Securing the Ledger

Control who can access and operate on your ledger with signers, policies, and circles

Every operation on the ledger must be authenticated and authorized. This section covers how to manage identities, configure access control, and enforce security policies.

Identity

Create and manage the cryptographic identities that interact with the ledger.

Access Control

Configure who can read and write ledger records.

Circles

Group signers into roles for simplified access management.

Domains

Access Policies

Define and manage security policies that govern ledger access.

Tutorials

Prerequisites

  • Start Here — Understand ledger basics and key concepts

On this page