Core Concepts
To effectively utilize the DID Spaces SDK, understanding its foundational elements is crucial. This section introduces the core components that power interactions with DID Spaces: the client, the command architecture, and the underlying security mechanisms. Each concept is briefly explained here, with detailed information available in their respective dedicated sections.
Dive deeper into each of these fundamental aspects:
Understanding the Architecture#
The DID Spaces SDK is designed around a clear separation of concerns, providing a robust and secure way to interact with DID Spaces. The SpaceClient
acts as the primary entry point, dispatching various CommandProtocol
implementations, all secured by robust signing and verification mechanisms.
The Client#
The SpaceClient
is the primary interface for interacting with DID Spaces. It is initialized with configuration options that define how it connects and authenticates with the DID Space. All operations are performed by sending specific commands through this client.
For detailed information on initializing and using the client, please refer to the Client section.
Command Protocol#
All operations in the DID Spaces SDK are encapsulated as commands, adhering to the CommandProtocol
. This standardized approach ensures consistency and extensibility. The BaseCommand
class provides common functionalities and a lifecycle for all specific commands, simplifying development and ensuring robust execution.
For an in-depth look at the command architecture and how to extend it, visit the Base Command section.
Security Mechanisms#
Security is paramount in DID Spaces. The SDK employs sophisticated mechanisms, including request signing, delegation, and DID Document verification, to ensure that all interactions are authenticated, authorized, and data integrity is maintained. These processes leverage cryptographic operations and DID standards to provide a secure environment for your data.
To understand the intricacies of the SDK's security features, including how requests are signed and verified, refer to the Security section.
With a grasp of these core concepts, you are ready to explore the specific operations available in the DID Spaces SDK. Proceed to the Commands Reference to discover the full suite of functionalities.