Note: you can find a more thorough and user-friendly documentation of this project at Stellar Docs.
Note
If you are using version 1.x.x, we highly recommend upgrading to version 2.x.x to benefit from the latest features, routine fixes, and security patches. For detailed instructions on how to upgrade, please refer to the upgrade guide.
The Stellar Disbursement Platform (SDP) enables organizations to disburse bulk payments to recipients using Stellar.
Throughout this documentation, we'll define "users" as members of the organization using the SDP to make payments, while defining "recipients" as those receiving payments.
Install golang and make sure $GOPATH/bin is in your $PATH. Then run the following.
git clone [email protected]:stellar/stellar-disbursement-platform-backend.git
cd stellar-disbursement-platform-backend
make go-install
stellar-disbursement-platform --helpTo quickly test the SDP using preconfigured values, use the startup wizard.
make setupFor more information about launching and configuring the SDP, see the Quick Start Guide.
To deploy the SDP using Helm, see the Helm Chart.
This manual outlines the security measures implemented in the Stellar Disbursement Platform (SDP) to protect the integrity of the platform and its users. By adhering to these guidelines, you can ensure that your use of the SDP is as secure as possible.
Security is a critical aspect of the SDP. The measures outlined in this document are designed to mitigate risks and enhance the security of the platform. Users are strongly encouraged to follow these guidelines to protect their accounts and operations.
Google's reCAPTCHA has been integrated into the SDP to prevent automated attacks and ensure that interactions are performed by humans, not bots.
ReCAPTCHA can be configured at two levels:
- Environment level (default): Set the
DISABLE_RECAPTCHAenvironment variable totrueto disable for all tenants - Organization level: Each tenant can override the environment default through the organization settings (via API or UI)
The SDP supports both reCAPTCHA v2 ("I'm not a robot") and reCAPTCHA v3 (invisible, score-based) implementations:
- reCAPTCHA v2: Traditional checkbox-based verification
- reCAPTCHA v3: Invisible verification that returns a score (0.0 to 1.0) indicating the likelihood of human interaction
- CAPTCHA_TYPE: Specifies the type of CAPTCHA to use. Options:
GOOGLE_RECAPTCHA_V2(default) orGOOGLE_RECAPTCHA_V3 - RECAPTCHA_SITE_KEY: The Google reCAPTCHA site key
- RECAPTCHA_SITE_SECRET_KEY: The Google reCAPTCHA site secret key
- RECAPTCHA_V3_MIN_SCORE: Minimum score threshold for reCAPTCHA v3 (0.0 to 1.0, default: 0.5). Only used when CAPTCHA_TYPE is
GOOGLE_RECAPTCHA_V3 - DISABLE_RECAPTCHA: Set to
trueto disable reCAPTCHA entirely
ReCAPTCHA is enabled by default and can be disabled in the development environment by setting the DISABLE_RECAPTCHA environment variable to true.
The organization-level setting takes precedence over the environment default when explicitly set. If not set at the organization level, the environment default is used.
Note: Disabling reCAPTCHA is supported for pubnet environments but this might reduce security!
Multi-Factor Authentication (MFA) provides an additional layer of security to user accounts. It is enforced by default on the SDP and it relies on OTPs sent to the account's email.
MFA can be configured at two levels:
- Environment level (default): Set the
DISABLE_MFAenvironment variable totrueto disable for all tenants - Organization level: Each tenant can override the environment default through the organization settings (via API or UI)
The organization-level setting takes precedence over the environment default when explicitly set. If not set at the organization level, the environment default is used.
Note: Disabling MFA is not recommended for production environments due to security risks.
The SDP wallet should be used primarily as a hot wallet with a limited amount of funds to minimize potential losses.
- A hot wallet is connected to the internet and allows for quick transactions.
- A cold wallet is offline and used for storing funds securely.
- Learn more about these concepts at Investopedia.
To enhance security, disbursement responsibilities should be distributed among multiple financial controller users.
- Approval Flow: Enable the approval flow on the organization page to require two users for the disbursement process. The owner can do that at Profile > Organization > ... > Edit details > Approval flow > Confirm.
