SettleMint
ArchitectureSecurity

Overview

Overview of DALP's security architecture covering authentication, authorization, identity and compliance, on-chain compliance modules, and wallet verification as layered defenses for digital asset operations.

Purpose

This section documents DALP's security architecture as a set of layered controls that protect digital asset operations from identity verification through on-chain enforcement.

  • Doc type: Reference

What you'll find here

  • Authentication mechanisms across console and API access
  • Authorization model with role-based and resource-level controls
  • On-chain identity and compliance enforcement via ERC-3643
  • Modular compliance rules that govern token transfers
  • Wallet verification gates for blockchain write operations

Defense-in-depth model

DALP enforces security at every platform layer. No single control failure grants unauthorized access to digital assets.

LayerControlEnforced by
IdentityAuthentication (session, API key, SSO)Asset Console, Unified API
AccessRole-based and resource-level authorizationUnified API middleware
TransactionWallet verification (PIN, TOTP, backup codes)Unified API before blockchain writes
On-chainIdentity claims and compliance modulesSMART Protocol (ERC-3643)
CustodyProvider policy evaluation and MPC signingKey Guardian, custody providers

Each layer operates independently. A compromised session token is blocked by wallet verification. A bypassed API authorization check is blocked by on-chain compliance. Custody provider policies provide the final gate before any transaction reaches the blockchain.

Section pages

PageDescription
AuthenticationIdentity provider options, session management, passkeys, and enterprise SSO
AuthorizationRole-based access control, resource-level permissions, and permission inheritance
Identity and complianceOn-chain identity (ERC-734/735 OnchainID), KYC/AML claims, and verification lifecycle
Compliance modulesModular transfer rules, country restrictions, investor limits, and time-based locks
Wallet verificationPIN, TOTP, and backup code verification for blockchain write operations

Secure authentication with passwordless passkey support

Trust boundaries

Three trust boundaries define the security perimeter:

  1. Platform boundary -- between external users/systems and DALP's API surface. Controlled by authentication and rate limiting.
  2. Execution boundary -- between the API layer and the Execution Engine. Controlled by authorization and input validation.
  3. Chain boundary -- between the Execution Engine and the blockchain. Controlled by wallet verification, on-chain compliance, and custody provider policies.

See also

On this page