SettleMint
ArchitectureIntegrations

Custody Providers

Architecture overview of DALP's custody provider integrations covering DFNS and Fireblocks MPC signing, policy engines, configuration requirements, and the unified signer abstraction that makes providers interchangeable.

Purpose

DALP integrates with institutional MPC custody providers to protect private keys controlling digital assets. This page documents the integration architecture for DFNS and Fireblocks --- what each provider offers, how they connect, and how the unified signer abstraction makes them interchangeable.

  • Doc type: Reference

What you'll find here

  • Provider comparison: MPC models, policy engines, and API contracts
  • DFNS integration architecture and configuration surface
  • Fireblocks integration architecture and configuration surface
  • Unified signer abstraction and provider switching
  • Storage tier mapping from development through regulated production

Provider comparison

CapabilityDFNSFireblocks
MPC typeThreshold MPCMPC-CMP (continuous key refresh)
Policy engineDFNS Policy EngineTransaction Authorization Policy (TAP)
Mobile approvalNoYes (Fireblocks app)
Programmatic approval via DALPFull API resolutionConsole / Co-Signer only
API modelREST APIREST API
Wallet modelFlat wallet listVault account hierarchy
Multi-chain token registration--EVM, Stellar, Algorand, TRON, and more

Both providers use MPC signing so that no single private key ever exists in one place. The fundamental difference is operational: DFNS allows fully programmatic approval workflows through its API, while Fireblocks requires approvals through its own console or mobile app.

DFNS integration

DFNS provides delegated MPC custody where key shards distribute across DFNS infrastructure. DALP connects through a service account with the following configuration:

SettingDescription
API URLDFNS service endpoint
Organization IDTenant identifier
Auth tokenService account authentication
Credential IDIdentifies the signing credential
EC private keyElliptic curve key for API authentication

Policy enforcement

The DFNS policy engine evaluates transaction rules before MPC signing proceeds. Policies support auto-sign rules, amount thresholds, IP/time restrictions, and multi-party approval requirements. When a policy requires approval, DALP surfaces the pending approval through its API --- operators can review, approve, or reject without leaving the DALP interface.

Audit integration

DFNS audit logs synchronize with DALP audit records, providing unified compliance reporting across both the platform and custody layers.

Fireblocks integration

Fireblocks provides institutional MPC-CMP custody through vault accounts. Key material distributes across Fireblocks infrastructure and the customer's co-signer node, with continuous key refresh eliminating static key shares.

SettingDescription
API keyFrom the Fireblocks Console
RSA private keyPEM format, for API authentication
API endpointProduction or sandbox URL (auto-detected)

Vault-based wallet model

Fireblocks organizes keys into vault accounts, each containing one or more asset wallets. DALP supports creating vault accounts, activating asset wallets, and querying vaults across the organization.

Transaction Authorization Policy (TAP)

Fireblocks enforces custodian-level policies through TAP rules that evaluate before signing. Rules cover transaction amount thresholds, whitelisted destination addresses, velocity limits, and multi-approver requirements.

When a TAP rule blocks a transaction, DALP surfaces the pending approval. However, unlike DFNS, Fireblocks does not support programmatic approval resolution through external APIs. Blocked transactions must be approved through the Fireblocks Console or a Co-Signer appliance.

Unified signer abstraction

The unified signer interface abstracts over all custody backends. Switching between DFNS and Fireblocks requires only configuration changes --- no workflow modifications, no code changes, no API contract differences for consumers.

This abstraction boundary means:

  • Platform workflows call the signer interface without knowing which provider handles the request
  • Adding a new provider requires implementing the signer adapter, not changing platform flows
  • Provider-specific behavior (approval model differences, vault hierarchies) is encapsulated behind the adapter

See the Signing Flow for the complete end-to-end sequence showing how the signer interface delegates to the active provider.

Storage tiers

Custody providers represent the highest tier in DALP's key storage hierarchy. Organizations select the appropriate tier based on asset value and regulatory requirements:

TierProtectionUse case
Encrypted databaseApplication-level encryptionDevelopment and low-value assets
Cloud secret managerPlatform-managed encryptionStandard production deployments
Hardware security moduleFIPS 140-2 Level 3Regulated financial services
Third-party custody (DFNS / Fireblocks)Delegated institutional MPCHighest security requirements

Each tier escalates protection. The Key Guardian routes signing requests to the appropriate backend based on key metadata. See Key Guardian for the full storage hierarchy and routing architecture.

See also

On this page