SettleMint
ArchitectureStart Here

System context

DALP system boundary, external actors, trust boundaries, and the five-layer smart contract architecture that underpins the platform.

Purpose: Define what is inside DALP, what is outside, and where trust boundaries fall. Doc type: Explanation. What you will find here:

  • External actors and their relationship to the platform
  • Trust boundary layers from user-facing interfaces to the blockchain
  • The five-layer smart contract architecture

Related: Architecture map | Key flows | Security | SMART Protocol integration (ERC-3643)


External actors

ActorInteractionEntry point
Asset IssuersConfigure and issue tokenized financial instruments, manage lifecycle eventsAsset Console, Unified API
InvestorsParticipate in offerings, hold assets, receive distributionsAsset Console (read-only views), custodian wallets
Compliance OfficersDefine compliance rules, manage identity claims, review audit trailsAsset Console, Unified API
Platform OperatorsDeploy infrastructure, monitor health, manage access controlHelm charts, observability dashboards, Unified API
External SystemsWallets, exchanges, custodians (DFNS, Fireblocks), EVM RPC nodes, oracle servicesUnified API, Chain Gateway, Feeds system

Trust boundaries

Three trust boundaries separate external actors from the blockchain state that DALP manages.

Rendering diagram...

Three takeaways:

  1. Authentication and authorization are enforced at the interface layer before any operation reaches the engine.
  2. The Execution Engine adds durable orchestration, transaction signing, and custody policy evaluation.
  3. The SMART Protocol enforces compliance on-chain as the final, immutable gate on every state change.

Boundary details

BoundaryControlsEnforced by
1 - AuthenticationSession auth (Better Auth), API key validation, rate limitingAsset Console, Unified API
2 - OrchestrationCustody policies, nonce management, gas estimation, retry logicDALP Execution Engine (Restate workflows)
3 - On-chainIdentity verification, compliance modules, transfer restrictionsSMART Protocol smart contracts

Five-layer smart contract architecture

The on-chain side of DALP follows a layered architecture where each level builds on the one below it. Lower layers are more stable and shared; upper layers are more specific and change more frequently.

Rendering diagram...

Three takeaways:

  1. The SMART Protocol foundation is shared across all deployments and defines the ERC-3643 token standard.
  2. Global and System layers are infrastructure — deployed once per chain and once per system instance, respectively.
  3. Assets and Addons represent business logic that issuers configure per financial instrument.

Layer summary

LayerPurposeKey components
SMART ProtocolERC-3643 token framework with modular compliance, identity management, and extension systemCore token, compliance engine, identity registry interfaces
GlobalPlatform-wide infrastructure shared across all system instances on a given chainCentral directory, identity factory, identity implementations
SystemPer-system infrastructure managing identity registration, compliance, and access controlIdentity registry, compliance orchestration, access manager, factory registries
AssetsDeployed tokenized financial instruments built on the SMART ProtocolDALPAsset, Bond, Equity, Fund, Deposit, StableCoin, RealEstate, PreciousMetal
AddonsOperational tools that extend assets with distribution, settlement, and treasury capabilitiesAirdrop, Vault, XvP Settlement, Token Sale (DAIO), Yield

How layers interact

A user request flows top-down through the stack:

  1. An addon (e.g., Airdrop) or direct API call triggers an operation on an asset (e.g., Bond)
  2. The asset delegates identity and compliance checks to the system layer
  3. The system resolves implementations through the global directory
  4. The SMART Protocol executes the compliant transfer or state change

Next steps

  • Key flows to see how the most important operations traverse these layers
  • Components for detailed component boundaries and responsibilities
  • Security for authentication, authorization, and compliance controls

On this page