At a high level, Kaleido is a fully-encompassed SaaS (Software as a Service) platform designed to simplify the process of building out consortia and bootstrapping private blockchain networks. The service provides a “permissioned” implementation of the Ethereum protocol, whereby member participants operate with authenticated identities backed by digital certificate chains. The trust and transparency delivered by the Kaleido platform allows for the finality and speed of transactions to be maximized through the use of efficient consensus algorithms otherwise unavailable in public/anonymous chains. Environments can be configured to run against one of three consensus algorithms – Proof of Authority, Raft or IBFT – and both public and private transactions are supportable by means of the Quorum client and its corresponding constellation module. This protocol and transaction class flexibility is especially powerful for enterprise orchestrations, where oftentimes not all participants are entirely trusted and certain pieces of data must be obscured from the overall network. Users also have the option of blending proven AWS services and bespoke Kaleido offerings into their networks for heightened control and extended functionality. Amongst other topics, the documentation elaborates on Kaleido Services, AWS Integrations and the Kaleido API.
Prior to launching your first network it is recommended to browse through the various content in this Overview section, and install the prerequisites onto any client side machines that will need to programmatically interface with the Ethereum network.
Want a network?
Option 1: The recommended approach for first time users… Visit the Kaleido Dashboard to create an account and then follow the user interface instructions to build your consortium and provision nodes. Step-by-step instructions are also provided in the Create your network section.
Option 2: The alternative happy path is to utilize the Kaleido REST API to administratively build out your network. The comprehensive API 101 tutorial walks you through the process of calling these APIs to create your environment, provision nodes and generate application credentials. If you elect for this approach, you will still need to briefly visit the UI in order to obtain an API key for these privileged calls.