Integrate Hermes agents into the Microsoft 365 ecosystem using Microsoft Agent 365 (A365).
Project description
Hermes-A365
Integrate Hermes agents into the Microsoft 365 ecosystem using Microsoft Agent 365 (A365), the governance / identity / observability control plane that GA'd 2026-05-01.
Hermes-A365 vs sibling Hermes Teams plugins
Hermes ships its own classic-Bot-Framework Microsoft Teams adapter
(plugins/platforms/teams/adapter.py, shipped v2026.4.30; in-flight
work in hermes-agent#10037
and hermes-agent#13767).
That is the right tool when you want Hermes as a generic Teams chat
bot — DM, channels, group chats, threading, file attachments.
Setup: Azure App Registration + client secret / certificate / Managed
Identity + Teams app manifest with bots[]. No M365 tenant-directory
identity, no Copilot Chat surfacing.
Hermes-A365 covers what classic Teams bots structurally can't:
| Path | Surfaces it lights up | Operator prerequisites | Status |
|---|---|---|---|
| A — AI Teammate (M365 agentic user) | Hermes appears as a first-class agentic identity in your M365 tenant directory + "Built for your org" picker + M365 People search + agentic-user audit trails. Teams 1:1 chat with M365-native identity. | M365 tenant + Frontier Preview Program + Tier 3 license. No Azure subscription. | ✅ Validated round-8 end-to-end 2026-05-11 with streaming (v0.3.0) |
| B — Custom Engine Agent (Azure Bot Service + 1.21 manifest) | M365 Copilot Chat agents picker + side-panels in Word/Excel/PowerPoint/Outlook + Copilot-fabric search. Reaches classic Teams surfaces too as a side effect, but the sibling Teams adapter is the cleaner tool for those. | Path A's prerequisites + Azure subscription for Bot Service registration of the blueprint Entra app with the Microsoft Teams channel enabled. | 🟡 Emitter shipped 2026-05-12 (hermes a365 publish --copilot-chat, slice 19u-a). Live Copilot Chat surfacing deferred pending Azure subscription (#16). |
Both paths share the same blueprint Entra app, service principal, and bot endpoint, so an operator with both prerequisites can run both surfaces from one Hermes-A365 install. They are not mutually exclusive — and they are NOT in overlap with the sibling Teams adapter.
When to pick what:
- "Hermes is a chat bot in Teams (DM / channels / group / file uploads)" → sibling Hermes Teams adapter (classic BF).
- "Hermes is a first-class agentic user in our M365 tenant directory" → Hermes-A365 Path A (AI Teammate).
- "Hermes surfaces in M365 Copilot Chat and Copilot side-panels" → Hermes-A365 Path B (Custom Engine Agent). Requires Azure subscription.
- "All of the above" → install both the sibling Teams adapter AND Hermes-A365; configure each for its lane.
See references/m365-surface-coverage.md
for the full surface-by-surface matrix and the architectural
reasoning behind the split.
Status
v0.3.0 (released 2026-05-11) + slice 19u-a (Custom Engine
Agent emitter, shipped 2026-05-12 on main, not yet tagged). 712
tests passing, ruff clean. See CHANGELOG.md for
the full release notes.
Path A (AI Teammate) validated end-to-end against the satscryption M365 tenant rounds 3 → 8, including full BF streaming protocol round-trip on 2026-05-11 (closes #3).
Path B (Custom Engine Agent) emitter shipped + manifest shape validated by Teams App Catalog upload 2026-05-12; live Copilot Chat round-trip deferred pending Azure subscription provisioning (see #16).
What works today
Lift of the per-surface matrix from
references/m365-surface-coverage.md.
