Manage keys
Overview
cheqd Cosmos CLI can be used manage keys on a node.Keys are closely related to accounts and on-ledger authentication.
Account addresses are on a cheqd node are an encoded version of a public key. Each account is linked with at least one public-private key pair. Multi-sig accounts can have more than one key pair associated with them.
To submit a transaction on behalf of an account, it must be signed with an account's private key.
Cosmos supports multiple keyring backends for the storage and management of keys. Each node operator is free to use the key management method they prefer.
By default, the cheqd-noded
binary is configured to use the os
keyring backend, as it is a safe default compared to file-based key management methods.
For test networks or local networks, this can be overridden to the test
keyring backend which is less secure and uses a file-based key storage mechanism where the keys are stored un-encrypted. To use the test
keyring backend, append --keyring-backend test
to each command that is related to key management or usage.
Types of keys on a cheqd node
Each cheqd validator node has at least two keys.
Node key
Default location is
$HOME/config/node_key.json
Used for peer-to-peer communication
Validator key
Default location is
$HOME/config/priv_validator_key.json
Used to sign consensus messages
Node-related commands in cheqd CLI
Creating a key
When a new key is created, an account address and a mnemonic backup phrase will be printed. Keep mnemonic safe. This is the only way to restore access to the account if they keyring cannot be recovered.
Command
Restoring a key from backup mnemonic phrase
Allows restoring a key from a previously-created BIP39 mnemonic phrase.
Command
Listing available keys on a node
Command
Using a key for transaction signing
Most transactions will require you to use --from <key-alias>
param which is a name or address of private key with which to sign a transaction.
Command
Last updated