Blimp Vault
Last updated
Last updated
The Vault feature in Blimp allows you to securely store and manage your wallet keys using the Key Management System (KMS) with split key technology. This feature enhances security, transparency, and user control over wallet operations. Here is a detailed guide to using the Vault and its options:
Go to Settings → My Wallet → Vault. On the Vault page, you will see the label kms.auth-store-wallet-description.
Click on the Store Wallet in Vault button. A Split Key will be generated and displayed. Upon storing, an Active Split Key will be generated and displayed.
Once the Active Split Key is generated, you can perform several actions:
Copy the Key: Locate the active split key on the Vault page. Click the Copy button to copy the key for backup or secure sharing.
View Key Details: Click on the Details icon beside the active split key. Review the metadata for the key, including:
Created On: The date the key was created.
Shared: The sharing status of the key.
Last Used: The last date the key was accessed.
View Restrictions: The restrictions for this key
Switch Key: If you have more than one key this icon will be shown. You can click on it to switch between keys.
The Vault allows users to control access to their wallet keys by applying restrictions. You can securely share split keys with other users using the Share feature. To manage restrictions:
Click the Share button on the Vault page.
In the sharing window, select the specific restrictions to apply. Some default permissions are set which you can change it. The restrictions are:
Enter the username of the recipient to securely share the key. Confirm the sharing action, ensuring the recipient has the necessary permissions.
Always verify restrictions before sharing a key and Ensure your split key is backed up securely to prevent loss of access.
If you wish to remove your wallet from the Vault, click the Disconnect from Vault button. Confirm the action to ensure the wallet is no longer stored in the Vault.
If you are assigned a key by another user, follow these steps to utilize the key:
Find the key that has been assigned to you. Assigned keys will appear in the list of active keys.
Review the restrictions and permissions tied to the key from Key Details Section. This determines what actions you can perform using the key.
Perform the allowed operations based on the permissions provided.
This comprehensive management system is designed to provide maximum security and customizable control, making it ideal for both personal and enterprise users.
Property | Description |
Allow All | Grants unrestricted access to the wallet and its operations. |
Token Transfers | Enables or restricts the ability to perform token transfer operations. |
Allocation File Operations | Allows or disables file-related actions such as uploading, downloading, and deleting files within an allocation. |
Allocation Storage Operations | Permits management of storage-related actions like increasing or extending storage allocations. |
Allocation Token Operations | Enables the use of tokens for allocation-related tasks, such as payments for storage or upgrades. |
Storage Rewards | Controls access to managing rewards for storage providers or blobbers. |
Storage Operations | Enables general operations related to storage, such as viewing or modifying storage configurations. |
Storage Management | Allows administrative tasks related to storage, including managing providers, locations, and settings. |
Miner Operations | Grants access to operational actions for miners within the network, such as updating configurations. |
Miner Management Operations | Allows users to manage miner-specific tasks, including assigning roles, monitoring performance, or managing settings. |
Miner Financial Operations | Enables financial activities for miners, such as handling fees, rewards, or other monetary-related tasks. |
Token Bridging | Allows or restricts the ability to bridge tokens across different blockchain networks. |
Authorizer Management Operations | Enables management tasks for authorizers, such as adding, removing, or updating authorizer roles. |
Authorizer Operations | Grants access to general operations involving authorizers, such as handling authentication or verification tasks. |