Legend: ✅ shipped + validated · 🟡 shipped, validation deferred ·
🔵 sibling-plugin lane · 🔴 out of scope · ⚪ non-surface.
| Surface | Best Hermes-stack path | Hermes-A365 coverage |
|---|---|---|
| Teams 1:1 chat with M365 agentic identity | Hermes-A365 Path A | ✅ round-8 E2E + streaming 2026-05-11 |
| Teams 1:1 chat (generic chat bot, no M365 identity) | Sibling Teams adapter | 🔵 use sibling |
| Teams group chat / channel / meetings | Sibling Teams adapter | 🔵 use sibling |
| Teams file attachments (image, PDF, DOCX, …) | Sibling Teams adapter (PR #13767) | 🔵 use sibling |
| M365 Copilot Chat (standalone) | Hermes-A365 Path B | 🟡 emitter shipped; needs Azure (#16) |
| Word / Excel / PowerPoint Copilot side-panels (Hermes as Copilot agent) | Hermes-A365 Path B | 🟡 same Custom Engine Agent registration |
| Outlook — Copilot Chat side-panel inside Outlook | Hermes-A365 Path B | 🟡 same |
| Microsoft Search invocation | Hermes-A365 Path B + #18 | 🟡 needs Azure + invoke handlers |
Outlook compose-action (task/fetch / task/submit) |
Path B (Copilot fabric) or sibling adapter | 🟡 / 🔵 |
Teams compose extensions (composeExtension/*) |
Sibling Teams adapter | 🔵 use sibling |
| Cron / proactive sends on M365 surfaces | Hermes-A365 + #4 | 🟡 ConversationRef registry shipped, agent-side trigger pending |
| Word / Excel / PowerPoint as declarative Copilot agents | Separate skill | 🔴 different runtime |
| Office Add-ins / Loop / OneNote | Separate skills | 🔴 different SDKs |
| Web chat / Direct Line / SharePoint Embedded | Separate Direct Line skill | 🔴 bypasses M365 |
| Slack / Telegram / WhatsApp / etc. | Use Hermes' respective platform adapters | 🔵 use the dedicated adapter |
Known limitations
v0.3.0 ships the operator wrapper, read path, Bot Framework activity
bridge, streaming protocol, setup wizard, and (post-tag, on main)
the Custom Engine Agent emitter for Path B. Outstanding gaps:
- Path B (Copilot Chat) needs Azure subscription. Custom Engine Agent surfacing in Copilot Chat requires registering the blueprint Entra app as an Azure Bot Service resource with the Microsoft Teams channel enabled — confirmed during the 2026-05-12 live walkthrough. Without Azure, the 1.21 manifest uploads to the Teams App Catalog cleanly but Microsoft's routing layer doesn't forward Copilot Chat activities to our endpoint. The agent stays AI-Teammate-shaped (instance creation → Teams notification only). #16 tracks the live walkthrough once Azure is provisioned.
- Proactive replies for >10 s agent thinking are not implemented
(#4).
send()still requires a cached inbound; cron-driven sends do not work yet. Applies to both paths. - Invoke activities (Path B) — Outlook compose-action
(
task/fetch/task/submit), Microsoft Search invocation, and OAuth invoke (signin/verifyState) for tools inside Copilot Chat are tracked under #18; umbrella not yet implemented. Teams compose-extension invokes (composeExtension/*) are sibling-plugin lane, not Hermes-A365's. - Setup wizard XDG symlink gap — the GA
a365CLI reads~/.config/a365/a365.generated.config.jsonbut our wizard places the generated config at the operator-configurableA365_GENERATED_CONFIG_PATH. Without a symlink,a365 publishfails. Tracked as #25. --manifest-idflag for Path B — operators running A + B simultaneously against the same tenant hit a Teams App Catalog duplicate-id rejection because the transformer preservesmanifest.id. Workaround: manually patch a fresh uuid4 intomanifest.idbefore upload. Proper fix in #26.- Plaintext on-disk secret on macOS / Linux. DPAPI is Windows-only;
on macOS / Linux the GA CLI writes the agent blueprint client secret
to
a365.generated.config.jsonin plaintext. See Security model. - macOS 26 device-code prompt volume. On macOS 26.x the GA
a365CLI falls back to device-code per Entra-side mutation, soregister --apply --m365hits ~10–12 prompts instead of 1–2. Documented inreferences/live-tenant-test.md§3. - AI Teammate-flow
agentRegistryentries cannot be deleted by operators (only "blocked" via the M365 Admin Centre). Microsoft platform limitation, not a wrapper bug. - Pluggable secrets / activity-bridge library split / Work IQ V2 amplifiers — tracked as deferred (#19, #20, #21); architecturally sound, picked up when concrete operator demand surfaces.
