Publisher Access Governance (PAG)
A Publisher is a content owner that declares how AI platforms may access its content under Publisher Access Governance (PAG). Publishers control access through a machine-readable declaration (aip.json), serve content via a structured retrieval endpoint, and receive accountability events for every access and citation.
PAG is the publisher-access module adjacent to AIP’s operator monetization flow. Publishers define what content can be accessed, under what conditions, and within what editorial scope.
What is a publisher?
A Publisher is an entity that:-
Declares access permissions
Publishers publish a
/.well-known/aip.jsonfile that defines whether, when, and within what editorial scope AI platforms may access content. -
Serves content via RetrieveRequest/RetrieveResponse
When an AI platform sends a valid, authenticated
RetrieveRequest, the publisher evaluates it against declared policies and returns permitted content chunks or an explicit denial. - Verifies request authenticity Publishers verify HMAC signatures on every incoming request using the AIP authentication and signing spec.
- Receives access and citation events Publishers receive structured events that record when content was accessed and how it was cited, enabling post-retrieval accountability and audit.
- Controls content boundaries Publishers define retrieval limits (max chunks, max tokens), supported retrieval modes, and cache policies. AI platforms must respect these constraints.
Examples of publishers
- News organizations and media companies
- Industry research publishers
- Technical documentation providers
- Knowledge base operators
- Academic and scientific publishers
- Government and public data portals
- Specialized vertical content providers (legal, medical, financial)
Publisher responsibilities
Publishers MUST
- Publish a valid
/.well-known/aip.jsondeclaration - Implement the retrieve endpoint (
POST /pag/retrieveor equivalent) - Verify AIP authentication headers on every request (
X-AIP-Key-Id,X-AIP-Timestamp,X-AIP-Nonce,X-AIP-Signature) - Evaluate requests against
intent_accessandeditorial_domainsfromaip.json - Enforce declared retrieval limits (
max_chunks,max_tokens) - Emit
accessevents for every successful retrieval - Return explicit denial responses (with reason) when access is not permitted
- Reject unsigned or invalid requests with
401or403
Publishers SHOULD
- Sign responses using the same HMAC mechanism
- Emit
citationevents whenendpoints.event.requiredistrueinaip.json - Store
(key_id, nonce)pairs for replay protection within the replay window
Publishers MAY
- Support multiple retrieval modes (chunks, citations, full article)
- Define custom editorial domain hierarchies using dot notation
- Use the
extensionsnamespace for vendor-specific metadata - Set
compliance.sunsetfor automatic expiration of access declarations
The aip.json declaration
Every publisher begins by publishing a declaration at/.well-known/aip.json. This file defines:
| Section | What it controls |
|---|---|
intent_access | Master switch, operational state, access mode, training use, storage rights, cache policy |
editorial_domains | Editorial scope boundary for AI access |
endpoints | Capabilities, retrieve, and event endpoints |
retrieval | Supported modes and limits (chunks, citations, max tokens) |
compliance | Revocation rights, notice requirements, expiration |
Retrieval flow
When an AI platform needs publisher content in response to a user query:- Platform checks the publisher’s
aip.jsonfor compatibility - Platform sends an authenticated
RetrieveRequestto the publisher’s retrieve endpoint - Publisher verifies the signature and validates the request
- Publisher matches
intent.domainagainsteditorial_domains - Publisher evaluates
intent_accessconstraints - Publisher returns a
RetrieveResponsewith content chunks, a denial, or an error
Authentication and signing
Every RetrieveRequest must carry four required headers:| Header | Purpose |
|---|---|
X-AIP-Version | Protocol version routing |
X-AIP-Key-Id | Identifies the API key used to sign the request |
X-AIP-Timestamp | ISO 8601 timestamp for replay protection |
X-AIP-Nonce | Random single-use value (minimum 16 bytes entropy) |
X-AIP-Signature | HMAC-SHA256 signature of the canonical request string |
Access and citation events
AIP defines two event types for post-retrieval accountability:| Event type | When emitted | Who emits |
|---|---|---|
access | Content was successfully returned | Publisher |
citation | Content was surfaced to the user as a citation | Platform |
- Verify how content was accessed
- Audit citation accuracy
- Support dispute resolution
- Track usage patterns
What publishers do NOT do
Publishers in AIP:- Do not participate in auctions or selection
- Do not submit bids or pricing
- Do not receive ContextRequests
- Do not interact with the Operator’s commercial layer
- Do not expose user identifiers
Getting started
To integrate as a publisher:- Publish
aip.json- Deploy a valid declaration at/.well-known/aip.jsonon your domain - Register with the AIP Registry - Obtain API keys and a shared secret
- Implement the retrieve endpoint - Accept authenticated
RetrieveRequestpayloads and returnRetrieveResponse - Implement signature verification - Validate HMAC signatures on every incoming request
- Emit access events - Fire an
accessevent for every successful retrieval - Test end-to-end - Verify the full flow: declaration discovery, authenticated retrieval, event emission
Role within the protocol
Publishers are the content layer of AIP. Platforms are the intent layer. Operators are the governance and commercial layer. Publisher Access Governance (PAG) is the subset of AIP that defines how publishers declare, control, and audit AI access to their content - without any coupling to the commercial participation protocol.See also
- aip.json schema - Publisher declaration format
- RetrieveRequest - Platform-to-publisher retrieval request
- RetrieveResponse - Publisher-to-platform retrieval response
- Access and Citation Events - Post-retrieval accountability events
- Authentication and Signing - Message authentication and signing spec