Settings

Settings

Purpose

Configure account, security, and platform preferences for your Provider Dashboard.

General Tab

Manage your business profile and notification preferences.

Account Information

Business Name: Your organization name, displayed to owners and in communications. Update anytime and click "Save changes" to apply.

Your Email: Primary contact email used for platform notifications, support communications, and as login identifier.

Profile Photo: Optional business logo. Click "Upload" to add image or "Remove" to delete current image. Displayed in communications.

Security Tab

Manage authentication and account security settings.

Change Password

Password Requirements

  • At least 10 characters (up to 100)
  • At least one lowercase character
  • At least one special character (!, @, #, ?)
  • Significantly different from previous passwords

Process:

  1. Enter current password
  2. Enter new password
  3. Confirm new password
  4. Click "Save changes"

Security indicators show requirements met in real-time.

Two-Factor Authentication

Purpose: Add extra layer of security to your account

Setup Process:

  1. Click "Configure" next to Google Authenticator
  2. Scan QR code with authenticator app
  3. Enter verification code
  4. Save backup codes securely
  5. Confirm 2FA enabled

Backup Codes:

  • Generate and store offline
  • Use if authenticator unavailable
  • Regenerate after use
  • Keep in secure location

Recommended: Always enable 2FA for provider accounts

Access Tab

Manage API keys for programmatic access to your provider dashboard.

API Key Best Practices

Security Guidelines: Store keys securely immediately after generation, note that private key is shown only once, never share or expose publicly, rotate keys quarterly, and delete unused keys.

If Key Lost: Key cannot be retrieved, must create new key, update all integrations, and delete old key.

API Key Management

Create New API Key:

  1. Click "New API key"
  2. Enter descriptive name
  3. Copy public and private keys immediately
  4. Store in secure password manager
  5. Never commit to version control

Information Displayed:

  • Name: Descriptive identifier
  • Access Key: Public identifier
  • Created: Date generated
  • Last Used: Most recent activity

Actions available: Delete to remove key (trash icon), View Details for usage history, and Rotate to create new and delete old.

Access Key Usage

Common Use Cases: Automated monitoring scripts, custom dashboards, integration with business intelligence tools, programmatic data exports, and third-party integrations.

Security Considerations: Use environment variables, never hardcode in applications, implement key rotation schedule, and revoke immediately if compromised.

Statements Tab

Download monthly financial statements for accounting and compliance.

Statement Management

Statement Period Selector:

  • Dropdown list of available months
  • Most recent months listed first
  • Typically available within 5 days of month end

Download Statements:

  1. Select month from dropdown
  2. Click "Download" button
  3. PDF statement generated
  4. Save to secure location

Statement Contents

Summary Information: Business name and account details, statement period, total earnings, total payouts, net revenue, and transaction count.

Detailed Transactions: All earnings by GPU, all payouts to owners, fees and adjustments, and opening and closing balances.

Use Cases: Monthly accounting reconciliation, tax preparation, investor reporting, audit trail maintenance, and historical reference.

Best Practices

Retention: Download immediately when available, store minimum 7 years (tax requirements), maintain backup copies, and organize by month/year.

Verification: Compare to internal records, reconcile with blockchain data, verify against dashboard exports, and document any discrepancies.

Access: Store in secure, encrypted location, limit access to authorized personnel, and include in disaster recovery plan.

Account Management

Profile Settings

Keep your information current by updating business name as needed, maintaining accurate email address, adding/updating profile photo, and reviewing quarterly.

Security Hygiene

Monthly Checklist:

  • Check 2FA functionality
  • Review API key usage

Quarterly Tasks:

  • Rotate API keys
  • Update password
  • Audit user access
  • Test backup authentication

Annual Review:

  • Comprehensive security audit
  • Update all credentials
  • Review access permissions
  • Document security procedures

Troubleshooting

Can't Change Password

Check: Current password entered correctly, new password meets all requirements, no spaces in password fields, and caps lock not enabled.

Action: Use password manager, reset via email if needed.

2FA Not Working

Check: Authenticator app time synchronized, using correct app (Google Authenticator, Authy), code not expired (30-second window), and app connected to internet.

Action: Use backup codes, resynchronize time, or contact support.

API Key Not Working

Check: Key copied correctly (no extra spaces), public and private keys both provided, key not deleted, and rate limits not exceeded.

Action: Regenerate key, check API documentation, and verify implementation.

Statement Not Available

Reasons: Month not yet closed, still processing (wait 5 days), or technical issue.

Action: Wait until 5th of following month, contact support if delayed.

Integration with Other Pages

Security Impact

Changes in Settings affect Dashboard access (password, 2FA), Payment processing, and API operations (access keys control programmatic access).

Financial Connection

Settings support financial operations through Statements (link to Financials data) and API access (enable custom reporting).

Best Practices

Security First

Enable all security features (2FA, monitoring), conduct regular audits with weekly log reviews, rotate credentials quarterly (password/API key changes), follow principle of least privilege (minimum necessary access), and maintain incident response plans for security events.

Operational Excellence

Keep profile information current, download statements regularly (monthly retrieval), maintain security procedures documentation, and test backup authentication methods regularly.

Compliance

Maintain record retention for 7+ years for statements, document access control for who has access, create policy documentation with written security procedures, and conduct regular quarterly compliance checks.

Related Resources

Best Practices - Comprehensive security guidance | Troubleshooting - Resolve common issues | Silicon Network Security Policy - External documentation | Base Network Security - Network-level security info