9 Moving to Production
“While adding the finishing touches to a painting might appear insignificant, it is much harder to do than one might suppose.”
― Claude Monet
“The last step of that extra mile will always get you to the end of the rainbow.”
― Unknown
This chapter covers:
- Understanding Identity Management Systems, exploring how existing ones interact with DLTs and applying DLTs to create better identity systems.
- Making updates to DApps and overcoming the challenges associated with it
- Performing smart contract upgrades in different ways
By this point, we have talked about most of the major components in a DLT system: consensus, transactions, UI, privacy. In this chapter, we’ll discuss the “finishing touches” required to make a complete functional system: the components required to make a real deployment feasible. These are identity management and software updates. At the end of this chapter, you will have learned about all the fundamental concepts you need to know to start designing your own DLT applications. Excited? Good! Let’s start by discussing identity management.
9.1 Identity Management
Identity management is one of the key aspects of building secure networks. It includes all the processes and technologies that allow identification, authentication, and authorization of users and/or devices within a network. A robust identity management system is crucial for you to make any assurances about the privacy and transparency provided by your system.