You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The grade/compliance evaluation tools should be able to assess an agent's OAuth and RFC 9421 request signing setup. It's unclear whether current grading capabilities cover these, and the affordances aren't surfaced clearly to operators trying to validate their security posture.
Context
AdCP 3.0 includes:
RFC 9421 request signing profile — Ed25519 HTTP Message Signatures, optional in 3.0, mandatory under AdCP Verified. Published test vectors at static/compliance/source/test-vectors/request-signing/.
OAuth 2.1 + OIDC for authentication (authorization servers via RFC 8414, protected resource metadata via RFC 9728, dynamic client registration via RFC 7591).
Signing is required for mutating operations under AdCP Verified; webhook callbacks have their own signing rules.
Operators setting these up need a way to verify their implementation is correct end-to-end: keys discoverable, canonical inputs producing bit-identical signatures, OAuth metadata properly published, scopes correct, etc.
Summary
The grade/compliance evaluation tools should be able to assess an agent's OAuth and RFC 9421 request signing setup. It's unclear whether current grading capabilities cover these, and the affordances aren't surfaced clearly to operators trying to validate their security posture.
Context
AdCP 3.0 includes:
static/compliance/source/test-vectors/request-signing/.Operators setting these up need a way to verify their implementation is correct end-to-end: keys discoverable, canonical inputs producing bit-identical signatures, OAuth metadata properly published, scopes correct, etc.
Proposed evaluation surfaces
OAuth setup:
/.well-known/oauth-authorization-server(RFC 8414) — present, well-formed, declares supported grants/scopes/.well-known/oauth-protected-resource/...(RFC 9728) — present, points to correct ASWWW-Authenticate: Bearer resource_metadata=…where appropriateRequest signing setup:
static/compliance/source/test-vectors/request-signing/produce bit-identical canonical inputsrequest_signature_requiredreturned correctly when unsigned mutating request is sentpush_notification_configdeclarationAsks
References