SettleMint
ArchitectureComponentsAsset Contracts

Per-asset RBAC

Per-asset role-based access control separates token governance, supply, custody, emergency, and sale operations. Roles are scoped to one asset contract and do not grant authority over other assets.

Per-asset RBAC controls who can change a token, issue or burn supply, pause operations, protect holders, or manage sale-specific work. The model is scoped per asset: a wallet with a role on one token has no authority over another token unless that role is granted there as well.

Per-asset role model

Every DALP asset uses the same role set defined for asset access control. The Default Admin role manages role membership. Operational roles control specific token surfaces.

RoleScopeKey permissions
Default AdminRole managementGrant and revoke all other per-asset roles; no token operations
GovernanceConfiguration and complianceSet identity contracts, compliance modules, DALPAsset-only token features, and metadata
Supply ManagementMinting and burningMint, burn, batch operations, and set supply cap
CustodianAsset protectionFreeze addresses or partial amounts, forced transfers, and wallet recovery
EmergencyIncident responsePause and unpause operations, and recover stuck ERC-20 tokens
Sale AdminToken sale addonManage token sale configuration and lifecycle
Funds ManagerToken sale addonWithdraw funds from token sales

Sale Admin and Funds Manager only matter when a token sale addon is attached to the asset. They do not add sale powers to tokens without a sale.

Role boundary map

Rendering diagram...

Default Admin changes who holds roles. Governance changes policy and token configuration, with configurable token features limited to flexible DALPAsset contracts. Supply Management changes supply. Custodian handles freezes, forced transfers, and wallet recovery. Emergency handles pause and recovery paths. Sale roles apply only to sale-enabled assets.

Role-based access control configuration for asset operations

Separation-of-duties invariants

DALP asset roles keep role administration separate from token operations.

InvariantMeaning
Default Admin grants roles but does not operate the tokenA role administrator cannot mint, burn, freeze, pause, or configure the asset through that admin role alone.
Supply Management and Custodian are separateThe role that issues or burns tokens is not the same role that freezes balances, forces transfers, or recovers wallets.
Emergency is limited to pause and recovery pathsThe incident-response role can pause or unpause operations and recover stuck ERC-20 tokens. The role does not mint, configure compliance, or force transfers.
Governance configures policy; Supply Management executes issuanceThe role that sets identity, compliance, DALPAsset-only features, and metadata does not control token supply.
Sale Admin and Funds Manager are separateA sale operator can manage sale configuration and lifecycle without also withdrawing sale proceeds.

When a caller does not hold the required role on the asset, the on-chain access-control check rejects the operation. Granting the same role on a different asset does not satisfy the check.

Token holder permissions

Token holder permissions come from balances and asset configuration, not per-asset role assignments. A holder can perform them only when the asset feature is available and the configured identity and compliance checks pass.

Holder permissionCondition
Transfer tokensThe transfer must pass the asset's attached compliance modules.
Redeem at maturityMaturity Redemption must be attached and the maturity date must have passed.
Vote or delegateVoting Power must be attached.
Claim yieldFixed Treasury Yield must be attached and a completed distribution must be claimable.

Holders do not need a per-asset role for these operations. Their wallet still needs to satisfy the identity and compliance rules configured for the asset.

How DALP surfaces role state

DALP represents role state as role-to-account assignments. Asset-scoped role views use the seven asset roles: admin, governance, supplyManagement, custodian, emergency, saleAdmin, and fundsManager.

Role checks are address based. When a participant has more than one wallet, DALP role views can show the roles held by any wallet in the supplied wallet set. Treat that as a view of current role membership, not as a rule that moves authority across wallets.

Full authorization taxonomy

The seven per-asset roles are one layer of the DALP authorization model.

LayerScopeWhere it applies
1. PlatformOff-chain API and console accessUser sessions, API access, and organization context
2. System PeopleOn-chain system-wide operationsSystem-level operations such as identity, feeds, compliance, and factory management
3. Per-AssetOn-chain per-token operationsAsset-specific token configuration, supply, custody, emergency, and sale operations
4. System ModulesOn-chain contract-to-contractContracts that need system module authority

For the complete authorization model, including system roles and read-only audit roles, see Authorization.

See also

On this page