Vault
Last updated
Last updated
The Vault feature in Vult allows you to securely store and manage your wallet keys using the Key Management System (KMS) with split key technology. This feature enhances security, transparency, and user control over wallet operations.
Here is a detailed guide to using the Vault and its options:
Go to Settings → Wallet → Vault. On the Vault page, you will see your active split key.
Click on the New Split Key on top right. A Split Key will be generated and displayed. Upon storing, an Active Split Key will be generated and displayed.
Once the Active Split Key is generated, you can perform several actions:
Copy the Key: Locate the active split key on the Vault page. Click the Copy button to copy the key for backup or secure sharing.
View Key Details: Click on the Details icon beside the active split key. Review the metadata for the key, including:
Created On: The date the key was created.
Shared: The sharing status of the key.
Last Used: The last date the key was accessed.
View Restrictions: The restrictions for this key
Switch Key: If you have more than one key this icon will be shown. You can click on it to switch between keys.
The Vault allows users to control access to their wallet keys by applying restrictions. You can securely share split keys with other users using the Share feature. To manage restrictions:
Click the Share button on the Vault page.
In the sharing window, select the specific restrictions to apply. Some default permissions are set which you can change it. The restrictions are:
Enter the username of the recipient to securely share the key. Confirm the sharing action, ensuring the recipient has the necessary permissions.
Always verify restrictions before sharing a key and Ensure your split key is backed up securely to prevent loss of access.
If you wish to remove your wallet from the Vault, click the Disconnect from Vault button. Confirm the action to ensure the wallet is no longer stored in the Vault.
If you are assigned a key by another user, follow these steps to utilize the key:
Find the key that has been assigned to you. Assigned keys will appear in the list of active keys.
Review the restrictions and permissions tied to the key from Key Details Section. This determines what actions you can perform using the key.
Perform the allowed operations based on the permissions provided.
This comprehensive management system is designed to provide maximum security and customizable control, making it ideal for both personal and enterprise users.
Property
Description
Allow All
Grants unrestricted access to the wallet and its operations.
Token Transfers
Enables or restricts the ability to perform token transfer operations.
Allocation File Operations
Allows or disables file-related actions such as uploading, downloading, and deleting files within an allocation.
Allocation Storage Operations
Permits management of storage-related actions like increasing or extending storage allocations.
Allocation Token Operations
Enables the use of tokens for allocation-related tasks, such as payments for storage or upgrades.
Storage Rewards
Controls access to managing rewards for storage providers or blobbers.
Storage Operations
Enables general operations related to storage, such as viewing or modifying storage configurations.
Storage Management
Allows administrative tasks related to storage, including managing providers, locations, and settings.
Miner Operations
Grants access to operational actions for miners within the network, such as updating configurations.
Miner Management Operations
Allows users to manage miner-specific tasks, including assigning roles, monitoring performance, or managing settings.
Miner Financial Operations
Enables financial activities for miners, such as handling fees, rewards, or other monetary-related tasks.
Token Bridging
Allows or restricts the ability to bridge tokens across different blockchain networks.
Authorizer Management Operations
Enables management tasks for authorizers, such as adding, removing, or updating authorizer roles.
Authorizer Operations
Grants access to general operations involving authorizers, such as handling authentication or verification tasks.