIS each address part of the integration surface, but none answers the structural question that ISO 30401 knowledge management, ISO 27001 information security, NIST CSF 2.0, FFIEC, FedRAMP, OMB M-24-10, the EU AI Act, and the EU Data Act all presuppose: what is an agent, as a governable object, such that its identity, authority, and obligations remain coherent across organizational and regulatory boundaries. The AQ canonical agent schema answers that question by defining six typed fields that constitute the agent itself, enabling structural interoperability rather than protocol-level translation.


Regulatory framework

The regulatory and standards perimeter around enterprise AI agents has crystallized faster than the underlying frameworks have standardized. ISO 30401 establishes management-system requirements for organizational knowledge, including the provenance, currency, and authority of knowledge artifacts; agent memory and lineage are knowledge artifacts under this standard. ISO/IEC 27001 governs the information security management system within which agent operations sit, requiring asset identification, access control, and audit trail integrity; an agent without a structural identity cannot be inventoried as an asset. NIST Cybersecurity Framework 2.0 adds the Govern function alongside Identify, Protect, Detect, Respond, and Recover, and the Govern function explicitly contemplates AI-related risks that depend on knowing what agents exist, what they are authorized to do, and how their behavior is monitored.

Sector-specific regimes layer additional structural obligations. FFIEC examination expectations for financial institutions require demonstrable controls over automated decisioning, including auditability of the decisioning agent's authority and inputs. FedRAMP authorization boundaries presume that workloads, including agents, have inspectable identity and policy. OMB Memorandum M-24-10 obliges federal agencies to maintain inventories of safety-impacting and rights-impacting AI, with continuous monitoring that depends on the agent being a queryable object rather than an opaque pipeline. The EU AI Act imposes provider, deployer, importer, and distributor obligations that allocate responsibilities along an agent's lifecycle; allocation is only meaningful when the agent has a stable structural identity to which obligations attach. The EU Data Act regulates data sharing, portability, and access, including B2B data flows that increasingly traverse agent intermediaries.

The standards landscape for agent communication has matured in parallel but addresses an orthogonal layer. The OASIS lineage of UDDI for service discovery, SOAP for message exchange, and CMIS for content interoperability established that protocol-level standardization is necessary for cross-organizational integration; the lessons of that lineage are also that protocol standardization is insufficient when the underlying objects lack a shared structural definition. OpenAPI and AsyncAPI standardize the description of synchronous and asynchronous interfaces, respectively. Anthropic's Model Context Protocol standardizes how models access context and tools. None of these defines what an agent is structurally, only how agents and tools communicate.

Architectural requirement

Defensible enterprise interoperability requires four structural properties that protocol-level standards do not provide. First, structural identity: the agent must have a typed, inspectable representation that survives across frameworks, vendors, and organizational boundaries. Second, governance portability: the agent's authority, constraints, and obligations must travel with the agent rather than being implicit in the framework that hosts it. Third, lineage integrity: the agent's history of inputs, decisions, and authorizations must be tamper-evident and queryable wherever the agent is operating. Fourth, capability declaration: the agent must expose what it is permitted and able to do in a form that counterparties can verify before relying on its outputs.

Communication protocols are necessary but not sufficient. Two agents speaking MCP fluently can still have entirely incompatible governance models, incompatible memory representations, and no shared mechanism for verifying each other's execution eligibility. OpenAPI describes the interface; it does not describe the entity behind the interface. The structural question, what is the agent, must be answered before the communication question, how does the agent talk, can be made compliance-bearing.

Why procedural compliance fails

The dominant enterprise approach to agent interoperability is middleware: API adapters, integration platforms, message translation layers, and bespoke connectors that bridge between frameworks. This approach scales combinatorially. Every new framework requires adapters to every existing framework, and every cross-framework interaction requires translation. Translation introduces semantic loss. An agent's governance constraints in one framework may have no representation in another, in which case the constraint is silently dropped at the boundary. An agent's lineage in one framework may be expressible only as opaque metadata in another, in which case audit obligations under ISO 27001 and NIST CSF 2.0 become impossible to satisfy structurally and must be reconstructed forensically when an examiner asks.

