Section 9: Authentication System
A secure authentication system is fundamental to a well-functioning Web3 infrastructure.
RAX’s account creation and login/logout processes are designed with state-of-the-art security, ensuring that only the user can access their account.
It is cryptographically impossible for anyone other than the account holder to retrieve or recover their credentials.
Important: Always back up your seed phrase and recovery key securely.
If these are lost, no one—including RAX—will be able to restore access to your account.
Authentication Overview
RAX employs a three-step authentication process to ensure both convenience and top-tier security.
1. User Creation
To create an account, users must sign in using one of three available methods:
- Email + Password
- Third-Party Login (e.g., Google or Phantom)
- Passkey Authentication
This initial step establishes your RAX user identity and acts as your primary sign-in point.
2. Passkey-Based Second Authentication
Once the primary login is complete, RAX performs a secondary authentication that validates the origin of your login attempt.
Depending on your device, this may involve:
- Facial recognition
- Fingerprint verification
- Browser-based passkey validation
This additional step adds an extra layer of protection. Even if an attacker gains access to your email and password, they will not be able to enter your RAX account without the corresponding passkey or biometric match. If you selected Passkey as your primary authentication method, this step will be skipped.
3. Secure Access to AMD-SNP Enclave
Once authenticated, users gain access to their wallet through RAX’s AMD-SNP secured server.
This enclave-based infrastructure allows users to view and manage their wallets directly while isolating sensitive operations from external systems.
Only a unique passkey, linked to a verified RAX account, can decrypt and access the wallet stored within our secure enclave.
Each passkey corresponds exclusively to one main wallet and its associated sub-wallets, ensuring isolated and verifiable access.
Sign-Up Process
After completing the three authentication steps, your main wallet is created and securely linked to your account.
It is essential that you safely store your secret phrase and passkey, as they are the only means of recovering access to your wallet.