githubEdit

Manage keys

Overview

cheqd Cosmos CLI can be used manage keys on a node.Keys are closely related to accounts and on-ledger authentication.

Account addresses are on a cheqd node are an encoded version of a public key. Each account is linked with at least one public-private key pair. Multi-sig accounts can have more than one key pair associated with them.

To submit a transaction on behalf of an account, it must be signed with an account's private key.

Cosmos supports multiple keyring backendsarrow-up-right for the storage and management of keys. Each node operator is free to use the key management method they prefer.

By default, the cheqd-noded binary is configured to use the os keyring backend, as it is a safe default compared to file-based key management methods.

For test networks or local networks, this can be overridden to the test keyring backend which is less secure and uses a file-based key storage mechanism where the keys are stored un-encrypted. To use the test keyring backend, append --keyring-backend test to each command that is related to key management or usage.

Types of keys on a cheqd node

Each cheqd validator node has at least two keys.

Node key

  • Default location is $HOME/config/node_key.json

  • Used for peer-to-peer communication

Validator key

  • Default location is $HOME/config/priv_validator_key.json

  • Used to sign consensus messages

Creating a key

When a new key is created, an account address and a mnemonic backup phrase will be printed. Keep mnemonic safe. This is the only way to restore access to the account if they keyring cannot be recovered.

Command

Restoring a key from backup mnemonic phrase

Allows restoring a key from a previously-created BIP39 mnemonic phrase.

Command

Listing available keys on a node

Command

Using a key for transaction signing

Most transactions will require you to use --from <key-alias> param which is a name or address of private key with which to sign a transaction.

Command

Last updated

Was this helpful?