Skip to main content

Security Architecture

The platform is designed with the defense-in-depth principle. Each layer applies independent security controls.

Security Layers

Four main security layers work in sequence:

Authentication Mechanism

User authentication is performed as two-factor (2FA). The first factor is username/password, the second factor is an OTP code sent via SMS or email.

Authorization Matrix

RoleConnectionSchemaCredentialRevokeProof
AdminCRUDCRUDCRUDYesCRUD
IssuerCRRCRYesR
VerifierRR--CR
HolderR-R-R

Wallet Security

FeatureImplementation
EncryptionAES-256-GCM
Key DerivationArgon2id
StorageAries Askar
BiometricDevice-level auth
Critical Security Note

The wallet master key is never sent to the server. All encryption/decryption operations are performed on the device.

Biometric Integration

On mobile devices, fingerprint or face recognition is used as a second factor for wallet access. This feature is provided through iOS (Face ID/Touch ID) and Android (BiometricPrompt) APIs.