Authentication Specification
AdCP uses a tiered authentication model where some operations are publicly accessible while others require authentication.When Authentication is Required
Public Operations (No Authentication Required)
These operations work without credentials to enable discovery and evaluation:list_creative_formats- Browse available creative formatslist_authorized_properties- See which properties an agent representsget_products- Discover inventory (returns limited results without auth)
get_products may return:
- Partial catalog (run-of-network products only)
- No pricing information or CPM details
- No custom product offerings
- Generic format support only
Authenticated Operations (Credentials Required)
These operations require valid credentials:get_products(full access) - Complete catalog with pricing and custom productscreate_media_buy- Create advertising campaignsupdate_media_buy- Modify existing campaignssync_creatives- Upload creative assetslist_creatives- View your creative libraryget_media_buy_delivery- Monitor campaign performance and metricsprovide_performance_feedback- Submit optimization signals
Authentication Methods
AdCP supports multiple authentication methods. Implementations must support at least one method:JWT Bearer Token
API Key
Principal Model
Required Headers by Protocol
MCP
A2A
HTTP REST
Obtaining Credentials
Account Setup Process
To access authenticated operations, you must establish an account with each sales agent:- Identify Sales Agents: Discover sales agents via publisher
adagents.jsonfiles - Contact Sales Team: Reach out to the agent’s sales or partnerships team
- Complete Onboarding: Provide business information, sign agreements, configure billing
- Receive Credentials: Get API keys or OAuth client credentials
Dynamic Registration (Optional)
Some sales agents support OAuth 2.0 dynamic client registration:adagents.json for dynamic registration support.
Aggregation Platforms
Consider using aggregation platforms (like Scope3) that manage credentials and relationships with multiple sales agents on your behalf. This simplifies:- Credential management
- Financial relationships
- Legal agreements
- Compliance monitoring
Error Responses
Unauthenticated Request to Protected Operation
Invalid or Expired Credentials
Insufficient Permissions
Best Practices
- Secure Storage: Store credentials securely (environment variables, secret managers)
- Rotation: Implement credential rotation policies
- Scope Limitation: Request minimum required permissions
- Token Refresh: Implement automatic token refresh for JWT tokens
- Error Handling: Handle authentication errors gracefully with retry logic