Three issues filed upstream during the validation walkthroughs:
microsoft/Agent365-devTools#402
(cosmetic logging — fixed in 1.1.174),
microsoft/Agent365-devTools#408
(agentBlueprintClientSecret null-on-disk regression — wrapper-side
detection + --auto-recover-secret ships in this release), and
NousResearch/hermes-agent#20133
(upstream skill-contribution check-in).
Security model
The agent blueprint client secret is the most sensitive artefact this skill handles. Where it lives + how to keep it that way:
- Windows operators:
a365 setup blueprintwrites the secret toa365.generated.config.jsonand protects it via DPAPI. TheagentBlueprintClientSecretProtectedflag in the file istrue. - macOS / Linux operators: DPAPI is Windows-only. The GA CLI
writes the secret in plaintext (
agentBlueprintClientSecretProtected: false). The wrapper tightens the file mode to0600afterregister --apply, and the keychain shim inhermes_a365.keychainmirrors the secret into the OS keychain (macOS Keychain or libsecret) when available. - Source control: the
.gitignoreblocksa365.config.json*,*.generated.config.json*,a365.config.backup-*.json, anda365.generated.config.backup-*.json(and any operator-suffixed variants like…json.r5-cleared). Don't override these. - Per-agent
.envat~/.hermes/agents/<slug>/.envnever carries the secret — only tenant id, app id, and runtime metadata. Source it into the gateway shell + exportA365_BLUEPRINT_CLIENT_SECRETseparately (see Operator setup). microsoft/Agent365-devTools#408— the GA CLI sometimes drops the secret entirely (writesagentBlueprintClientSecret: nullto disk despite reporting success).register --apply --auto-recover-secretdetects this and runsaz ad app credential reset --appendto mint a fresh secret in-place. Use the flag whenever you're not on Windows.
What is A365?
Microsoft Agent 365 is a governance / identity / observability control plane for AI agents that GA'd 2026-05-01. It is not an agent framework — it bolts on top of whichever agent stack you use (Microsoft Agent Framework, Microsoft 365 Agents SDK, OpenAI Agents SDK, OpenClaw, Claude Code SDK, etc.) and adds:
- Entra-backed agent identity (delegated permissions only)
- Tenant licensing (Agent 365 Tier 3 / Microsoft 365 E7)
- Agent blueprints, registered via
a365 setup blueprint - MCP-mediated access to Microsoft 365 data ("Work IQ" tools)
- Bot Framework Activity protocol for messaging + Adaptive Card invokes
- OpenTelemetry observability surfaced in admin centre
- Teams / Outlook / Microsoft 365 Copilot channel adapters
hermes-a365 is the Hermes-side skill that drives these from inside
the Hermes harness.
Repo split
This repo holds the design artefacts — references, scripts,
templates, the activity bridge, and the gateway plugin. The
upstream SKILL.md is contributed into the Hermes Agent harness
at hermes-agent/optional-skills/cloud-platforms/hermes-a365/SKILL.md,
pulling these artefacts in at contribution time. The original
v0.1 design draft is archived at
docs/historical/SPEC-v0.1-draft.md.
Repo layout
.
