

# Prerequisites for AgentCore payments
<a name="payments-prerequisites"></a>

Complete the prerequisites on this page before you use AgentCore payments.

## AWS account and credentials
<a name="payments-prereq-account"></a>

You need an AWS account with credentials configured. To configure credentials, install and use the AWS Command Line Interface by following the steps at [Getting started with the AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html).

```
# Verify installation
aws --version  # Should show version 2.x
```

## Python and AWS SDK
<a name="payments-prereq-python"></a>

To access your AWS credentials and configure them for use with SDKs, follow the steps at [Using IAM Identity Center to authenticate AWS SDK and Tools](https://docs.aws.amazon.com/sdkref/latest/guide/access-sso.html). If you plan to use the AWS Python SDK (Boto3) to interact with AgentCore payments programmatically:

1. Install **Python 3.10\+**.

1. Install the AWS SDK: `pip install boto3` 

1. Verify your credentials are configured: `aws sts get-caller-identity` 

For more information on how to set up and use the AWS SDK, see [AWS Builder Tools](https://aws.amazon.com/developer/tools/).

## Payment provider credentials
<a name="payments-prereq-provider-credentials"></a>

AgentCore payments connects to external payment providers for cryptocurrency wallet operations. You must obtain credentials from at least one supported provider before creating a PaymentConnector.

### Coinbase CDP credentials
<a name="payments-prereq-coinbase"></a>

If you plan to use Coinbase CDP as your payment provider for developer-managed wallets, obtain the following credentials from the [Coinbase Developer Platform](https://docs.cdp.coinbase.com/api-reference/v2/authentication):

1. Create or log in to a Coinbase Developer Platform account and project.

1. Generate an API key and Wallet secret (or reuse an existing one) and note the following values:    
[See the AWS documentation website for more details](http://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/payments-prerequisites.html)

1. Under **Project** > **Wallet** > **Embedded Wallets** > **Policies**, enable **Delegated signing**.

![Coinbase dashboard for API keys](http://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/images/payments/coinbase-keys.jpg)


### Privy credentials
<a name="payments-prereq-privy"></a>

If you plan to use Privy for user-owned embedded wallet flows, obtain the following credentials from the [Privy Dashboard](https://docs.privy.io/authentication/overview#api-authentication):

1. Create a **dedicated** Privy app for AgentCore operations at [dashboard.privy.io](https://dashboard.privy.io/). Do not reuse Privy apps that serve other purposes.

1. Copy the **App ID** and **App Secret** from your app settings.

1. In your Privy app, navigate to **Wallet Infrastructure** > **Authorization** and choose **New Key** to generate a P-256 key pair. Privy prefixes the generated private key with `wallet-auth:`. Strip this prefix and keep only the raw base64 content. Note the following values:    
[See the AWS documentation website for more details](http://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/payments-prerequisites.html)

**Note**  
When you generate an Authorization Key in the Privy dashboard, the private key is prefixed with `wallet-auth:`. AgentCore payments does not accept this prefix — you must strip it before storing the key in your PaymentCredentialProvider. Only the raw base64 key content is needed for transaction signing.

For example, if Privy generates:

```
wallet-auth:MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg...
```

Use only:

```
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg...
```

![Privy key dialog for AgentCore payments](http://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/images/payments/privy-keys.png)


#### Security best practices for Privy credentials
<a name="_security_best_practices_for_privy_credentials"></a>

 **Create a dedicated Privy app for AgentCore** 

Create a separate Privy app that is used exclusively for AgentCore payments. This reduces the scope of credentials and simplifies auditing of wallet operations.

 **Restrict secret access to AgentCore services** 

When you store your Privy `App Secret` in AgentCore Identity as a PaymentCredentialProvider, ensure that only the AgentCore payments service role can retrieve the secret. Do not grant access to the underlying secret in AWS Secrets Manager to any other IAM principals. The following resource policy on the secret restricts access to the AgentCore service role:

```
{
    "Version": "2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Deny",
            "Principal": "*",
            "Action": "secretsmanager:GetSecretValue",
            "Resource": "*",
            "Condition": {
                "StringNotEquals": {
                    "aws:PrincipalArn": "arn:aws:iam::111122223333:role/AgentCorePaymentsResourceRetrievalRole"
                }
            }
        }
    ]
}
```

**Warning**  
If Privy secrets are accessible to principals beyond the AgentCore service role, a compromised IAM identity could retrieve the secrets and execute unauthorized wallet operations outside of AgentCore’s budget enforcement and audit controls.

 **Rotate secrets regularly** 

Rotate your Privy credentials on a regular schedule to reduce the window of exposure for any compromised secret.


| Credential | Recommended rotation frequency | 
| --- | --- | 
|  `App Secret`  | Every 90 days | 
|  `Authorization Private Key`  | Every 90 days | 
|  `App ID`  | Does not require rotation (public identifier) | 
|  `Authorization ID`  | Rotates automatically when you generate a new key pair | 

To rotate credentials:

1. Generate a new key pair or App Secret in the Privy Dashboard.

1. Update the PaymentCredentialProvider in AgentCore Identity with the new values.

1. Verify that payment operations succeed with the new credentials.

1. Revoke the old credentials in the Privy Dashboard.

**Note**  
Plan for a brief overlap period where both old and new credentials are active. This prevents downtime during rotation.

After you obtain credentials from your provider, you store them in AgentCore Identity as a PaymentCredentialProvider. For instructions, see [Configure payment credential providers](resource-providers.md). For the complete request and response schema, see [CreatePaymentCredentialProvider](https://docs.aws.amazon.com/bedrock-agentcore-control/latest/APIReference/API_CreatePaymentCredentialProvider.html) in the API Reference.

## (Optional) Identity provider for JWT authorization
<a name="payments-prereq-jwt"></a>

If you plan to use JWT authorization for inbound access to your Payment Manager (to enable consumers to access the Payment Manager using non-IAM identities), set up Amazon Cognito or your own identity provider before creating the Payment Manager:

1.  **Create a Cognito User Pool** (or use your existing identity provider).

1.  **Register an App Client** and note the Client ID.

1.  **Create a test user** with a username and password.

Alternatively, you can choose **Quick create configurations with Cognito** during Payment Manager creation, and AgentCore payments creates the authorization configurations on your behalf.

For detailed instructions, see [Configure inbound JWT authorizer](inbound-jwt-authorizer.md).