SettleMint
ArchitectureOverview

Data domains

Client-facing data-domain map for DALP, showing which records are on-chain, which are off-chain, which are indexed, and who owns each governance decision.

DALP separates authoritative asset state, platform operating records, and indexed read models. Client operators use that split to assign data ownership, retention, reconciliation, privacy, and reporting responsibilities for a DALP deployment.

Source-of-truth model

Rendering diagram...
Data classSource of truthUsed for
On-chain asset stateEVM contractsToken balances, roles, compliance module execution, identity-bound checks
Off-chain platform recordsPostgreSQL application tablesUsers, organizations, API keys, transaction requests, audit/action records
Durable workflow stateDurable Execution Engine journals and workflow recordsProgress, retries, signer waits, recovery, transaction lifecycle
Indexed read modelPostgreSQL views and tables derived from chain events and platform dataOperator dashboards, API reads, reporting, reconciliation
External-provider stateCustody, RPC, secrets, storage, and observability providersSigning approvals, network access, secrets, files, logs, metrics, traces

How to read the model

The EVM network is the source of final asset state. DALP platform records coordinate the work around that state: who requested an action, which workflow is running, and which custody approval is pending. Indexed views make chain and platform records fast to read, but they do not replace the underlying source.

Domain ownership

DomainPrimary source of truthDALP-owned responsibilityClient/operator responsibility
Asset supply and balancesEVM token contractsContract execution path, indexing, display in console/APIAsset terms, operating approvals, reconciliation policy
Asset metadata and lifecycleEVM contracts plus platform recordsLifecycle workflows, contract configuration, indexed visibilityInstrument setup, business approval, lifecycle operating procedure
Identity and compliance claimsOn-chain identity/claim contracts and configured trusted issuersClaim and module integration surfaces, transfer checks, indexed stateTrusted-issuer selection, claim policy, compliance interpretation
Roles and permissionsPlatform records and contract rolesRole-aware routes and contract role executionSegregation of duties, user assignment, periodic access review
Transaction requestsPlatform database plus workflow stateQueue records, workflow progress, transaction statusOperational review, approval policy, exception handling
Signing and custodySigner/custody provider plus DALP transaction recordsSigner integration handoff and status trackingProvider governance, key administration, approval policy
Chain eventsEVM networkEvent ingestion and indexingNetwork selection, node/RPC operations where self-managed
User accounts and sessionsPlatform database and authentication subsystemAccount/session records and route enforcementUser lifecycle policy, access approvals, identity-provider controls
Audit and action historyPlatform records plus on-chain evidenceCapture and expose operational evidenceRetention, export, downstream audit process
Feeds and reference dataConfigured feed records and provider inputsFeed storage, update routes, on-chain update flows where configuredProvider selection, acceptable freshness, exception process

On-chain, off-chain, and indexed data

QuestionOn-chain stateOff-chain platform recordsIndexed read model
What is it best for?Final asset and compliance stateWorkflow, users, settings, requests, audit/action recordsFast operating views over chain and platform data
Can it be edited?Only through new transactions and contract rulesThrough authenticated platform operations and migrationsRebuilt or updated from source data
What is the normal latency?Block inclusion and confirmation policyDatabase transaction timeIndexer freshness after relevant events are available
What happens during a chain lag?Chain may already have newer state than the indexed viewRequests and workflow state can show progressDashboards may wait for indexing before showing the new operating view
What is the governance concern?What data is appropriate to place on-chainRetention, access, backup, and PII handlingReconciliation and freshness expectations

Common reconciliation cases

SituationHow to read it
API accepted an action, but no transaction hash yetThe request is in platform/workflow state and has not reached broadcast visibility
Transaction hash exists, but dashboard has not movedThe chain may have a receipt before the indexer-derived read model has updated
Dashboard shows old balance after an included transferCheck indexer freshness, chain receipt, and whether the relevant event was processed
Custody approval is pendingThe execution path is waiting outside DALP's direct control, but DALP should keep the transaction status visible
Compliance failure appears on transferThe contract or preflight path rejected the operation according to configured identity/compliance controls

Data-retention and privacy responsibility lines

Responsibility lineWhat DALP architecture establishesWhat this page does not claim
On-chain recordsData written to EVM contracts or emitted as events follows the selected network's visibility modelThat public-chain data is private or erasable
Platform databaseApplication records, transaction records, indexed state, and audit/action records live off-chainA specific retention schedule, deletion policy, or regulatory conclusion
External providersCustody, RPC, secrets, storage, and observability systems may hold provider-specific recordsProvider contractual terms, uptime, retention, or privacy guarantees
Reporting exportsDALP can expose data through console/API surfaces where implementedThat downstream reports are legally sufficient without client review

Data-governance checklist

Decision to makeOwner to assign
Which data may be written on-chainBusiness, legal, compliance, and technology owners
Which EVM network is acceptableTechnology, risk, and operations
How transaction evidence is retainedOperations, compliance, and records-management teams
How indexed-read freshness is monitoredPlatform operations
How custody-provider evidence is reconciledTreasury/custody operations and platform operations
How API/audit data is exportedReporting, compliance, and integration teams

Limits

LimitConsequence
Indexed data is derivedThe indexer read model is not a separate source of asset truth; it is derived from chain/platform data
On-chain data is not erasableDo not put sensitive data on-chain unless the institution accepts the visibility and retention model
Provider records are externalCustody, RPC, observability, storage, and secrets providers must be reviewed as part of the deployment
No legal retention promiseRetention and deletion policies are deployment and client-governance decisions

Where to go next

On this page