├── README.md # This file (current spec — what ships, how to run it)
├── CHANGELOG.md # Per-tag highlights + known limitations
├── SKILL.md # Validator-compliant upstream contribution
├── LICENSE # MIT
├── pyproject.toml # Python 3.11+; uv-managed; optional [bridge] extras
├── a365.config.json.example # Seed copy for new tenant setup
├── docs/
│ ├── historical/ # Archived design drafts (e.g. SPEC-v0.1-draft.md)
│ └── submissions/ # Archived drafts of upstream issues we've filed
├── references/ # Dated snapshots + operator runbooks
│ ├── a365-cli-reference.md
│ ├── activity-protocol-shapes.md
│ ├── entra-blueprint-properties.md
│ ├── error-codes.md
│ ├── exposing-the-bot-endpoint.md # Tunnel/reverse-proxy options (non-prescriptive)
│ ├── license-cost-table.md
│ ├── live-tenant-test.md # End-to-end runbook (operator-side)
│ ├── m365-surface-coverage.md # Surface matrix per slice 19t
│ ├── opentelemetry-config.md
│ ├── README.md # Index
│ └── webhook-contract.md # Bridge → responder JSON contract
├── src/hermes_a365/ # The installed package
│ ├── __init__.py
│ ├── _common.py # parse_env, slugify, safe_run, jinja_env, deep_diff
│ ├── a365_config.py # a365.config.json round-trip
│ ├── activity_bridge.py # verify + serve + update-endpoint (standalone)
│ ├── cleanup.py
│ ├── cli.py # `hermes-a365 <verb>` console entry point
│ ├── consent.py
│ ├── doctor.py
│ ├── emit_card.py
│ ├── hermes_responder.py # Reference responder (slice 19c)
│ ├── instance_create.py
│ ├── keychain.py # OS-keychain wrapper (macOS + Linux)
│ ├── license.py
│ ├── mutator.py # Line-streamed subprocess driver + AADSTS handling
│ ├── publish.py
│ ├── reconcile_app.py
│ ├── reconcile_blueprint.py
│ ├── register.py
│ ├── render_instance_env.py
│ ├── status.py
│ ├── plugin/ # Hermes gateway platform plugin
│ │ ├── plugin.yaml # Manifest (loader globs lowercase)
│ │ ├── __init__.py # register(ctx): platform + CLI subcommand
│ │ ├── adapter.py # Agent365Adapter(BasePlatformAdapter)
│ │ ├── cli.py # `hermes a365 <verb>` argparse tree
│ │ ├── conversations.py # ConversationRef + ConversationRegistry
│ │ └── README.md
│ └── _data/ # Packaged Jinja templates (importlib.resources)
│ └── templates/
│ ├── blueprint.json.j2
│ ├── consent-url.txt.j2
│ ├── instance.env.j2
│ └── adaptive-cards/ # greeting / confirmation / error
└── tests/ # 624 tests (pytest + ruff clean)
├── conftest.py
├── golden/
└── test_*.py
Install
hermes-a365 ships as a PyPI package. There are two install paths,
depending on what you want:
Standalone CLI — for operators who just need to drive register /
cleanup / doctor / status / activity-bridge serve outside a
Hermes harness:
pipx install 'hermes-a365[bridge]' # `bridge` extras only needed for `activity-bridge serve`
hermes-a365 doctor --human
Gateway plugin — installs the package into the Hermes venv so the
plugin loader auto-discovers agent365 via the
hermes_agent.plugins entry point. No ~/.hermes/plugins/agent365/
directory required:
~/.hermes/hermes-agent/venv/bin/pip install 'hermes-a365[bridge]'
hermes plugins list # `agent365` should appear with source=entrypoint
Local development (from a checkout):
git clone https://github.com/satscryption/Hermes-A365.git
cd Hermes-A365
uv sync --all-extras
uv run pytest
Once Hermes is on your machine (NousResearch/hermes-agent)
and the plugin install above is done, the Operator setup
section below covers the two remaining manual config edits.
Quick start
The canonical end-to-end walkthrough is
references/live-tenant-test.md. At a
glance, against a Frontier-Preview-enrolled M365 tenant where you hold
Global Admin and a MICROSOFT_AGENT_365_TIER_3 license:
Budget time before you start. On macOS 26.x the GA
a365CLI falls back to device-code per Entra mutation, soregister --apply --m365 --aiteammatetypically hits 10–12 device-code prompts in a row (each on a fresh tab) before it returns. On Linux / Windows the prompt count is 1–2. If you can run the apply path from Linux, do.