Procedural compliance compounds the problem. Organizations respond to the regulatory perimeter by writing policies, conducting reviews, and producing documentation. The artifacts attest to process; they do not produce structural visibility into the agent population. An auditor asking which agents are operating, under what authority, with which data accesses, against which policy, receives an answer assembled from heterogeneous sources: the customer-service framework's logs, the code-generation system's audit feed, the productivity copilot's vendor reports, and the internal RAG system's bespoke instrumentation. The answer is partial by construction, because no shared structural representation exists across these sources.

The failure becomes acute at delegation boundaries. A compliance agent in one framework needs to delegate a sub-task to a trading agent in another framework. Under FFIEC examination expectations, the delegation must be auditable, the delegated authority must be appropriately constrained, and the trading agent's authority must be verifiable before the delegation is accepted. With protocol-level interoperability alone, the compliance agent has no structural way to inspect the trading agent's governance posture before delegating; it must trust the framework boundary or rely on out-of-band documentation. Under the EU AI Act, where provider and deployer obligations attach to specific entities in the lifecycle, the absence of structural identity makes obligation allocation ambiguous, and ambiguity in obligation allocation is a regulatory liability.

Vendor lock-in becomes a structural rather than commercial issue. Switching from one agent framework to another requires not only re-implementing capabilities but also reconstructing the implicit governance, lineage, and authority models that the previous framework encoded informally. Migration projects routinely discover, late, that the source framework's audit trail cannot be expressed in the target framework's terms, and the migration either drops audit fidelity or stalls. The combinatorial integration burden has a corollary: combinatorial migration burden, which keeps organizations on legacy frameworks for compliance reasons even when capability and economics argue for change.

What AQ primitive provides

The AQ canonical agent schema defines six typed fields that constitute every agent: governance policy, memory state, lineage history, execution eligibility, trust scope, and capability declarations. These are not communication protocols. They are the structural properties of the agent object, specified in a way that any framework can map its native representation into. A LangChain agent's tool permissions express as capability declarations. An AutoGen agent's conversation history expresses as memory state. A custom pipeline's access-control rules express as governance policy. A vendor copilot's allowed contexts express as trust scope. The mapping does not require modifying the underlying framework; it requires expressing the agent's essential properties in canonical typed form at the framework boundary.

Once agents share the canonical schema, structural interoperability follows directly. A compliance agent verifies a trading agent's governance posture by inspecting typed fields, not by parsing vendor documentation. A platform agent verifies a sub-agent's lineage before relying on its output, by querying the lineage field, not by reconstructing log evidence. A federated workflow that spans frameworks operates against a single agent type rather than five framework-specific types. The combinatorial integration burden collapses to a linear mapping burden: each framework needs one canonical-schema mapping, not adapters to every other framework.

Partial validity rules accommodate real-world heterogeneity without compromising structural guarantees. An agent that carries governance and memory but lacks lineage can operate in trust zones that do not require lineage verification, but cannot operate in trust zones that do. The schema makes capability and obligation explicit, which is the property that ISO 27001 access control and NIST CSF 2.0 Govern require. The agent's posture against a regulatory regime becomes a query against typed fields rather than a procedural attestation.

The schema composes with existing communication standards rather than replacing them. MCP continues to govern model-tool communication. OpenAPI and AsyncAPI continue to describe interfaces. The OASIS lineage of standards continues to govern messaging where it is in use. The canonical schema sits underneath these protocols as the structural definition of the agent that the protocols carry messages between. The integration story for the enterprise becomes coherent: protocols for communication, schema for identity and governance, and management systems for the organizational controls that wrap both.

