This feature is only available in Canton Enterprise
Trusted Enclave Domain (CCF)¶
The domain integration is based on trusted enclaves (Intel SGX) and is using the Confidential Consortium Framework (CCF).
The getting started guide assumes that you have access to a Canton Enterprise release, the Canton Enterprise docker repository, as well as having docker and docker-compose installed.
Run the Demo Deployment¶
The demo deployment consists of two Canton participant node, a Canton Enterprise domain as well as a CCF-based sequencer. One docker container runs the Canton nodes and another docker container is running the CCF network. The Ledger API ports of the two Canton participant nodes are exposed to the host, such that DAML applications can be run from the host and connected to the Ledger API as with any other DAML ledger.
Note that the demo deployment provides reduced security guarantees and should not be used for a production deployment.
To spin up the demo deployment, a
docker-compose.yaml file is packaged with
the release artifacts. After unpacking the release archive and entering the
canton-enterprise release directory, perform the following steps.
First, we need to set the type of hardware security that is used by the CCF
network. If you do not have access to a SGX-capable machine, set
ENCLAVE=virtual to run with an insecure virtual mode. If you do, set
Next, set the Canton version used by the demo deployment with, for example,
CANTON_VERSION=0.19.0 to use Canton v0.19.0.
Now we can start the demo deployment using docker-compose with the following commands:
cd examples/e02-ccf-domain && \ docker-compose -p canton-ccf-demo -f docker-compose.yaml \ -f demo/docker-compose.yaml run --rm --service-ports canton
By default, the Ledger API is available on localhost on the ports 5011 for participant1 and 5021 for participant2.
Once you have completed using the demo deployment, you can shut it down and delete the temporary volumes with the following command:
docker-compose -p canton-ccf-demo -f docker-compose.yaml \ -f demo/docker-compose.yaml down -v
Customization of the Demo Configuration¶
The demo deployment is using a default Canton configuration and bootstrap file
examples/e02-ccf-domain/demo, which one can customize and restart
the demo deployment. Note that if you change the participants’ ledger API ports,
you also need to change the port mappings in
The demo deployment, in particular when run in virtual mode, provides limited security guarantees. Virtual mode means the CCF application is not leveraging trusted enclaves and runs as a regular process, which does not provide the same confidentiality and security guarantees as an enclave. A malicious host can extract any data from the virtual mode CCF application. Furthermore, in virtual mode the application is logging on debug-level and thus may leak sensitive information to the host that way too.
The demo deployment is using a test network setup with all CCF nodes running in a single container, thus does not provide high availability. Furthermore, the test network operates with a single pre-provisioned member certificate, thereby that single member controls the entire CCF governance.