# 0. Seed the per-tenant config from the example. The wrapper auto-fills
# most fields at apply time; the example documents the shape.
cp a365.config.json.example a365.config.json
# 1. Pre-deploy diagnostic
hermes a365 doctor --human # exit 0/1/2
# 2. Decide a license model (read-only, never purchases)
hermes a365 license --users 12 --agents 3 --plan E5
# 3. Register the blueprint + MCP/Bot permissions.
# --m365 routes Teams via MCP Platform; --aiteammate creates the
# agentic Entra user. --auto-recover-secret patches the GA CLI's
# macOS / Linux secret-null regression (Microsoft#408) in place.
hermes a365 register --agent-name "Inbox Helper" \
--m365 --aiteammate --apply --auto-recover-secret
# 4. (Verify admin consent — usually granted automatically by setup blueprint;
# poll explicitly if `register` reported a deferred consent step)
hermes a365 consent "Inbox Helper" --no-open
# 5. Per-agent runtime config (writes ~/.hermes/agents/<slug>/.env)
hermes a365 instance create inbox-helper \
--owner sadiq@contoso.com --owner-aad-id <oid> --apply
# 6. Package the manifest zip for admin-centre upload.
# --aiteammate alone: AI Teammate manifest (Teams 1:1 "Built for your org");
# upload at M365 Admin Centre.
# --copilot-chat alone: Custom Engine Agent manifest (M365 Copilot Chat
# agents picker); upload at Teams Admin Center.
# --aiteammate --copilot-chat: both zips side-by-side (Copilot Chat zip
# lands at <original>.copilot-chat.zip).
hermes a365 publish --agent-name "Inbox Helper" --aiteammate --apply
# 7. Operator: in M365 Admin Centre → Agents → All agents → Upload
# custom agent, upload the zip emitted by step 6, then activate
# the agent for each target user under Agent 365 admin centre.
# (For --copilot-chat zips, upload at Teams Admin Center →
# Manage apps → Upload + assign per-user policy.)
# 8. Re-point the messaging endpoint at whatever public HTTPS URL
# fronts your local port 3978. The skill is tunnel-agnostic —
# cloudflared / devtunnels / ngrok / Azure App Service / custom
# reverse-proxy all work. See references/exposing-the-bot-endpoint.md.
hermes a365 activity-bridge update-endpoint \
--agent-name "Inbox Helper" \
--url https://<your-public-host>/api/messages --apply
# 9a. Standalone bridge (debug / no Hermes harness involved)
HERMES_BRIDGE_WEBHOOK=https://my-responder/respond \
hermes a365 activity-bridge serve --slug inbox-helper
# 9b. Hermes plugin path (production: agent loop runs in the gateway)
hermes gateway run --profile inbox-helper
# 10. Status sanity (any time)
hermes a365 status inbox-helper --human
# 11. Tear down
hermes a365 cleanup --agent-name "Inbox Helper" \
--slug inbox-helper --apply --confirm "Inbox Helper"
Running the CLI standalone. Every
hermes a365 <verb>mirrorshermes-a365 <verb>exactly — same flags, same behaviour. Thehermes-a365script comes withpipx install hermes-a365and is handy when iterating without a configured Hermes harness.
Operator setup
After the gateway-plugin pip install above (~/.hermes/hermes-agent/venv/bin/pip install 'hermes-a365[bridge]'), the plugin is auto-discovered via its
hermes_agent.plugins entry point. Run the setup wizard to wire the
platform into Hermes:
hermes gateway setup --platform agent365
The wizard (shipped in v0.2.0) prompts through the generated-config
path, tenant id, blueprint app id, slug, port, secret bootstrap, and
allow-all toggle. It patches ~/.hermes/.env (env vars) and
~/.hermes/config.yaml (plugins.enabled + gateway.platforms.agent365
block) and is fully idempotent — re-running detects existing values,
offers update-vs-keep, and surfaces drift (stale A365_APP_ID, orphan
slugs, missing tenantId/clientAppId in ~/a365.config.json,
unreachable generated_config_path) with auto-fixers where possible.
After the wizard, source the per-agent .env into the gateway's process shell so the adapter inherits the runtime config, then start the gateway:
set -a; . ~/.hermes/agents/<slug>/.env; set +a
hermes gateway run
hermes a365 status <slug> should now show the activity_bridge row
as ok.
Hand-edit fallback. If you need to script the setup non-interactively (CI seed scripts, configuration management), the resulting
~/.hermes/config.yamlblock is:plugins: enabled: - agent365 gateway: platforms: agent365: enabled: true extra: slug: inbox-helper port: 3978 host: 127.0.0.1 generated_config_path: /Users/<you>/a365.generated.config.json…paired with
A365_TENANT_ID,A365_APP_ID,A365_BLUEPRINT_CLIENT_SECRET, and eitherA365_ALLOW_ALL_USERS=true(testing) orA365_ALLOWED_USERS=<csv>(production) in~/.hermes/.env.
