SettleMint
ArchitectureSecurity

Wallet Verification

Wallet verification gates blockchain write operations as a second security layer beyond session authentication, using PIN, TOTP, or backup-code checks.

Overview

Wallet verification is the per-request check that protects blockchain write operations from browser sessions. Even with a valid authenticated session, a signing request must include PIN, TOTP, or backup-code evidence before DALP passes the operation to the signing flow.

System context

Rendering diagram...

Why wallet verification exists

Session authentication proves identity. Wallet verification proves intent for the request that will consume a wallet secret. Separating these checks means a browser session alone cannot trigger asset transfers, minting, burning, or other signing operations protected by the wallet-verification middleware.

The check runs before signing. DALP rejects the request before the signing flow starts when verification evidence is missing, the selected method is not configured for the user, or the credential is wrong.

See the security overview for how this check combines with authentication, authorization, custody policy, and on-chain transfer controls.

Verification methods

Transaction-signing APIs accept these wallet verification methods. Organizations can enable one or more based on their security posture.

PINCODE

A 6-digit PIN set during initial wallet setup. PIN verification provides quick confirmation for routine transactions where the user is already authenticated and working within the platform.

  • Setup: User defines PIN during wallet creation
  • Usage: Enter 6-digit code alongside the transaction request
  • Trade-off: Fastest verification, lower resistance to shoulder-surfing compared to TOTP

Two-factor authentication (TOTP)

Time-based one-time passwords generated by an authenticator app. Codes rotate every 30 seconds following RFC 6238.

  • Setup: User scans a QR code into their authenticator app during wallet setup
  • Usage: Enter the current 6-digit code from the authenticator app
  • Trade-off: Stronger than PIN (codes expire), requires the user's authenticator device

Backup codes

Backup codes are one-time recovery codes generated during wallet setup. DALP generates 16 codes in xxxxx-xxxxx format. Each code can pass verification once; reuse fails because DALP records used codes.

  • Setup: Platform generates and stores the active code set during wallet configuration; user stores the codes securely offline
  • Usage: Enter any unused code when PIN or TOTP is unavailable
  • Trade-off: Last-resort recovery mechanism; limited supply, one use per code

Passkeys and wallet verification

Passkeys can be used for account authentication when enabled for the deployment. DALP documents passkey sign-in on the Authentication page.

For blockchain write requests, the wallet verification middleware accepts PINCODE, OTP, or SECRET_CODES. Do not send PASSKEY as the walletVerification.verificationType for transaction-signing API calls; the request will be rejected.

How verification works in requests

API procedures that trigger blockchain write operations accept a walletVerification object in the request body:

FieldValueDescription
walletVerification.verificationTypePINCODE, OTP, or SECRET_CODESWhich wallet verification method the user presents
walletVerification.secretVerificationCode6-digit string, TOTP code, or backup codeThe credential for the selected verification method

The Unified API validates the credential before forwarding the operation to the Execution Engine. If verification fails, the request is rejected immediately. No gas is consumed, no custody provider interaction occurs, and no on-chain state changes.

API key sessions bypass verification

When a request is authenticated via API key, wallet verification is not required. The walletVerification field can be omitted from the request body. API keys are scoped credentials intended for machine-to-machine use. The API key is the authorization factor, so a second interactive challenge is not part of that path.

Failure cases

Wallet verification fails before the signing flow starts. The request is rejected when:

ConditionResult
No authenticated user is availableUNAUTHORIZED with Authentication required
The user has no PIN, backup-code, or TOTP method configuredUSER_MISSING_2FA with setup guidance
The request omits walletVerification for a browser-session writeBAD_REQUEST with Wallet verification is required
The selected method is not configured for the userFORBIDDEN
The submitted PIN, backup code, or TOTP code is invalid or already usedFORBIDDEN
PASSKEY is sent as the wallet verification typeFORBIDDEN

Passkeys authenticate account sign-in. PINCODE, OTP, and SECRET_CODES are the accepted wallet verification values for transaction-signing requests.

Security considerations

  • Separate credential path: Wallet verification uses wallet-specific PIN, backup-code, or TOTP records rather than the browser session token.
  • Method-level configuration: A user must have the selected method enabled before that method can satisfy a signing request.
  • Replay prevention: Backup codes are recorded on use, and TOTP tokens are tracked so the same token cannot be replayed.
  • API-key exception: Machine-to-machine API-key sessions skip the interactive wallet-verification challenge.

See also

On this page