Introduction What is a Daml party? It’s a great question to which there is a precise technical answer, of course, but that answer would help us as little in designing a multi-party application as a precise technical understanding of database users would help us in designing a web application. In our examples, we often use
Subscribe
Get the latest posts in your email
Author : Robert Autenrieth
DAML ledgers that are connected to the public internet need to be protected against unauthorized access. This is done using the same mechanism that is used to authorize the access to the backend of a regular web application: The ledger operator provides a token issuer service where users can authenticate themselves and acquire access …
Subscribe
Get the latest posts in your email