Authorization Guide

Everything you need to know about requesting, managing, and using authorizations.

What is an Authorization?

An authorization is a cryptographic credential that grants you permission to spend up to a specified amount within defined constraints. Think of it as a pre-approved spending limit that draws from shared liquidity rather than your personal balance.

Authorization Lifecycle

1

Request

User submits authorization request with desired parameters

2

Stake Verification

Protocol checks $SHADE stake for access tier eligibility

3

Issuance

Authorization credential is generated and delivered to user

4

Active

User can spend against the authorization until depleted or expired

5

Expired/Depleted

Authorization becomes inactive and unusable

Access Tiers

Your $SHADE stake determines your access tier, which affects maximum authorization limits:

TierStake RequiredMax Single AuthMax Duration
Basic0 $SHADE100 USDC24 hours
Standard1,000 $SHADE1,000 USDC7 days
Premium10,000 $SHADE10,000 USDC30 days
Enterprise100,000 $SHADEUnlimited90 days

Authorization Parameters

Spending Cap

The maximum amount you can spend with this authorization. Once depleted, the authorization becomes inactive. You can request a new one at any time.

Duration

How long the authorization remains valid. Options include 1 hour, 24 hours, 7 days, and 30 days depending on your tier. Expired authorizations cannot be used.

Purpose

Optional category that restricts where the authorization can be used. Categories include General Spending, Subscriptions, One-time Purchase, and Transfer.

Best Practices

  • Request only what you need - smaller authorizations are processed faster
  • Use purpose restrictions for better security and tracking
  • Monitor your active authorizations and revoke unused ones
  • Stake $SHADE to access higher tiers and better limits

Learn About Staking

Discover how $SHADE tokens power the protocol and unlock higher access tiers.

$SHADE Token