OriginTrail
  • Get started with OriginTrail
  • OriginTrail Ecosystem — Call for Papers (Coming Soon)
  • Key Concepts
    • Decentralized Knowledge Graph (DKG)
    • DKG key concepts
  • TRAC: DKG utility token
  • Build with DKG
    • Quickstart (test drive the DKG in 5 mins)
      • Quickstart with Node.js
      • Quickstart with Python
    • Querying the DKG
    • DKG Edge Node
      • DKG Edge Node architecture
      • Get started with the Edge Node boilerplate
        • Automated setup with the installer
        • Manual setup
        • Usage example
      • Customize & build with the Edge Node
      • Knowledge Mining and dRAG examples
      • Deploy your Edge Node based project
        • Automated deployment with installer
      • DKG Edge Node inception program
      • DKG Edge Node API documentation
    • DKG Core Node
      • Run a V8 Core Node on testnet
        • Preparation for V8 DKG Core Node deployment
        • V8 DKG Core Node installation
      • Run a V8 Core Node on mainnet
        • Preparation for V8 DKG Core Node deployment
        • V8 DKG Core Node installation
      • How to open up your node for publishing
    • DKG toolkit
      • DKG SDK
        • Development environment setup
        • DKG Javascript SDK (dkg.js)
          • Interact with DKG paranets
          • Permissioned Paranets
          • Knowledge submission & curation
          • Paranet's incentives pool implementation
        • DKG Python SDK (dkg.py)
      • DKG paranets
        • Deploying a DKG paranet
        • Building with DKG paranets
        • Syncing a DKG Paranet
        • Initial Paranet Offerings (IPOs)
          • IPO specification
          • Launching your IPO
          • Paranet's incentives pool
          • IPO voting
      • AI agents
        • ElizaOS DKG agent
        • Custom DKG Python agent
        • Custom DKG JavaScript agent
      • Using the DKG with MCP
    • Ecosystem call for papers
  • DKG under the hood
    • Introduction
    • Delegated staking
      • Step-by-step staking
      • Redelegating stake
  • Random Sampling DKG Proof System
    • Random sampling rollout
    • Random Sampling FAQ
  • DKG Sync
  • Integrated Blockchains
    • Base blockchain
      • Connect to Base
    • Gnosis chain
      • Connect to Gnosis
    • NeuroWeb
    • Teleport instructions - NeuroWeb
    • Bridging to Moonbeam
    • Deployed smart contracts
  • Bounties & rewards
    • General bug bounty
    • Code contributions & V8 bug bounty
  • Whitepapers & RFCs
    • OriginTrail whitepaper
    • OriginTrail RFCs
  • Useful Resources
    • What's new with OriginTrail V8
    • DKG V8 guidebook
      • Protocol updates
      • Feature roadmap
      • How to upgrade to V8?
    • Public nodes
    • Tutorials
    • Test token faucet
    • Development principles
    • Community created resources
    • Linked data & knowledge graphs
    • Available networks, network details and RPCs
    • OT Node Engine implementation details
      • Modules
      • Command Executor
    • Contribution guidelines
      • Guidelines for automated test contributions
    • Explore the OriginTrail ecosystem
Powered by GitBook
On this page
  • Paranet Node Access Permissioned Policy
  • Paranet Miner Access Permissioned Policy
  • Combining policies
  • Access policis and Knowledge Currations

Was this helpful?

Edit on GitHub
  1. Build with DKG
  2. DKG toolkit
  3. DKG SDK
  4. DKG Javascript SDK (dkg.js)

Permissioned Paranets

PreviousInteract with DKG paranetsNextKnowledge submission & curation

Last updated 1 month ago

Was this helpful?

Paranet Permission Policies define which Nodes and Knowledge Miners can participate in a Paranet. These policies are set by the Paranet Operator at the time of creation.

A Paranet Operator is the account that owns the Knowledge Asset from which the Paranet was created.

There are two permission policies:

• PARANET_NODES_ACCESS_POLICY – governs which nodes can sync Knowledge Collections.

• PARANET_MINERS_ACCESS_POLICY – governs which knowledge miners (wallet addresses) can submit Knowledge Collection

Here is demo code for a .

Paranet Node Access Permissioned Policy

This policy controls which nodes are allowed to sync the Paranet’s Knowledge Collections and whether they can sync the private part of the collection.

  • OPEN — any node can sync the Paranet and only the public part of Knowledge Collections is included

  • PERMISSIONED — only approved nodes sync the Paranet and both public and private part of Knowledge Collection are included. Enabled private knowledge sharing!

Interacting with Node Acess Permisioned Paranet

Paranet Operator can add Nodes to Permissioned Paranet

await DkgClient.paranet.addPermissionedNodes(paranetUAL, identityIds)

Paranet Operator can remove Nodes from Permissioned Paranet

await DkgClient.paranet.removePermissionedNodes(paranetUAL, identityIds);

Anybody can check which nodes are part of Paranet:

await DkgClient.paranet.getPermissionedNodes(paranetUAL);

Paranet Miner Access Permissioned Policy

This policy defines who can submit Knowledge Collections to a Paranet.

  • OPEN — any knowledge miner (address) can submit Knowledge Collection

  • PERMISSIONED — only allowed knowledge miner (address) can submit Knowledge Collection. Allows fine-grained control over who contributes data!

Knowledge collection(KC) is a collection of knowledge assets. It refers to structured data that can be stored, shared, and validated within a distributed network.

Interacting with Miner Access Permissioned Paranet

Paranet Operator can add Miners to Permissioned Paranet

await DkgClient.paranet.addParanetPermissionedMiners(paranetUAL, minerAddresses);

Paranet Operator can removes Miners from Permissioned Paranet

await DkgClient.paranet.removeParanetPermissionedMiners(paranetUAL, minerAddresses);

Combining policies

These two policies can be combined in any way:

Node Access Policy
Miner Acces Policy
Result

OPEN

OPEN

Any node can sync public part of KC from Paranet and any miner can add knowledge to Paranet

OPEN

PERMISSIONED

Any node can sync public part of KC from Paranet and only selected miners can add knowledge to Paranet

PERMISSIONED

OPEN

Only selected nodes can sync both private and public part of KC from paranet and any miner can add knowledge to Paranet

PERMISSIONED

PERMISSIONED

Only selected nodes can sync both private and public part of KC from parane and only selected miners can add knowledge to Paranet

Access policis and Knowledge Currations

These permisions will also interact with Staging Paranets. If a Paranet has PARANET_KC_SUBMISSION_POLICY STAGING and PERMISSIONED PARANET_MINERS_ACCESS_POLICY only allowed knowledge miners can stage knowledge collections.

Permissioned Paranet