Core concepts, architecture, and componentry of Fluree.
This section goes into detail about how Fluree works and why it was built the way it is.
Query peers, query clients, transactor groups, and consensus algorithms. This section goes into detail about the infrastructure of a Fluree deployment.
Auth in Fluree
Identity and Access Management in Fluree. How Fluree handles and uses asymmetric encryption and keys to provide privacy and security to data.
SmartFunctions are foundational. They are key to setting and enforcing permissions as well as several types of data validation in Fluree.
Fluree's unique architecture enables functionality not available to other platforms. Analytical queries unlock almost all of that power.