Subcommand reference
For exhaustive flags on any verb, run hermes a365 <verb> --help
(or hermes-a365 <verb> --help outside a Hermes harness). The shape:
# === Read-only diagnostics ===
hermes a365 doctor [--human|--no-network]
hermes a365 license --users <n> --agents <n> --plan E3|E5|E7 [--bundled-security]
hermes a365 status [<slug>] [--human]
hermes a365 activity-bridge verify --slug <slug> [--human]
# === Apply-path orchestrators ===
hermes a365 register --agent-name "<display>" [--m365] [--aiteammate] \
[--no-endpoint] [--auto-recover-secret] [--apply]
hermes a365 consent "<agent-name>" [--no-open] [--timeout 60]
hermes a365 instance create <slug> --owner <email> --owner-aad-id <oid> [--apply]
hermes a365 publish --agent-name "<display>" [--aiteammate] [--copilot-chat] \
[--bot-id <guid>] [--apply]
hermes a365 cleanup --agent-name "<display>" [--slug <slug>] [--kinds=...] \
[--purge-orphans] [--orphan-instance-id <guid>] --apply --confirm "<display>"
# === Activity bridge ===
hermes a365 activity-bridge verify --slug <slug>
hermes a365 activity-bridge serve --slug <slug> --port 3978
hermes a365 activity-bridge update-endpoint --agent-name "<display>" \
--url <https://...> [--apply]
The internal helpers (emit_card, keychain, reconcile_app,
reconcile_blueprint, render_instance_env, hermes_responder) are
not surfaced as hermes a365 <verb> subcommands; they're libraries
the orchestrators import. Run them as python -m hermes_a365.<x> if
you need to.
macOS note for the keychain shim. First write to the login keychain pops a UI dialog. Click "Always Allow" to avoid further prompts. CI / headless contexts may fail with
rc=36 User interaction is not allowed—security unlock-keychainfirst.
Open work
External issues filed:
- Microsoft#402 —
setup permissions botcosmetic logging gap. Filed 2026-05-05; Microsoft replied same day confirming Observability-only S2S assignment is intended (the other two resources use delegated OAuth2 only) — three message/log fixes queued for the next CLI release. Fixes shipped in 1.1.174 (verified 2026-05-07). Resolution captured inreferences/live-tenant-test.md(bug #18). - Microsoft#408 —
setup blueprint:agentBlueprintClientSecretpersists asnullon macOS despite successful credential creation. Filed 2026-05-07 after round-6 walkthrough confirmed the regression is still present in CLI 1.1.174 (reproduces 100% across rounds 3, 4, 5, 6 spanning 1.1.171 → 1.1.174). Wrapper-side coverage shipped in slice 19s — see closure of #14 below. - Hermes#20133 —
upstream proposal to add
hermes-a365as an official optional skill. Filed 2026-05-05. Reframed in slice 19l after the SPEC §10 Q1 contract turned out to already exist in the harness; awaiting NousResearch guidance on naming + placement.
Open issues in this repo (run gh issue list for current state):
Active build tracks:
- #3 — Activity bridge streaming responses. Hard prerequisite for #16 (M365 Copilot Chat surface validation per slice 19u) — Copilot Chat enforces a ~15s non-streaming reply timeout.
- #4 — Proactive long-running reply pattern.
Surface-agnostic. Slice 19o registry (
ConversationRef+conversations.json) is the already-shipped prerequisite; what's missing is the Hermes-side trigger.
Surface-validation walkthroughs:
- #16 — Slice 19u: validate M365 Copilot Chat surface (gates on #3).
- #17 — Slice 19v: validate Teams group + channel surfaces (architecturally covered, just needs a live walk).
Adapter quality / operator UX:
- #13 — Slice 19r:
interactive_setup()forhermes gateway setupwizard. Surface-agnostic. - #18 — Slice 19w: handle invoke activities
(BF wire-protocol). Foundation slices 19w-a (typed dispatch +
InvokeContext+ response builders) and 19w-b (generalisedTokenFactory) land first; per-name children 19w-c..g handletask/{fetch,submit}+adaptiveCard/action,composeExtension/*,signin/{verifyState,tokenExchange},search+searchMessageExtension/query, and invoke-aware idempotency replay independently after that. Work IQ V2 amplifier work (search-invoke fast-path, auto-grounding, V2 token bootstrap) split out to #21. Supersedes the older #5.
