Getting started with ACP
ACP gives every AI agent in your stack identity-verified, policy-enforced, audit-logged tool calls. Three steps from zero to first audit row.
1. Open the ACP console
Sign in at cloud.agenticcontrolplane.com. A workspace is provisioned automatically and your API key is generated on the spot.
Free tier: 50,000 tool calls / month, 30-day audit retention, full identity + policy + audit. No credit card.
2. Install for your stack
Two install paths. Pick the one that matches what your team uses today.
Path A — AI coding clients (Claude Code, Cursor, Codex CLI)
One command:
curl -sf https://agenticcontrolplane.com/install.sh | bash
The installer detects your runtime, registers PreToolUse and PostToolUse hooks, and verifies the connection. Works with Claude Code, Cursor, Codex CLI, and OpenClaw out of the box.
Windows: irm https://agenticcontrolplane.com/install.ps1 | iex
Path B — Agent frameworks (CrewAI, LangGraph, OpenAI Agents SDK, Anthropic SDK, etc.)
One package per framework, then wrap your tool handlers:
pip install acp-crewai
from crewai import tool
from acp_crewai import governed
@tool("send_email")
@governed("send_email")
def send_email(to: str, subject: str, body: str):
... # your code, your creds
ACP intercepts every wrapped tool call, applies your policies, logs the audit row, and returns control to your agent — typically in 5-15ms. Same @governed decorator pattern across CrewAI, LangGraph, OpenAI Agents SDK, Anthropic SDK, Google ADK, Vercel AI SDK, Mastra, Pydantic AI, and AutoGen.
3. See your first audit row
Run any tool call from your AI client or agent. Open the activity log at cloud.agenticcontrolplane.com/activity.
Every governed call is logged with:
- Identity — the verified user from the JWT (or workspace key in dev)
- Decision — allow / deny / redact / rate-limit + reason
- Tool — name and parameters
- Chain — depth, root identity, scope at each hop
- Cost — latency, dollar attribution, tokens
Set policies when you’re ready, or let audit run on its own for a while. The default policy allows everything and logs it — you tighten it as you understand your traffic.
What governance you get
Every governed call passes through six gates, in order:
- Identity — RS256 JWT verified against your IdP’s JWKS on every call
- Safety — PII scan and secret redaction on input and output
- Policy — runtime authorization, deny-by-default, scopes per call
- Usage — per-user rate limits and budgets, agent-runaway detection
- Routing —
x-user-uidpropagated to your backend; SSRF guard outbound - Audit — structured, immutable log streamed to the console (or your SIEM)
Next steps
- Integration guides — Claude Code, Cursor, Codex CLI, Anthropic SDK, OpenAI SDK, CrewAI, LangGraph, and more
- AgentGovBench — see how ACP-paired frameworks score on 48 governance scenarios
- Comparison — when to use ACP vs LLM gateway vs agent framework vs API gateway
- Pricing — free tier, Pro plan, Enterprise
Want to self-host?
If you’d rather run the control plane on your own infrastructure, the open-source reference implementation is on GitHub.