@@ -348,9 +348,9 @@ blockchain insert where policy = !assignment and local = true and master = !mas
348
348
```
349
349
350
350
### Step 11 - Provide the local password
351
- The local password protects sensitive info on each node and is provided whenever the node restarts.
351
+ The local password protects sensitive information on each node and is provided whenever the node restarts.
352
352
In this demo, each node's private key is stored locally and protected by the local password.
353
- In the example below, the password 123 is assigned to operator 1 and 456 is assigned to operator 2.
353
+ In the example below, the password 123 is assigned to operator 1, and 456 is assigned to operator 2.
354
354
355
355
On CLI(oper.1):
356
356
<pre >
@@ -363,13 +363,13 @@ set local password = 456
363
363
</pre >
364
364
365
365
Note:
366
- * If a local password exists, an error is returned if the nodes restarts, and the node is provided with incorrect password.
367
- * If the local password is lost, all the relevant files in the *** keys directory*** needs to be deleted, and the
368
- node needs to be assigned with new keys and a new assignment policy.
366
+ * If a local password exists, an error is returned if the node restarts, and the node is provided with an incorrect password.
367
+ * If the local password is lost, all the relevant files in the *** keys directory*** need to be deleted, and the
368
+ node needs to be assigned new keys and a new assignment policy.
369
369
370
370
### Step 12 - Save the node's private key
371
371
The private key can be stored on the node and protected using the local password.
372
- The following examples stores the private key on each node:
372
+ The following examples store the private key on each node:
373
373
374
374
On CLI(oper.1):
375
375
<pre >
@@ -385,7 +385,7 @@ Note: The key is stored in a file called ***auth.id*** in the ***keys directory*
385
385
386
386
### Step 13 - Enable authentication
387
387
Enable, on each node a process to authenticate the senders of messages and determine the relevant authorization.
388
- When a node receives a message, the message is signed by the private key of the sender (the key of tje node or the user sending the message).
388
+ When a node receives a message, the message is signed by the private key of the sender (the key of the node or the user sending the message).
389
389
The receiving node will first use the public key of the sender to authenticate the sender. Next it will consider the permission
390
390
policies to determine that the sender is authorized to the type of message received. Authorization is determined if it
391
391
is granted by the root user, or by a user which is in a chain of permitted authorizations that is derived from the root user.
0 commit comments