- Financial Controller Role: Create two users with the Financial Controller role on the organization page to enforce separation of duties. The owner can do hat at Settings > Team Members.
- Owner Account Management: Use the Owner account solely for user management and organization configuration. Avoid using the Owner account for financial controller tasks to minimize the exposure of that account.
The SDP Dashboard components are separate projects that must be installed and configured alongside the services included in this project.
In a future iteration of this project, the Transaction Submission Service (TSS) will also be moved to its own repository to be used as an independent service. At that point, this project will include the services contained in the Core module shown in the diagram above.
The SDP now includes native implementations of Stellar Enhancement Proposals SEP10 and SEP24, providing wallet authentication and interactive deposit flows without requiring external Anchor Platform integration.
SEP10 provides a secure way for wallets to authenticate with the SDP using Stellar transactions. The implementation includes:
- Challenge Generation: Creates cryptographically secure challenge transactions
- Transaction Validation: Validates signed challenge transactions from wallets
- JWT Token Generation: Issues JWT tokens for authenticated sessions
- Multi-tenant Support: Handles authentication across different tenant domains
- Client Domain Verification: Validates client domain signatures for enhanced security
Endpoints:
GET /auth- Generate authentication challengePOST /auth- Validate challenge and receive JWT token
SEP24 enables interactive deposit flows for wallet registration and payment processing:
- Interactive Registration: Guides users through wallet registration process
- OTP Verification: Handles one-time password verification for recipients
- Transaction Status Tracking: Monitors deposit transaction status
- Multi-language Support: Supports multiple languages for the registration UI
- JWT-based Security: Uses JWT tokens for secure transaction handling
Endpoints:
GET /sep24/info- Get supported assets and capabilitiesPOST /sep24/transactions/deposit/interactive- Initiate interactive depositGET /sep24/transactions- Get transaction status/wallet-registration/start- Interactive registration UI
The SEP10/SEP24 implementation can be configured using the following environment variables:
# SEP10 Configuration
SEP10_SIGNING_PUBLIC_KEY=G... # Public key for SEP10 signing
SEP10_SIGNING_PRIVATE_KEY=S... # Private key for SEP10 signing
# SEP24 Configuration
SEP24_JWT_SECRET=jwt_secret_... # JWT secret for SEP24 tokensThe SDP serves its own SEP10/SEP24 endpoints and the stellar.toml file points to these native endpoints instead of external Anchor Platform URLs.
The following environment variables are required for SEP10/SEP24 functionality:
Required Variables:
SEP10_SIGNING_PUBLIC_KEY- Public key for SEP10 challenge signingSEP10_SIGNING_PRIVATE_KEY- Private key for SEP10 challenge signingSEP24_JWT_SECRET- JWT secret for SEP24 token signing
Optional Variables:
BASE_URL- Base URL for generating SEP endpoint URLs in stellar.toml
Development Setup:
The make_env.sh script automatically generates SEP10 signing keys and creates the necessary .env file with proper configuration for development environments.
The SDP Core service include several components started using a single command.
stellar-disbursement-platform serve --helpThe Admin API is the component responsible for managing tenants of the SDP. It runs by default on port 8003 and is used to provision new tenants and manage existing tenants.
The Dashboard API is the component responsible for enabling clients to interact with the SDP. The primary client is the SDP Dashboard, but other clients can use the API as well.
The Dashboard API component is also responsible for exporting system and application metrics. We only have support for Prometheus at the moment, but we can add new monitors clients in the future.
The Message Service sends messages to users and recipients for the following reasons:
- Informing recipients they have an incoming disbursement and need to register
- Providing one-time passcodes (OTPs) to recipients
- Sending emails to users during account creation and account recovery flows
Note that the Message Service requires that both SMS and email services are configured. For emails, AWS SES and Twilio Sendgrid are supported. For SMS messages to recipients, Twilio SMS, Twilio WhatsAPP and AWS SNS are supported.
If you're using the AWS_EMAIL or TWILIO_EMAIL sender types, you'll need to verify the email address you're using to send emails in order to prevent it from being flagged by email firewalls. You can do that by following the instructions in this link for AWS SES or this link for Twilio Sendgrid.