Deferred (pending operator demand):
These are architecturally-sound future moves that we will not pick up until a concrete operator pain point surfaces — designing them in a vacuum risks getting the API surface wrong. Each issue body lists the explicit triggers that would re-prioritise it.
- #19 — Pluggable secrets provider. Replace
hermes_a365.keychain's OS-keychain shim with aSecretsProviderinterface so operators can plug Vault / AWS Secrets Manager / Azure Key Vault / 1Password / etc. behind it. Defer until the first non-OS-keychain ask, or until Hermes ships its own abstraction we should consume rather than parallel. - #20 — Split
activity-bridgeinto BF-wire library + reference runtimes. The standaloneserveand theAgent365Adapterplugin are already thin wrappers around mostly library-shaped logic (_activity_to_event, JWT validator, idempotency cache, FIC chain). Defer the formal split until a third runtime (e.g., embed in operator's FastAPI app, serverless function) is concretely needed. - #21 — Work IQ V2 → invoke amplifiers. Once
#18's
InvokeContext+TokenFactoryare in place, six BF invoke names (composeExtension/{query,queryLink,anonymousQueryLink},search,searchMessageExtension/query,task/fetchgrounding,signin/verifyStatebootstrap) can be answered by Work IQ V2 MCPtools/calldirectly, bypassing the agent loop. Defer until a tenant with V2 per-workload-app consent asks us to back compose-extension search, or until 19w-g telemetry shows search-shaped invokes dominate (>40%) and the LLM-loop fallback cost justifies the build. Sibling of #18; depends on #18 foundation slices (19w-a + 19w-b).
Recent closures:
#14— GA CLI client-secret persistence regression. Closed 2026-05-07 after slice 19s shipped layer 1 (detection +--auto-recover-secretflag) and round-6 walkthrough validated end-to-end against CLI 1.1.174. Layer 2 filed upstream as Microsoft#408. Live-found bug fixed during validation:_run_streaming(slice 18j) merges stderr into stdout, soaz -o jsonoutput begins with a credential-protectionWARNING:line that broke the initialjson.loadsparser; fixed via_extract_first_json_objectusingJSONDecoder.raw_decodefrom the first{.#1— Hermes gateway platform plugin. Closed 2026-05-06 after §9d round-5 walkthrough validated the plugin path end-to-end. Slices 19m / 19n / 19o / 19o-followup / 19p delivered.#5— Invoke action types. Closed 2026-05-06 as superseded by #18 (per-name split).#6— Outbound auth refactor. Closed 2026-05-05 by slice 19e (agentic three-stage user-FIC chain).#7— AAD-v2 inbound JWT validator. Closed 2026-05-05 by slice 19f.#8 / #9 / #10 / #11— orphan agentic-user purge / orphan agentRegistry surface / inbound idempotency / serviceUrl host allowlist. Closed 2026-05-05 by slices 19g / 19h / 19i / 19j.#12— Filter agents-channel synthetic events. Closed 2026-05-06 by slice 19q + follow-up.#15— M365 surface coverage audit. Closed 2026-05-06 by slice 19t (references/m365-surface-coverage.md+ 3 child issues).
Status meta
Slice timeline at week-grain (per-slice detail is in the commit log):
- 2026-05-04 — v0.2 foundation: slices 18a–18g land
(
mutator.py+a365_config.py+ apply-path rebuild forregister/instance_create/cleanup/publish+ read-path rework againstquery-entra). Live-tenant runbook 18h. - 2026-05-05 — round-2 walkthrough surfaces 18 wrapper bugs; slices 18i–18x fix all 17 in-code/docs. Bug #18 filed upstream as Microsoft#402 and resolved same-day as cosmetic-logging-only.
