Skip to content

Commit

Permalink
Updated group admin url
Browse files Browse the repository at this point in the history
  • Loading branch information
CharlieMc0 authored Feb 11, 2025
1 parent ad935b2 commit c2e3a4e
Showing 1 changed file with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions src/pages/developers/architecture/privileged.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -19,14 +19,14 @@ policy account has an admin, an address and a decision policy (threshold of
votes, voting period, etc.).

The group mechanism on ZetaChain is powered by the [`group` Cosmos SDK
module](https://docs.cosmos.network/v0.46/modules/group/).
module](https://docs.cosmos.network/v0.50/modules/group/).

ZetaChain can have any number of groups. Anyone can create a group. In this
document we only consider policy accounts that give authorization to perform
privileged actions.

These "special" policy accounts are defined in the [params of of the observer
module](https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/observer/params).
module](https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/authority/policies).
These policy accounts are set during genesis and as any module parameter they
can be changed through governance. This is important, because even though the
protocol has a notion of admins and privileged policy accounts, they are chosen
Expand All @@ -40,11 +40,11 @@ module documentation and look for "Authorized" notice next to each message.

<Alert variant="note">
{" "}
Notice that policy accounts below are called "Group1" and "Group2". These are just names that indicate the level of permissions
and are not related to the actual groups associated with policy accounts. As you can see in testnet there are two entries
("Group1" and "Group2") and both point to the same policy account. This means that right now even though there are two
levels of permissions ("Group1" and "Group2") there is only one policy account that is authorized to perform privileged
actions. On mainnet this might change.{" "}
Notice that policy accounts below are called "groupEmergency", "groupOperational", "groupAdmin". These are just names that indicate the level of
permissions and are not related to the actual groups associated with policy accounts. As you can see in testnet there are three entries
that both point to the same policy account. This means that right now even though there are three
levels of permissions ("groupEmergency", "groupOperational", "groupAdmin") there is only one policy account that is authorized to perform
privileged actions. {" "}
</Alert>

<AdminPolicy />

0 comments on commit c2e3a4e

Please sign in to comment.