SettleMint
ArchitectureStart Here

Architecture map

Navigate the DALP architecture documentation by platform layer, reader goal, and integration question.

DALP architecture is easiest to review as a chain of responsibility: request, execution, enforcement, evidence. Operators and integrations start work through the Asset Console or Unified API. The Execution Engine coordinates the transaction path. SMART Protocol contracts enforce configured controls on EVM. The Chain Indexer turns confirmed events into the state used by dashboards, APIs, reports, and operational review.

Platform at a glance

Operators and integrations use the Asset Console or Unified API to start asset, compliance, servicing, and settlement workflows. The DALP Execution Engine coordinates durable operations and signing before state-changing actions reach SMART Protocol contracts. The Chain Indexer makes confirmed on-chain events queryable again, while the Feeds system supplies market data to platform services and contracts that need pricing inputs.

Rendering diagram...

Platform dashboard with portfolio overview and key operational metrics

The responsibility split is deliberate:

LayerDALP coversOperator or external systems own
InterfaceAsset Console screens and Unified API entry points for asset, compliance, servicing, and settlement operationsUser access policy, approval process, and the systems that call the API
ExecutionWorkflow orchestration, transaction preparation, signing handoff, retries, and transaction status trackingCustody-provider policy decisions, quorum rules, and off-platform operational approvals
BlockchainSMART Protocol contracts, asset state, identity checks, compliance modules, and configured transfer controlsExternal bridge, liquidity, redemption, wallet, and chain-validator risk outside the selected EVM networks
EvidenceChain event indexing, API read models, dashboard state, reports, and monitoring inputsReview process, evidence retention policy, and reconciliation against off-platform records
Market dataFeed registration, signed updates, adapter reads, and indexed price data for configured feed topicsSource data selection, pricing methodology, and issuer or provider attestation outside DALP

This section explains how DALP is structured and where to continue reading. It does not replace the integration, security, or operability pages when you need provider setup, deployment controls, payment-rail design, accounting workflows, or detailed threat review.

This architecture map has four practical takeaways:

  1. Asset and compliance operations start through a user or API surface, then move through orchestration before on-chain execution.
  2. SMART Protocol contracts hold the on-chain asset state and enforce transfer compliance where the configured rules apply.
  3. The Chain Indexer turns confirmed contract activity into operational evidence and read-side visibility.
  4. Market data is a supporting service, not the only path through the platform.

Required system model

Before you configure, integrate, or audit DALP, treat the platform as a layered asset system, not one undifferentiated application. The model to hold is:

Work to doSystem model you need firstWhy it matters
Configure assets or compliance controlsA DALP system groups assets, identities, roles, compliance modules, trusted issuers, feeds, and factory registries. An issued asset belongs to that system and inherits the controls configured for the system and the asset.Configuration choices only make sense when you know which controls are system-scoped and which settings belong to the asset.
Integrate through APIs or external systemsRequests enter through the Asset Console or Unified API, pass through the Execution Engine for orchestration and signing handoff, then reach SMART Protocol contracts for on-chain state changes. Custody providers, wallets, price sources, and chain infrastructure remain external dependencies.Integrations must send the right request to the right layer and keep provider, wallet, feed, and chain responsibilities outside DALP.
Audit security, compliance, or operationsDALP separates pre-transaction access checks, orchestration controls, custody-provider policy, on-chain compliance enforcement, indexing, market-data inputs, and observability.Audits need to trace each control to the layer that enforces it instead of treating DALP as one application with one control plane.

Read System context to place the system scope, Asset model to understand how asset classes, templates, token features, and compliance rules fit together, and Key flows to trace operations across layers.

Choose the right starting point

Reader questionStart withThen read
What is the one-page architecture story for an RFP or security call?Architecture one-pagerEvents catalogue, System context, and Deployment topology
What is inside DALP, and what stays external?System contextComponents, Integrations, and Capability docs matrix
How do asset class, template, features, and compliance fit together?Asset modelTokenization modeling, Asset issuance, and Token features
What changes after an asset is issued?Lifecycle after issuanceAsset detail workspace and Token lifecycle API
Which platform operations should a reviewer trace first?Key flowsFlows and Security
Which operational model supports production deployment and review?OverviewOperability and Deployment topology
Which self-hosting pages should an infrastructure team read first?Self-hostingPrerequisites, installation process, and high availability

Architecture sections

SectionCoversUse it when
Start HereSystem context, asset model, lifecycle after issuance, key flows, and glossaryYou are orienting a new architect or reviewer
OverviewPrinciples, quality attributes, deployment topology, and data domainsYou are evaluating platform fit or planning capacity
ComponentsPlatform components and responsibility boundariesYou need the owner and integration role of a component
FlowsAsset issuance, signing, transfers, feeds, and settlement sequencesYou are tracing one operation across platform layers
IntegrationsExternal systems, custody providers, compliance providers, and supported networksYou are assessing third-party dependencies or provider handoffs
SecurityAuthentication, authorisation, identity compliance, wallet verification, custodyYou are preparing a security review, audit, or control map
OperabilityObservability model, database architecture, and failure modesYou are reviewing operational readiness or incident preparation
Self-hostingDeployment prerequisites, installation process, OpenShift, and high availabilityYou are planning infrastructure, environment sizing, or hosting

Suggested reading paths

First-time orientation:

  1. Start Here (this page)
  2. System context
  3. Asset model
  4. Tokenization modeling
  5. Lifecycle after issuance
  6. Key flows
  7. Overview

Capability lookup: Capability docs matrix maps common product questions to the architecture, user-guide, and developer-guide pages that answer them.

Security review: Security then Signing flow then Custody providers.

Operational readiness: Operability then Deployment topology then Failure modes.

Deployment planning: Self-hosting then Prerequisites then High availability.

Integration planning: Components then Integrations then Unified API.

On this page