Documentation Hub
Expert guidance for institutional-grade digital asset custody. Explore technical specifications, policy frameworks, and cryptographic security protocols.
Technical Specifications
Understand our implementation of ZK-proofs, TEE (Trusted Execution Environments), and the underlying architecture of Aegis Treasury.
Getting Started
Configure your organization's first vault in less than 5 minutes. Step-by-step onboarding for administrators.
- Account Initialization
- Key Management Basics
- Inviting Team Members
Policy Configuration
Define complex governance structures, spending limits, and whitelisting requirements.
Troubleshooting
Resolve common transaction errors, network sync issues, and policy conflicts.
Popular Resources
Understanding ZK-Proofs in Aegis
Technical Spec • 12 min read
Hardware Security Modules (HSM) Integration
Infrastructure • 8 min read
Multi-Signature Governance Frameworks
Policy • 15 min read
Handling 'Policy Rejected' Transaction Errors
Troubleshooting • 5 min read
Need direct assistance?
Our priority support team is available 24/7 for Enterprise Tier organizations.
Network Health
Zero-Knowledge Governance and TEE Enforcement
Aegis utilizes cutting-edge privacy-preserving computations to ensure policy validation happens in secret, verifiable environments before hitting the blockchain.
Recursive SNARKs
Aggregating complex policy approvals into a single succinct proof to minimize gas costs and maximize throughput without sacrificing security.
VIEW MODULES chevron_rightTEE Hardening
Ensuring transaction signing keys are never exposed in plaintext, even to Aegis administrators, through Intel SGX and Nitro Enclaves.
VIEW ARCHITECTURE chevron_rightThreshold ECDSA
Removing the single point of failure by distributing private key fragments across multiple non-colluding nodes in our secure network.
VIEW PROTOCOL chevron_right