Access token Authentication
Private key authentication is a fundamental security mechanism in DPSN, ensuring the integrity and authenticity of network participants.
Core Functionalities
Access Token Generation: Users can obtain their access tokens by signing up on the DPSN Dashboard. Once registered, an access token is automatically generated for each user. This token is used for all authenticated interactions within the network.
Authentication: Instead of using cryptographic signatures, users authenticate and prove their identity and ownership through their access tokens. These tokens serve as secure credentials for publishing and subscribing to topics.
Access Token Management: Access keys are managed by the DPSN network, eliminating the need for users to handle private key storage or cryptographic operations. Users can view, revoke, and regenerate their access tokens directly from the dashboard interface.
Security Considerations
Access token revocation: Emphasizes the importance of protecting access tokens from unauthorized access. Provides mechanisms for recovering lost or compromised access tokens, while maintaining security. Recommends regular rotation of access tokens to mitigate security risks.
Additional Features
Multi-signature Authentication: Allows for multiple private keys to be required for authorizing actions, enhancing security.
Hardware Security Modules (HSMs): Supports the use of HSMs for storing and managing private keys securely.
By employing robust private key authentication, DPSN safeguards against unauthorized access and ensures the integrity of network operations.
Last updated