Blimp Vault

The Vault feature in Blimp allows you to securely store and manage your wallet keys using the Key Management System (KMS) with split key technology. This feature enhances security, transparency, and user control over wallet operations. Here is a detailed guide to using the Vault and its options:

Step 1: Navigate to the Blimp Settings

  • Go to SettingsMy WalletVault. On the Vault page, you will see the label kms.auth-store-wallet-description.

Fig1: Vault Settings

Step 2: Store Your Wallet in Vault

  • Click on the Store Wallet in Vault button. A Split Key will be generated and displayed. Upon storing, an Active Split Key will be generated and displayed.

Fig2: Create Split Key

Step 3: Manage your Split Key

Once the Active Split Key is generated, you can perform several actions:

Fig3: Manage your Split Key
  • Copy the Key: Locate the active split key on the Vault page. Click the Copy button to copy the key for backup or secure sharing.

  • View Key Details: Click on the Details icon beside the active split key. Review the metadata for the key, including:

    • Created On: The date the key was created.

    • Shared: The sharing status of the key.

    • Last Used: The last date the key was accessed.

    • View Restrictions: The restrictions for this key

    Fig4: Key Details
  • Switch Key: If you have more than one key this icon will be shown. You can click on it to switch between keys.

Step 4: Manage Restrictions and Share

The Vault allows users to control access to their wallet keys by applying restrictions. You can securely share split keys with other users using the Share feature. To manage restrictions:

  • Click the Share button on the Vault page.

Fig5: Share Key
  • In the sharing window, select the specific restrictions to apply. Some default permissions are set which you can change it. The restrictions are:

Fig6: Specify Restrictions

Property

Description

Allow All

Grants unrestricted access to the wallet and its operations.

Token Transfers

Enables or restricts the ability to perform token transfer operations.

Allocation File Operations

Allows or disables file-related actions such as uploading, downloading, and deleting files within an allocation.

Allocation Storage Operations

Permits management of storage-related actions like increasing or extending storage allocations.

Allocation Token Operations

Enables the use of tokens for allocation-related tasks, such as payments for storage or upgrades.

Storage Rewards

Controls access to managing rewards for storage providers or blobbers.

Storage Operations

Enables general operations related to storage, such as viewing or modifying storage configurations.

Storage Management

Allows administrative tasks related to storage, including managing providers, locations, and settings.

Miner Operations

Grants access to operational actions for miners within the network, such as updating configurations.

Miner Management Operations

Allows users to manage miner-specific tasks, including assigning roles, monitoring performance, or managing settings.

Miner Financial Operations

Enables financial activities for miners, such as handling fees, rewards, or other monetary-related tasks.

Token Bridging

Allows or restricts the ability to bridge tokens across different blockchain networks.

Authorizer Management Operations

Enables management tasks for authorizers, such as adding, removing, or updating authorizer roles.

Authorizer Operations

Grants access to general operations involving authorizers, such as handling authentication or verification tasks.

  • Enter the username of the recipient to securely share the key. Confirm the sharing action, ensuring the recipient has the necessary permissions.

Fig7: Search User to Share

Always verify restrictions before sharing a key and Ensure your split key is backed up securely to prevent loss of access.

(Optional) Step 5: Disconnect from Vault

  • If you wish to remove your wallet from the Vault, click the Disconnect from Vault button. Confirm the action to ensure the wallet is no longer stored in the Vault.

Fig8: Disconnect the Key

If you are assigned a key by another user, follow these steps to utilize the key:

  • Find the key that has been assigned to you. Assigned keys will appear in the list of active keys.

  • Review the restrictions and permissions tied to the key from Key Details Section. This determines what actions you can perform using the key.

  • Perform the allowed operations based on the permissions provided.

This comprehensive management system is designed to provide maximum security and customizable control, making it ideal for both personal and enterprise users.

Last updated