Access Control

Access control within the Signchain Dashboard is designed to ensure that only authorized users and applications can interact with your resources. The system provides a flexible role-based permission model to manage access at various levels.

Roles and Permissions

Each user assigned to an account on the Signchain Dashboard can be designated a role that governs their access rights. The primary roles are as follows:

  • Admin: Full access to all resources, including user management and billing.
  • Manager: Access to manage users, monitor usage, and assign non-admin roles.
  • Developer: Limited to API access and operational tasks, with no administrative privileges.
  • Billing: Can view billing information and manage invoices, but has no access to operational resources.
  • Read Only: Can view resources but cannot make any modifications.

Managing Roles

You can assign roles to users through the Signchain Dashboard under the User Management section. Only users with Admin or Manager roles can assign roles to others, with some limitations:

  • Admins can assign any role, including other Admins.
  • Managers can assign all roles except Admin.

Access Control in API Requests

To ensure each request has the appropriate permissions:

  1. Authenticate using your API Key as described in API Key Authentication.
  2. Specify user roles and permissions when managing users in the dashboard. Only authorized roles will be able to perform sensitive operations, such as managing wallets or sending transactions.

Example Request with Role Authorization

The following curl command shows how to authenticate with an API key to access role-specific resources:

curl -H "Authorization: Bearer <Your-API-Key>" https://signchain.net/api/v1/...

Replace <Your-API-Key> with your specific API key. The endpoints and API Keys allow full API access, so make sure they are protected and use developer accounts to manage non-production systems.

Best Practices

  • Assign roles carefully: Only grant the permissions needed for each user to limit exposure to sensitive operations.
  • Regularly review access: Periodically audit user roles to ensure permissions align with current responsibilities.
  • Use secure headers: In cases where additional security is necessary, include both the Authorization and X-Vault-Auth-Signature headers to enhance request protection.

Access control is central to maintaining a secure Signchain Vault environment. Configuring it properly ensures that only trusted users interact with your resources.