Deploys on
Adapters
Roadmap
How it works
Deploy policy once. Enforce anywhere. Verify outcomes independently.
Declare
Define interaction terms: access rules, attribution requirements, and optional settlement conditions.
Gateway 402
Enforce decisions at the edge or origin with allow/deny/rate-limit and optional HTTP 402 challenges.
Verify
Verify signed receipts offline (library) or via API for billing, disputes, audits, and partner attestations.
Trace
Observe decisions and outcomes as evidence events, then export for audits and operations.
Policy, optional settlement, and proof in one platform
Declare terms, enforce decisions, and verify interaction outcomes with signed receipts.
Evidence-first operations
Understand outcomes as evidence events derived from PEAC receipts, not opaque tracking. Filter by issuer, policy hash, endpoint, and decision, then export for audits, disputes, and incident review.
Explore TracePolicy as code
Define interaction terms once. Optionally export compatible views (AIPREF, peac.txt, robots directives) without changing enforcement semantics.
Try DeclareEdge deployment
Deploy enforcement and verification close to ingress using edge runtimes or self-hosted infrastructure.
View optionsHTTP 402 settlement
HTTP 402 settlement for machine-payable APIs with x402 today and additional rails via adapters (including i402 as planned).
Learn moreCryptographic receipts
Ed25519-signed receipts for interaction outcomes, verifiable offline with issuer public keys.
View docsEvidence-Ready
Built-in audit trails and policy hooks so you can verify what happened.
Trust centerFrom policy to proof
The PEAC standard defines a lifecycle: declare terms, enforce access decisions, optionally request settlement, issue signed receipts, and verify outcomes. Originary provides modular components for each step.
Policy
Declare terms via peac.txt
Access
Enforce with HTTP 402
Settlement (optional)
Adapter-based settlement evidence
Receipt
Signed PEAC-Receipt headers
Trace
Verification endpoints
Portable by design
PEAC receipts work across any conformant implementation. Your policies and decision records are not locked to Originary's platform - they're portable across ecosystems, payment rails, and verification endpoints.
- Receipts: signed JWS (Ed25519), verifiable offline with issuer public keys
- Policies: published at /.well-known/peac.txt. No proprietary APIs.
- Settlement: optional, adapter-based. x402 live, Stripe in preview, custom adapters supported.
- Verification: pure cryptography. No phone home to Originary servers.
Production components around the standard
Use as much or as little as you need. Each module is independently deployable.
Declare
Generate and publish peac.txt policies with AIPREF snapshots. CLI tool and web UI for policy authoring.
Try DeclareGateway
HTTP 402 enforcement at the edge. Deploy as middleware or standalone gateway. Works with Cloudflare Workers, Vercel Edge, self-hosted.
View Gateway docsVerify
Verify PEAC-Receipt signatures offline via JWKS or online via API. Verify any receipt from any PEAC-conformant issuer.
Try verificationTrace
Operational exports for audits and dispute resolution. Export receipts, payment proofs, and policy snapshots as JSONL.
See Trace demoAdapters
Connect to payment rails (x402, Stripe), AI preference formats (AIPREF), and verification protocols. Extend with custom adapters.
Browse adaptersDeploy it your way
Choose the deployment model that fits your infrastructure, compliance requirements, and operational needs.
Self-hosted
Deploy components in your own infrastructure. Full control, zero vendor dependency.
Edge functions
Run Gateway 402 on Cloudflare Workers, Vercel Edge, or AWS Lambda@Edge.
Managed
Originary-hosted components for teams that want operational support. Contact us for managed deployments.
Integrate in three steps
Publish your peac.txt policy at /.well-known/peac.txt
Deploy Gateway 402 to enforce access decisions and issue receipts
Use Verify to validate receipts from any PEAC-conformant source
Built for ecosystems, not silos
PEAC is designed for organizations that operate in multi-party ecosystems: API providers serving AI builders, content platforms managing inference and training terms, payment networks coordinating settlements, and compliance teams needing auditable decision records. If you need portable, verifiable proof of access decisions, PEAC is for you.
Ship the standard in production
Start with the demo, explore the docs, or talk to us about your use case.
Open protocol. No lock-in. Multiple implementations welcome.
