Demiton Logo
Demiton
/ var / log / engineering
Identity
Security
Protocol Zero
ChatOps

The End of 'Click to Approve': Bringing Financial Governance to the Edge

Justin Trollip, Founder
3 min read
The End of 'Click to Approve': Bringing Financial Governance to the Edge

"The most secure system in the world is useless if the CFO is at dinner and refuses to log in."

For the last decade, Enterprise Software has forced a binary choice on Finance teams: Security or Speed.

If you want Security, you force the user to VPN in, perform 2FA, navigate five menus, and click "Approve." (Result: The invoice waits until Monday). If you want Speed, you send a webhook to Slack with a "Yes" button. (Result: Any intern in the channel can accidentally authorize a payment).

This gap—between the rigidity of the ERP and the fluidity of the Chat App—is where agility dies.

Today, we are deploying Protocol Zero: The Universal Identity Engine. We are changing the fundamental relationship between Demiton and your chat platform. We no longer just "Notify." We listen, verify, and execute.

1. The Problem: "Session Auth" vs "Remote Auth"

Most integration tools rely on Session Auth. You are secure because you are inside the browser session.

But the moment you step away from the keyboard, that security vanishes. To approve a transaction from Microsoft Teams or Discord, most bots rely on "Security through Obscurity" (hoping the right person clicks the button).

We rejected this. We realized that to build a Financial Operating System, we needed to treat external platforms not as "Social Networks," but as Unverified Edge Nodes.

2. Identity Binding (The Cryptographic Handshake)

We do not trust the username "Justin" coming from Discord. We do not trust the email header coming from Outlook.

Protocol Zero introduces Identity Binding.

  1. The Trigger: When a user attempts a remote action for the first time, Demiton intercepts the request.
  2. The Challenge: We issue an ephemeral, cryptographically signed "Link Request."
  3. The Bind: The user authenticates via MFA in the Core Console. We then fuse their Demiton Identity (User: 102) to their External Snowflake ID (Discord: 882...).

From that moment on, we don't look at names. We look at the Signature.

3. Contextual RBAC (The Policy Engine)

Just because you can approve from a phone doesn't mean you should approve everything.

The Protocol Zero engine injects a Policy Layer between the Chat App and the Database.

  • Scenario A: Invoice is $2,000.
    • Action: User clicks "Approve" in Teams.
    • Result: Success. (Low risk, high velocity).
  • Scenario B: Invoice is $500,000.
    • Action: User clicks "Approve" in Teams.
    • Result: Blocked. A succinct, ephemeral message informs them: "Transaction exceeds Remote Limit ($50k). Please login to Console."

This allows Risk Officers to sleep at night. You can enable high-velocity approvals for operational noise, while keeping the "Nuclear Codes" locked behind the console.

4. Verification: Ed25519 Signatures

We treat incoming webhooks from Discord and Teams as hostile until proven otherwise.

Every interaction payload is verified against its Ed25519 cryptographic signature before our server even parses the JSON. If the signature doesn't match the public key on file, the request is dropped into the void.

We do not parse headers. We verify math.

The Verdict

We are moving Demiton from a "Passive Observer" to an "Active Participant."

By pushing governance to the Edge—where your team actually lives—we remove the friction that slows down the financial cycle. We turn Microsoft Teams from a noisy newsfeed into a secure command terminal.

Stop logging in to approve a $50 subscription. Start orchestrating.

Configure Remote Policies →

Stop fighting with manual bank files.

We are looking for 20 Technical Leads to join the Pioneer Program. Get early access to the OData Workbench and the Financial Gateway.