Skip to content

Latest commit

 

History

History

c_security

Permissioning, Identity Management, and Security

  1. Identify network ID / system / peer ID
  2. Permission a transaction processor
  3. Policy management
  4. Validator registration
  5. System permissions
  6. Configure validator local policy file
  7. Validator key permissioning
  8. Role management: transactor roles
  9. Role management: network roles
  10. Configure transactor permissions
  11. Secure connections between components
  12. Use a proxy server to authorize the REST API
  13. Securing connecting between validators
  14. Manage validator keys and secrets