Compliance mapping

The canonical schema's fields map directly onto the regulatory and standards perimeter. ISO 30401 knowledge management requirements for provenance and currency map onto the lineage and memory fields, which are first-class structural properties rather than implementation-specific metadata. ISO/IEC 27001 asset identification and access control map onto the governance and capability fields, which make every agent an inventoryable, policy-bound asset. NIST CSF 2.0 Govern function expectations for AI risk are satisfied by the trust scope and execution eligibility fields, which make agent authority and operational preconditions inspectable rather than implicit.

FFIEC examination expectations for automated decisioning map onto lineage integrity and capability declarations: the examiner can verify, through typed-field inspection, what the agent was authorized to do and what it actually did. FedRAMP authorization boundary integrity is preserved because trust scope is an explicit field rather than an implicit property of hosting topology. OMB M-24-10 inventory and continuous-monitoring obligations are satisfied by querying the agent population against the canonical schema, with the schema acting as the inventory's data model. The EU AI Act's allocation of provider, deployer, importer, and distributor obligations becomes tractable because the agent has a stable structural identity to which obligations can be attached and audited. EU Data Act portability and access obligations map onto the lineage and trust scope fields, which encode what data the agent has touched and under what authority.

Communication standards continue to operate above the schema. MCP carries context and tool calls between agents whose canonical-schema fields establish their identity and governance. OpenAPI describes the interfaces that agents expose to non-agent consumers. AsyncAPI describes event-driven interactions in which canonical-schema-bearing agents participate. Where OASIS-lineage standards remain in use for B2B integration, the canonical schema provides the structural identity that those standards historically presumed but never formally specified. The schema is therefore additive to, not in competition with, the existing communication-layer investment that enterprises have already made.

Adoption pathway

Adoption proceeds in three phases. In phase one, the organization deploys a canonical-schema validation layer at the boundary of each agent framework. Agents from LangChain, AutoGen, vendor copilots, and custom pipelines register their canonical fields when entering a shared governance environment. The validation layer verifies that an agent's fields meet the minimum requirements for the intended trust zone. The underlying frameworks remain unchanged; the boundary now has a structurally meaningful checkpoint that ISO 27001 audit, FFIEC examination, and OMB M-24-10 inventory can all consume.

In phase two, the organization migrates cross-framework delegation, shared memory, and federated workflows from middleware adapters to canonical-schema interactions. A compliance agent verifies a trading agent's governance posture through typed-field inspection rather than through vendor-specific API calls. A platform agent inspects a sub-agent's lineage before relying on its output. The combinatorial adapter burden begins to dissolve, and the organization's audit posture becomes a query against canonical state rather than a forensic reconstruction. EU AI Act provider and deployer obligation allocation becomes explicit and defensible.

In phase three, the organization adopts the canonical schema as the native representation for new agent deployments, building on top of communication standards including MCP, OpenAPI, and AsyncAPI rather than reinventing them. New agents are structurally interoperable from the moment they are deployed. Marketplace and platform scenarios become tractable: an agent listed in an internal or third-party marketplace carries verifiable governance, capability, and trust fields; buyers evaluate structural posture before deployment rather than relying on vendor documentation. Cross-organizational agent interactions, increasingly required under the EU Data Act and emerging B2B AI integration patterns, operate against the canonical structural representation rather than against ad-hoc bilateral integrations.

The economic case parallels the regulatory one. Middleware-based interoperability scales combinatorially with the number of frameworks; canonical-schema interoperability scales linearly. Procedural compliance scales with deployment surface and ages poorly; structural compliance scales with the architectural primitive and produces telemetry that auditors and regulators can consume in real time. The OASIS lineage of standards demonstrated, decades ago, that protocol standardization unlocks cross-organizational integration; the canonical agent schema applies the same lesson at the structural layer that protocols presume but do not provide. For enterprises whose agent populations now span multiple frameworks, vendors, and regulatory regimes, the schema is the architectural primitive that makes the population governable, auditable, and economically scalable as a single coherent system.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01