Securing the Ledger
Control who can access and operate on your ledger with signers, policies, and circles
Every operation on the ledger must be authenticated and authorized. This section covers how to manage identities, configure access control, and enforce security policies.
Identity
Create and manage the cryptographic identities that interact with the ledger.
About Signers
Digital identities with cryptographic key pairs.
Keys and Signatures
How public-key cryptography secures ledger operations.
User Creation
Register a new signer on the ledger.
Generate Signing Keys
Create Ed25519 key pairs for signing operations.
Hash and Sign Requests
Sign API requests with your private key.
Authenticate with JWT
Use JSON Web Tokens for API authentication.
Access Control
Configure who can read and write ledger records.
About Security
Overview of the ledger's security model.
About Authentication
How the ledger verifies identity.
About Authorization
How the ledger controls access to resources.
Ledger Access Rules
Set up access rules at the ledger level.
Record Access Rules
Set up fine-grained access rules on individual records.
Circles
Group signers into roles for simplified access management.
About Circles
What circles are and how they organize signers.
Assign Signer to Circle
Add a signer to a circle.
Drop Signer from Circle
Remove a signer from a circle.
Circle-Based Access
Configure access rules that apply to entire circles.
Domains
About Domains
Partition the ledger into isolated namespaces.
Access Policies
Define and manage security policies that govern ledger access.
About Policies
Overview of security policies and their types.
Activate Policy
Enable a security policy on the ledger.
Deactivate Policy
Disable a security policy.
Policy-Based Access
Configure access rules using policies.
Migrate Access Strategy
Transition between access control approaches.
Tutorials
Basic Access Tutorial
Step-by-step walkthrough of wallet access control — from unrestricted to policy-based.
Prerequisites
- Start Here — Understand ledger basics and key concepts