Settings
Purpose
Configure account, security, and platform preferences for your Provider Dashboard.
General Tab
Manage your business profile and notification preferences.
Account Information
Business Name: Your organization name, displayed to owners and in communications. Update anytime and click "Save changes" to apply.
Your Email: Primary contact email used for platform notifications, support communications, and as login identifier.
Profile Photo: Optional business logo. Click "Upload" to add image or "Remove" to delete current image. Displayed in communications.
Security Tab
Manage authentication and account security settings.
Change Password
Password Requirements
- At least 10 characters (up to 100)
- At least one lowercase character
- At least one special character (!, @, #, ?)
- Significantly different from previous passwords
Process:
- Enter current password
- Enter new password
- Confirm new password
- Click "Save changes"
Security indicators show requirements met in real-time.
Two-Factor Authentication
Purpose: Add extra layer of security to your account
Setup Process:
- Click "Configure" next to Google Authenticator
- Scan QR code with authenticator app
- Enter verification code
- Save backup codes securely
- Confirm 2FA enabled
Backup Codes:
- Generate and store offline
- Use if authenticator unavailable
- Regenerate after use
- Keep in secure location
Recommended: Always enable 2FA for provider accounts
Access Tab
Manage API keys for programmatic access to your provider dashboard.
API Key Best Practices
Security Guidelines: Store keys securely immediately after generation, note that private key is shown only once, never share or expose publicly, rotate keys quarterly, and delete unused keys.
If Key Lost: Key cannot be retrieved, must create new key, update all integrations, and delete old key.
API Key Management
Create New API Key:
- Click "New API key"
- Enter descriptive name
- Copy public and private keys immediately
- Store in secure password manager
- Never commit to version control
Information Displayed:
- Name: Descriptive identifier
- Access Key: Public identifier
- Created: Date generated
- Last Used: Most recent activity
Actions available: Delete to remove key (trash icon), View Details for usage history, and Rotate to create new and delete old.
Access Key Usage
Common Use Cases: Automated monitoring scripts, custom dashboards, integration with business intelligence tools, programmatic data exports, and third-party integrations.
Security Considerations: Use environment variables, never hardcode in applications, implement key rotation schedule, and revoke immediately if compromised.
Statements Tab
Download monthly financial statements for accounting and compliance.
Statement Management
Statement Period Selector:
- Dropdown list of available months
- Most recent months listed first
- Typically available within 5 days of month end
Download Statements:
- Select month from dropdown
- Click "Download" button
- PDF statement generated
- Save to secure location
Statement Contents
Summary Information: Business name and account details, statement period, total earnings, total payouts, net revenue, and transaction count.
Detailed Transactions: All earnings by GPU, all payouts to owners, fees and adjustments, and opening and closing balances.
Use Cases: Monthly accounting reconciliation, tax preparation, investor reporting, audit trail maintenance, and historical reference.
Best Practices
Retention: Download immediately when available, store minimum 7 years (tax requirements), maintain backup copies, and organize by month/year.
Verification: Compare to internal records, reconcile with blockchain data, verify against dashboard exports, and document any discrepancies.
Access: Store in secure, encrypted location, limit access to authorized personnel, and include in disaster recovery plan.
Account Management
Profile Settings
Keep your information current by updating business name as needed, maintaining accurate email address, adding/updating profile photo, and reviewing quarterly.
Security Hygiene
Monthly Checklist:
- Check 2FA functionality
- Review API key usage
Quarterly Tasks:
- Rotate API keys
- Update password
- Audit user access
- Test backup authentication
Annual Review:
- Comprehensive security audit
- Update all credentials
- Review access permissions
- Document security procedures
Troubleshooting
Can't Change Password
Check: Current password entered correctly, new password meets all requirements, no spaces in password fields, and caps lock not enabled.
Action: Use password manager, reset via email if needed.
2FA Not Working
Check: Authenticator app time synchronized, using correct app (Google Authenticator, Authy), code not expired (30-second window), and app connected to internet.
Action: Use backup codes, resynchronize time, or contact support.
API Key Not Working
Check: Key copied correctly (no extra spaces), public and private keys both provided, key not deleted, and rate limits not exceeded.
Action: Regenerate key, check API documentation, and verify implementation.
Statement Not Available
Reasons: Month not yet closed, still processing (wait 5 days), or technical issue.
Action: Wait until 5th of following month, contact support if delayed.
Integration with Other Pages
Security Impact
Changes in Settings affect Dashboard access (password, 2FA), Payment processing, and API operations (access keys control programmatic access).
Financial Connection
Settings support financial operations through Statements (link to Financials data) and API access (enable custom reporting).
Best Practices
Security First
Enable all security features (2FA, monitoring), conduct regular audits with weekly log reviews, rotate credentials quarterly (password/API key changes), follow principle of least privilege (minimum necessary access), and maintain incident response plans for security events.
Operational Excellence
Keep profile information current, download statements regularly (monthly retrieval), maintain security procedures documentation, and test backup authentication methods regularly.
Compliance
Maintain record retention for 7+ years for statements, document access control for who has access, create policy documentation with written security procedures, and conduct regular quarterly compliance checks.
Related Resources
Best Practices - Comprehensive security guidance | Troubleshooting - Resolve common issues | Silicon Network Security Policy - External documentation | Base Network Security - Network-level security info