DPSN: Decentralised Pub/Sub Network
  • Introduction
  • Why Decentralized?
  • Understanding Topics
  • Architecture
    • Topics Registry
    • Configurator
    • Clusters
    • Publishers and Subscribers
    • Facilitator Brokers
    • SDK
  • Functionality
    • Message Publishing and Delivery
    • Subscription Management
    • Security Considerations
    • Topic Ownership and Access Control
    • Access token Authentication
    • Fully Homomorphic Encryption Support
  • Advantages and Use Cases
    • Advantages of DPSN
    • Use Cases
  • Integration
    • SDK Introduction
    • Publisher
    • Subscriber
    • Delegated Addresses
    • Private Messaging
  • Integration Guides
    • Messaging Application
  • Token Use
    • Utility
    • Token Utility Model
  • DIPs
    • DIP1: Stateless Message Routing in DPSN
  • DIP2: Integration of DPSN with Model Context Protocol (MCP)
  • DIP-3: Standardizing DPSN AVS for Enhanced Security and Reliability
  • Brand Kit
    • Branding
Powered by GitBook
On this page
  1. Functionality

Access token Authentication

Private key authentication is a fundamental security mechanism in DPSN, ensuring the integrity and authenticity of network participants.

Core Functionalities

  • Access Token Generation: Users can obtain their access tokens by signing up on the DPSN Dashboard. Once registered, an access token is automatically generated for each user. This token is used for all authenticated interactions within the network.

  • Authentication: Instead of using cryptographic signatures, users authenticate and prove their identity and ownership through their access tokens. These tokens serve as secure credentials for publishing and subscribing to topics.

  • Access Token Management: Access keys are managed by the DPSN network, eliminating the need for users to handle private key storage or cryptographic operations. Users can view, revoke, and regenerate their access tokens directly from the dashboard interface.

Security Considerations

  • Access token revocation: Emphasizes the importance of protecting access tokens from unauthorized access. Provides mechanisms for recovering lost or compromised access tokens, while maintaining security. Recommends regular rotation of access tokens to mitigate security risks.

Additional Features

  • Multi-signature Authentication: Allows for multiple private keys to be required for authorizing actions, enhancing security.

  • Hardware Security Modules (HSMs): Supports the use of HSMs for storing and managing private keys securely.

By employing robust private key authentication, DPSN safeguards against unauthorized access and ensures the integrity of network operations.

PreviousTopic Ownership and Access ControlNextFully Homomorphic Encryption Support

Last updated 2 days ago