Skip to main content

User Access Management

For concept material on User Access Management (UAM) and roles, refer to:

User Access Management (UAM) enables Operators to set appointees for actions enabling a range of key management solutions to be implemented. For example, from simple (ECDSA key rotation) to complex (upstream smart contract permissioning schemes).

The protocol functions that an Operator can set appointees for are:

For information on how to set admins and appointees for an AVS, refer to: