All communications are consistently protected by modern and robust encryption for all of Ditto’s communication methods.
Capability | Type |
---|---|
Encryption | TLS 1.3 |
Authentication | EC key-pairs with signed certificates |
Trust infrastructure | X.509 with a developer-controlled certificate authority |
Access Rules | Query patterns on Document _id’s describing read and or write access |
Production | Development | ||
---|---|---|---|
Site ID | Allocated by central authority | Defaults to a random number; can be customized | |
App ID | Set by central authority | For example, “5322afcd-5a70-43a3-bc2d-85d98ccf5ac0” | |
Access Rules | Set by central authority | All devices may read/write all documents | |
Private Key | Either generated on device or distributed by central authority | Hard-coded and shared by all devices | |
Identity Certificate | Unique and signed by a central authority; contains this device’s public key | Hard-coded and shared by all devices | |
CA Certificate | Shared by all users of the same app | Hard-coded and shared by all devices |
Manual
identity.
When you are ready to use production identities, feel free to contact us through the Ditto Portal and we will help you set up the right CA tooling for your use case - or provide specifications so you can build your own.
OnlineWithAuthentication
and OnlinePlayground
identities.Complete a Peer Key Challenge
/_ditto/auth/cert
- this is a time-limited JWT which the client treats as opaque data.Log in with Credentials