Access Control
Access Control stands as one of the most powerful and functional features, screening every transaction conducted via Console Safes with extensive granularity, thus serving as the core policy layer within Console. As a Console owner, you control end-to-end asset policies, thresholds, and functions, both before and post-transaction initiation.
Access Control acts as the guiding mechanism for managing the flow of transactions initiated on your Console. It's a customisable framework that empowers users to define the conditions under which operators can execute transactions, allowing you to specify these conditions based on a multitude of parameters, such as the asset type, timing, utilised protocols and the intended operators.
Let's begin with an illustrative example to help simplify Console's Access Control framework for you.
At present only two roles have access-based controls: Owners and Operators.
Admins wield unrestricted access to Main Console, while operators are subject to granular limitations and restricted to Sub-Accounts. Fine-grained access Control within modules further refines permissions, while Asset-Based Controls impose constraints based on asset types, thereby injecting precise control once a Sub-Account is delegated for operation.
In another case, this is the perfect ground for a Secure Transfer Environment with the whitelisted allocation of permissions. As architects of access policies, Owners confer specific privileges upon Operators who have restricted, read-only access.
For instance, granular access controls (such as limiting transfers with upper limit and time-based thresholds) within the transfer module introduces additional depth, restricting specific actions based on predefined roles and pre-vetted contract interactions
The Access Control Framework within Console stands as a key feature for delegating access across diverse roles, modules, and assets. The mix of role-based, access policies, and asset-based permissions ensures a dynamic equilibrium between flexibility and security, substantiating a secure, collaborative and verifiable management environment.
Last updated