Quickstart
Set up IAP beta and create your first verified certificate
This path is for a fresh beta install. You will install iap-agent, create a project-local
identity, connect to the registry, append local state into AMCS, issue certificates, and verify the
result offline.
Need beta access?
If you are ready to test IAP with a real agent, request onboarding and include a short description of your expected volume (number of agents and continuity frequency).
1. Install the package
python3 -m venv .venv
source .venv/bin/activate
python -m pip install -U pip
python -m pip install -U iap-agent
2. Create a project-local identity
This creates a fresh local Ed25519 identity for the current project and avoids accidentally reusing a global identity from another workspace.
iap-agent init --project-local --show-public --json
3. Connect to the registry
If the operator sent you a handoff command, run that exact command. A typical setup command looks like this:
iap-agent setup --registry-base "https://registry.ia-protocol.com" --registry-api-key "iapk_live_optional" --account-token "iapt_live_optional" --check --json
4. Append local state into AMCS
AMCS is the local append-only state store. Append the files you want reflected in certifiable state.
iap-agent amcs append --project-local --amcs-db ./amcs.db --file ./AGENT.md --file ./SOUL.md --json
iap-agent amcs root --project-local --amcs-db ./amcs.db --json
5. Issue the identity anchor for a new agent
The identity anchor binds your agent_id to your local key. For a brand-new agent, issue this
first.
iap-agent anchor issue --registry-base "https://registry.ia-protocol.com" --identity-file ./.iap/identity/ed25519.json --agent-name "Atlas" --payment-provider auto --open-browser --wait --json
iap-agent anchor cert --registry-base "https://registry.ia-protocol.com" --request-id <request_id> --output-file ./identity_anchor.json --json
6. Issue a continuity certificate
After local state is in AMCS, request continuity certification for the latest
memory_root/sequence.
iap-agent continuity request --registry-base "https://registry.ia-protocol.com" --project-local --amcs-db ./amcs.db --json
iap-agent continuity pay --registry-base "https://registry.ia-protocol.com" --request-id <request_id> --payment-provider auto --open-browser --json
iap-agent continuity wait --registry-base "https://registry.ia-protocol.com" --request-id <request_id> --timeout-seconds 600 --poll-seconds 5 --json
iap-agent continuity cert --registry-base "https://registry.ia-protocol.com" --request-id <request_id> --output-file ./continuity_record.json --json
7. Verify the certificate offline
In basic mode, the CLI can fetch the registry public key from the configured registry. For strict continuity verification, provide a pinned registry key and the saved identity anchor.
iap-agent verify ./continuity_record.json --registry-base "https://registry.ia-protocol.com" --json
iap-agent verify ./continuity_record.json --profile strict --registry-public-key-b64 <REGISTRY_PUBLIC_KEY_B64> --identity-anchor ./identity_anchor.json --json
What success looks like
- A project-local identity exists under
./.iap/identity/.... iap-agent registry check --jsonreportsregistry_reachable: true.iap-agent continuity certwrites a certificate bundle to disk.iap-agent verifyreturns{"ok": true, "reason": "ok"}.
Next steps
Need the full flow?
Use the full user manual for setup, quota checks, identity anchors, continuity, and troubleshooting.
Need help?
Use the troubleshooting page for setup failures, invalid credentials, and sequence mismatches.
Want the action-provenance demo?
Use the offline Isnad walkthrough to see local action logging, receipts, and tamper detection.