Configuring Twilio WhatsApp requires additional steps beyond the standard Twilio SMS setup.
Prerequisites:
- Set up a Twilio WhatsApp Business Profile and complete the approval process
- Create message templates in the Twilio Console for each type of message you plan to send
- Wait for template approval before using them in production
Message Templates Setup:
You must create the following message templates in your Twilio Console and obtain their Template SIDs.
-
Receiver Invitation Template (
TWILIO_WHATSAPP_RECEIVER_INVITATION_TEMPLATE_SID)- Purpose: Notify recipients about incoming disbursements
- Variables:
{{1}}= Organization Name,{{2}}= Registration Link - Example: "You have a payment waiting for you from the {{1}}. Click {{2}} to register."
-
Receiver OTP Template (
TWILIO_WHATSAPP_RECEIVER_OTP_TEMPLATE_SID)- Purpose: Send one-time passwords to recipients during wallet registration
- Variables:
{{1}}= OTP Code,{{2}}= Organization Name - Example: "{{1}} is your {{2}} verification code."
Configuration:
Set the following environment variables:
SMS_SENDER_TYPE=TWILIO_WHATSAPP
TWILIO_ACCOUNT_SID=your_twilio_account_sid
TWILIO_AUTH_TOKEN=your_twilio_auth_token
TWILIO_WHATSAPP_FROM_NUMBER=whatsapp:+1234567890
TWILIO_WHATSAPP_RECEIVER_INVITATION_TEMPLATE_SID=HXxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
TWILIO_WHATSAPP_RECEIVER_OTP_TEMPLATE_SID=HXxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxImportant Notes:
- The
TWILIO_WHATSAPP_FROM_NUMBERmust include thewhatsapp:prefix and use your approved Twilio WhatsApp number - Template SIDs are obtained from the Twilio Console after template creation and approval
- WhatsApp requires pre-approved message templates for all business-initiated conversations
- Template variables are automatically populated by the SDP based on the message type
- All templates must be approved by WhatsApp before they can be used in production
- For detailed setup instructions, refer to the Twilio WhatsApp API documentation
The Wallet Registration UI is also hosted by the Core server, and enables recipients to confirm their phone number and other information used to verify their identity. Once recipients have registered through this UI, the Transaction Submission Server (TSS) immediately makes the payment to the recipients registered Stellar account.
The Core service now includes native implementations of SEP10 and SEP24 protocols:
- SEP10 Authentication: Provides secure wallet authentication using Stellar transactions
- SEP24 Interactive Deposits: Handles interactive deposit flows for wallet registration
- Stellar.toml Generation: Dynamically generates stellar.toml files with appropriate SEP endpoints
- Multi-tenant Support: Supports SEP10/SEP24 across different tenant domains
- JWT Token Management: Handles authentication tokens for secure API access
Refer to documentation here.
Currently, Core and Transaction Submission Service (TSS) interact at the database layer, sharing the submitter_transactions table to read and write state. The interaction is as follows:
- Core inserts rows into the
submitter_transactionstable, queuing payments - The TSS polls the
submitter_transactionstable, detecting payments - For each payment detected, the TSS creates and submits a transaction to the Stellar network, monitoring its state until it is confirmed to have been included in a ledger or failed with a nonrecoverable error
- Core's Dashboard API reads from the
submitter_transactionstable on demand to fetch the state of each payment
In future iterations of the project, the Transaction Submission Service will provide an API for clients such as the SDP to use for queuing and polling the state of transactions.
To manage the migrations of the database, use the db subcommand.
stellar-disbursement-platform db --helpMigration CMD
stellar-disbursement-platform db admin migrate upThe tables below are used to manage tenants and their configurations.
Migration CMD
The following command will migrate the tables used by the Core service for all tenants.
stellar-disbursement-platform db auth migrate up --all
stellar-disbursement-platform db sdp migrate up --allIt is also possible to migrate the tables for a specific tenant by using the --tenant-id flag.
stellar-disbursement-platform db auth migrate up --tenant-id=tenant_id
stellar-disbursement-platform db sdp migrate up --tenant-id=tenant_idThe tables below are used to facilitate disbursements.
The tables below are used to manage user roles and organizational information.
Migration CMD
stellar-disbursement-platform db tss migrate upThe tables below are shared by the transaction submission service and core service.
Note that the submitter_transactions table is used by the TSS and will be managed by the service when moved to its own project.
The SDP uses Background jobs to handle asynchronous tasks.
1. Jobs
Note
Certain jobs are not listed here because they cannot be configured and are necessary to the functioning of the SDP.
send_receiver_wallets_invitation_job: This job is used to send disbursement invites to recipients. Its interval is configured through theSCHEDULER_RECEIVER_INVITATION_JOB_SECONDSenvironment variable.payment_to_submitter_job: This job is used to submit payments from Core to the TSS. Its interval is configured through theSCHEDULER_PAYMENT_JOB_SECONDSenvironment variable.payment_from_submitter_job: This job is used to notify Core that a payment has been completed. Its interval is configured through theSCHEDULER_PAYMENT_JOB_SECONDSenvironment variable.patch_anchor_platform_transactions_completion: This job is used to patch transactions in Anchor Platform once payments reach the final state 'SUCCESS' or 'FAILED'. Its interval is configured through theSCHEDULER_PAYMENT_JOB_SECONDSenvironment variable.
2. Configuration
The following environment variables can be used to configure the intervals of the jobs listed above.
SCHEDULER_RECEIVER_INVITATION_JOB_SECONDS: # interval in seconds
SCHEDULER_PAYMENT_JOB_SECONDS: # interval in secondsNote
Prior to version 3.7.0, background jobs were configured using ENABLE_SCHEDULER=true and EVENT_BROKER_TYPE=NONE. This configuration has been deprecated in favor of using EVENT_BROKER_TYPE=SCHEDULER.
Tune the per-tenant PostgreSQL connection pool with env vars (defaults shown):
# Maximum open connections per pool (default: 20)
DB_MAX_OPEN_CONNS=20
# Maximum idle connections retained (default: 2)
DB_MAX_IDLE_CONNS=2
# Close idle connections after N seconds (default: 10 seconds)
DB_CONN_MAX_IDLE_TIME_SECONDS=10
# Recycle connections after N seconds (default: 300 = 5 minutes)
DB_CONN_MAX_LIFETIME_SECONDS=300These settings help prevent idle connection buildup across multi-tenant scheduler cycles, especially on constrained databases.
Please check the Making Your Wallet SDP-Ready section of the Stellar Docs for more information on how to integrate your wallet with the SDP.
This section is a work-in-progress.
The state transitions of a disbursement, payment, message, and wallet (i.e. recipient Stellar account) are described below.
stateDiagram-v2
[*] --> Draft:Started creating the disbursement
Draft --> [*]:User deleted\nthe draft
Draft --> Draft:File Ingestion failed\n due to wrong data
Draft --> Ready:Upload
Ready --> Started:User Started Disbursement\n in the Dashboard
Started --> Paused:Paused
Paused --> Started:Unpaused
Started --> Completed:All payments\n went through
stateDiagram-v2
[*] --> Draft:Upload a disbursement CSV
Draft --> [*]:Disbursement deleted
Draft --> Ready:Disbursement started
Ready --> Paused:Paused
Paused --> Ready:Unpaused
Ready --> Pending:Payment gets submitted\nif user is ready
Pending --> Success:Payment succeeds
Pending --> Failed:Payment fails
Failed --> Pending:Retry
stateDiagram-v2
[*] --> Draft:Upload disbursement CSV
Draft --> [*]:disbursement deleted
Draft --> Ready: Disbursement started
Ready --> Registered: receiver signed up
Ready --> Flagged: flagged
Flagged --> Ready: unflagged
Registered --> Flagged: flagged
Flagged --> Registered: unflagged
stateDiagram-v2
[*] --> Pending: Message is queued
Pending --> Success:Message sender\nAPI succeeds
Pending --> Failed:Message sender\nAPI fails
Failed --> Pending:Retry




