User Guide

How Anchora Works

Anchora is a permissioned attestation infrastructure for real-world assets (RWA). It coordinates professional appraisers, legal/title verifiers, insurers, inspectors, custodians, and auditors to sign lifecycle events for physical assets on Solana — creating a verifiable on-chain history that DeFi protocols can read in one API call.

🏛️
Operator

Manages the network — verifies attestors, registers assets, assigns work

🔍
Attestor

Professional specialist who signs lifecycle events with documents

🏠
Asset Owner

Requests attestations for their physical assets, downloads certificates

🏢
Property Manager

Maintains operating context, servicing data, and document handoff without signing attestations

🧭
Scout

Finds asset opportunities, refers owners, and tracks evidence gaps for follow-up

📜
Government Regulator

Reads jurisdiction-scoped assets, attestors, evidence gaps, and risk flags without writing attestations

How it works — the lifecycle

Every physical asset goes through a series of attestation events. Each event is recorded on the Solana blockchain with a document hash and a professional signature.

1
Asset is registered

The operator creates an asset record (or the owner submits a request). The asset gets a unique ID and enters the Anchora registry.

2
Attestation request created

The operator or asset owner opens an attestation request for a specific event type — valuation, legal/title verification, inspection, custody, insurance, audit, or issuance.

3
Attestor is assigned

The operator assigns a verified attestor whose role matches the event type. The attestor receives an email notification.

4
Attestor submits

The attestor signs in, uploads the supporting document (PDF, photo, report), sets a confidence tier, connects the linked wallet, and approves the transaction.

5
Signed on Solana

The document is hashed (SHA-256), stored in the configured document storage, and the hash + metadata are written to a PDA on Solana Devnet with the attestor wallet as the signer.

6
Owner sees the result

The asset detail page shows the confirmed on-chain event with a Solana Explorer link. The reliability score updates automatically.

7
Certificate available

The owner can download an attestation certificate — a PDF listing all confirmed on-chain events with transaction signatures.

Operator

The operator is the administrator of the Anchora instance. There is one operator per deployment. The operator verifies attestors before they can sign events, manages asset records, and oversees the attestation workflow.

Capabilities

View all attestation requests
Full pipeline view — pending, in progress, submitted, confirmed
Assign attestors to requests
Match the right specialist to each event type
Verify and manage attestors
Review attestor applications, activate or revoke access
View all assets
See every registered asset and its attestation history
Manage API keys
Issue and revoke API keys for DeFi protocol integrations
Create new attestation requests
Open requests on behalf of asset owners

Access

The operator dashboard is at /operator/dashboard. Access now requires operator login.

Attestors

Attestors are verified professionals who sign lifecycle events for physical assets. Each attestor has a specific role that determines which event types they can attest. They receive tasks by email and submit attestations through a role-specific dashboard, then approve the on-chain write with the Solana wallet linked to their profile.

📊Appraiser

Determines market value of the asset. Required for collateral and tokenization.

ValuationIssuance
🔍Inspector

Verifies physical condition. Required for real estate, equipment, and commodities.

Inspection
⚖️Legal / Title Verifier

Confirms owner authority, title status, and whether the asset is pledged or otherwise encumbered.

Legal Verification
🔒Custodian

Confirms asset is held and secured. Required for custody transfer events.

Custody
🛡️Insurer

Confirms active coverage, exclusions, and underwriting risk.

Insurance
📋Auditor

Performs compliance checks and final audits before redemption.

AuditRedemption

Attestor capabilities

View assigned tasks
See all requests assigned by the operator
Claim available tasks
Pick up unassigned requests that match your role
Upload supporting document
PDF, image, or report — stored in the configured document storage
Set confidence tier
low / medium / high / certified — affects reliability score
Submit attestation
Document is hashed and the final on-chain write is signed from your linked wallet
View attestation history
All completed events with on-chain links

Confidence tiers

Each attestation includes a confidence tier set by the attestor. This directly affects the asset reliability score.

Certified
Professionally certified with full documentation
100% weight
High
Comprehensive audit with supporting evidence
75% weight
Medium
Standard verification, typical documentation
50% weight
Low
Basic documentation, visual inspection only
25% weight

Asset Owner

Asset owners register their physical assets and request professional attestations. Once attestations are confirmed on-chain, owners can download verifiable certificates and share on-chain proof with DeFi protocols, lenders, or counterparties.

Capabilities

Register assets
Real estate, art, commodities, vehicles, and other physical assets
Add asset details
Type, location, area, year built, estimated value, legal entity, ownership type, cadastral number
Request attestations
Submit a request for any lifecycle event — operator assigns the right specialist
Track request status
Pending → In Progress → Submitted → Confirmed
View on-chain events
Timeline of confirmed attestations with Solana Explorer links
Reliability score
Computed score 0–100 based on event coverage, confidence tiers, and data freshness
Download certificate
PDF listing all confirmed on-chain events — sharable with lenders and protocols
Tokenization parameters
Set token name, symbol, supply, and price per token for future minting

Reliability Score

Every asset gets a 0–100 reliability score backed by the on-chain Asset snapshot and refreshed as confirmed attestations arrive.

Coveragemax 40 pts

Which event types are confirmed: issuance, valuation, inspection, custody, audit, insurance, and legal verification evidence

Qualitymax 40 pts

Strongest per-type evidence quality, with support from additional confirmed event types

Recencymax 20 pts

Freshness of the latest scored core evidence by type: valuation, inspection, and custody each age on separate windows

Property Manager

Property managers support the operational side of an asset: occupancy, servicing, maintenance context, tenant or facility notes, and document coordination. They are not attestors and do not submit certified on-chain attestations.

Capabilities

Maintain operating context
Keep servicing, occupancy, and portfolio notes close to the asset record
Coordinate evidence handoff
Prepare operational documents for owners, operators, and assigned attestors
Manage portfolio context
Track managed assets and servicing inputs without changing attestation truth
Use a dedicated workspace
Work from the property manager cabinet instead of the attestor queue

Access

The property manager workspace is at /property-manager/dashboard. This role is operational and identity-only.

Scout

Scouts are discovery-side participants. They surface promising assets, refer owners, and help investors or operators notice evidence gaps before a full attestation workflow starts.

Capabilities

Discover asset opportunities
Review the indexed asset feed and identify candidates worth follow-up
Refer owners
Send owners toward the onboarding and asset registration flow
Track evidence gaps
Spot missing valuation, legal verification, inspection, custody, audit, or insurance evidence
Support matching
Connect promising verified assets with investor or operator attention

Access

The scout workspace is at /scout/dashboard. Scout profiles use a dedicated authenticated hunt feed and profile.

Government Regulator

Government regulators are read-only oversight participants. They do not create assets, assign work, or sign attestations. Their cabinet shows assets, attestors, lifecycle status, risk flags, and source gaps only inside their authorized jurisdiction.

Capabilities

Jurisdiction-scoped visibility
Kazakhstan regulators see Kazakhstan assets and attestors; regulators from other countries see only their own country or agency scope
Read-only oversight
Review asset status, attestation coverage, evidence freshness, legal/title gaps, insurance gaps, and risk indicators without changing platform state
Attestor and registry monitoring
Inspect verified professionals, license/reference gaps, inactive profiles, and mismatches against official data sources
API and export readiness
Use read API/docs today; future registry adapters and regulator exports can attach official source data to the same trust model

Access

The government regulator workspace is at /government/dashboard. Access is authenticated, read-only, and limited by jurisdiction.

On-chain recording & Certificates

Anchora uses a custom Anchor program on Solana Devnet. Every attestation event creates a Program Derived Account (PDA) that permanently stores the event metadata and document hash.

What is stored on-chain

// Asset identity + InspectionEvent PDA
asset_pda_address: "9knTbbayAKkB2iMmiLWTTq8dDcptHfqR42Wr8Rb2VmUd"
asset_name: "KZ-ALMATY-2024-001" // unique
attestor: pubkey
event_type: Valuation
document_hash: [u8; 32] // SHA-256
confidence: High
metadata_uri: "r2.anchora.markets/..."
timestamp: i64
slot: u64

The document itself is never stored on-chain — only the SHA-256 hash. The file is stored in the configured document storage. Anyone can independently verify that the document matches the on-chain hash.

Certificates

After the first on-chain confirmation, the asset owner can download an attestation certificate. It lists all confirmed events with attestor names, roles, event types, confidence tiers, transaction signatures, and Solana Explorer links.

The certificate is a printable PDF generated directly from on-chain data — it cannot be forged because each entry links to a verifiable Solana transaction.

Program details

Program IDCNMJZ327d1RXb236W7AR557SoG7D9HFyRR5iT7he1kPs
NetworkSolana Devnet
FrameworkAnchor 0.32.1

Authentication

Anchora supports email/password, Google/GitHub OAuth, and wallet verification. Attestors use their normal account to access tasks and connect the linked Solana wallet only when anchoring an attestation on-chain.

This keeps day-to-day access straightforward while ensuring the cryptographic signer matches the real attestor at submission time.

Getting started: go to /login, enter your work email. If you are a new user, you will be prompted to choose a role after sign-in.
Anchora DocumentationAPI Reference →