Roles in Daml - Introducing Multi-party submissions

Introduction What is a Daml party? It’s a great question to which there is a precise technical answer, of course, but that answer would help us as little in designing a multi-party application as a precise technical understanding of database users would help us in designing a web application. In our examples, we often use party names like “Alice” and “Bob”, or organisations like “Bank”,...
Read More

Roles in Daml - Introducing Multi-party submissions

Introduction What is a Daml party? It’s a great question to which there is a precise technical answer, of course, but that answer would help us as little in designing a multi-party application as a precise technical understanding of database users would help us in designing a web application. In our examples, we often use party names like “Alice” and “Bob”, or organisations like “Bank”,...
Read More

Easy authentication for your distributed app with Daml and Auth0

This post may contain outdated information. Please visit Secure Daml Infrastructure for more up-to-date content. Daml ledgers that are connected to the public internet need to be protected against unauthorized access. This is done using the same mechanism that is used to authorize the access to the backend of a regular web application: The ledger operator provides a token issuer...
Read More

Easy authentication for your distributed app with Daml and Auth0

This post may contain outdated information. Please visit Secure Daml Infrastructure for more up-to-date content. Daml ledgers that are connected to the public internet need to be protected against unauthorized access. This is done using the same mechanism that is used to authorize the access to the backend of a regular web application: The ledger operator provides a token issuer...
Read More