- 2026-05-05 — slices 19a–19c: bridge
verify+serve+ reference responder; round-3 walkthrough exposes the AADSTS82001 outbound-auth defect on agentic apps. Slice 19e refactors outbound to the canonical agentic three-stage user-FIC chain. - 2026-05-05 — round-3 + round-4 walkthroughs end-to-end:
inbound AAD-v2 JWT (19f, #7),
orphan agentic-user purge (19g, #8),
inbound idempotency (19i, #10),
orphan agentRegistry surface +
--orphan-instance-idflag (19h + round-4, #9), serviceUrl host allowlist (19j, #11). Microsoft#402 framing realignment (19k); SPEC §10 Q1 resolution via the upstream Hermes plugin contract (19l). Bridge-standalone Teams round-trip with JWT-on validated end-to-end. - 2026-05-06 — Hermes plugin path: slice 19m skeleton, 19n
bridge-runtime port, 19o durable session table +
send_typing/send_image, 19o follow-up (lowercaseplugin.yaml+ 1-argis_connected). §9d runbook drafted with explicit prerequisites checklist. - 2026-05-06 — round-5 §9d walkthrough validates the Hermes
plugin path end-to-end: agent loads through
hermes gateway run, Teams DM dispatches viahandle_message, agent reasons, reply lands; gateway-restart durability check passes. #1 closed. - 2026-05-06 — slice 19q filters
agents-channel synthetic events from the agent loop (eliminates onboarding-typing 404 spam). Slice 19t M365 surface coverage audit producesreferences/m365-surface-coverage.md - 2026-05-07 — README narrows
#18 scope
to BF wire-protocol foundation + per-name handlers, splits Work IQ
V2 amplifier work to new
#21.
Slice 19s ships layer 1 of
#14 —
detection +
--auto-recover-secretfor the GA CLI'sagentBlueprintClientSecretpersistence regression. Round-6 validation walkthrough against CLI 1.1.174 confirms the regression is still present (filed upstream as Microsoft#408) and validates layer 1 end-to-end (one live-found JSON-parser bug fixed in commit4b1a2e8). #14 closed.
License
MIT — see LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file hermes_a365-0.4.0.tar.gz.
File metadata
- Download URL: hermes_a365-0.4.0.tar.gz
- Upload date:
- Size: 218.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a318e54451303ef130103ef6d0d96d1e42d9dbeba2d2bfc78632a4b0fe0b4a85
|
|
| MD5 |
86f2531e665b177f17fe8995bd2dfdf0
|
|
| BLAKE2b-256 |
63b5696ca524ffc0b2415289621059d5a6d6834bb10bfa05b7b9828afe9f55f9
|
Provenance
The following attestation bundles were made for hermes_a365-0.4.0.tar.gz:
Publisher:
publish.yml on satscryption/Hermes-A365
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
hermes_a365-0.4.0.tar.gz -
Subject digest:
a318e54451303ef130103ef6d0d96d1e42d9dbeba2d2bfc78632a4b0fe0b4a85 - Sigstore transparency entry: 1519289186
- Sigstore integration time:
-
Permalink:
satscryption/Hermes-A365@dd4c1c8606cec1e2f2da6db0e2c880dfaeadc587 -
Branch / Tag:
refs/tags/v0.4.0 - Owner: https://github.com/satscryption
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@dd4c1c8606cec1e2f2da6db0e2c880dfaeadc587 -
Trigger Event:
push
-
Statement type:
File details
Details for the file hermes_a365-0.4.0-py3-none-any.whl.
File metadata
- Download URL: hermes_a365-0.4.0-py3-none-any.whl
- Upload date:
- Size: 137.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e2004e6a6584a6f29921d7fa4ba04b9f6ff147548a7cb8725dcdfc378f643593
|
|
| MD5 |
391a3bbb3cfe64ca16ec970c2acc4251
|
|
| BLAKE2b-256 |
cebbd8fb5c62d04d210499518b87a688996bcde1eed2279d7e4ef26b0fe16c7d
|
Provenance
The following attestation bundles were made for hermes_a365-0.4.0-py3-none-any.whl:
Publisher:
publish.yml on satscryption/Hermes-A365
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
hermes_a365-0.4.0-py3-none-any.whl -
Subject digest:
e2004e6a6584a6f29921d7fa4ba04b9f6ff147548a7cb8725dcdfc378f643593 - Sigstore transparency entry: 1519289200
- Sigstore integration time:
-
Permalink:
satscryption/Hermes-A365@dd4c1c8606cec1e2f2da6db0e2c880dfaeadc587 -
Branch / Tag:
refs/tags/v0.4.0 - Owner: https://github.com/satscryption
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@dd4c1c8606cec1e2f2da6db0e2c880dfaeadc587 -
Trigger Event:
push
-
Statement type: