Access controls on Acentrik are on various levels.
As a B2B data marketplace, Acentrik ensures that enterprises are given more precise ways to manage access of their assets and this is how we introduce fine-grained permissions.
The overall permissions in Acentrik are as per below:
- 1st layer: Authentication level - users are validated by both Web2 (username and password) and Web3 (wallet authentication) credentials, with enterprise processes in place.
- 2nd layer: Role-based access level – View-only; Data
Provider, Data Consumer or both. This determines whether a user account has access to publish or consume data, or both.
- 3rd layer: Asset-level permissions – Data Providers can allow / deny access to their asset based on Web3 Authentication, email domains or wallet addresses.
Related Articles: