Why Qualify Access?
Risk Mitigation
Reduce exposure to defaults and bad actors by limiting access to creditworthy participants
Better Terms
Offer improved rates or conditions to users who demonstrate financial responsibility
Protect LPs
Safeguard liquidity providers by ensuring borrowers meet minimum creditworthiness standards
Regulatory Compliance
Meet compliance requirements by implementing risk-based access controls
Example: Lending Pool Access
A lending pool may only be accessed by accounts with an “Excellent” credit score. This is because the provider of the lending pool may want to minimize the risk of default on loans, and therefore only wants to provide loans to individuals or entities that have a proven track record of responsibly managing credit.Example: Yield Aggregation Tiers
A yield aggregation protocol may only offer specific pools to accounts with credit scores over 800. This is because the provider may want to ensure that only the most financially stable individuals or entities are able to access higher-risk, higher-reward pools.Implementation Patterns
Gate by Score Range
Use therange field for simple tier-based access:
Gate by Minimum Score
Use the numericscore for precise thresholds:
On-Chain Integration
For smart contract integration, you can verify scores off-chain and pass the result on-chain, or use an oracle pattern:Best Practices
Cache scores appropriately
Cache scores appropriately
Credit scores are cached for 5 minutes. For access control decisions, consider caching the approval status rather than re-checking on every interaction.
Provide clear feedback
Provide clear feedback
When denying access, tell users why and what score they need. This transparency helps users understand the requirements and potentially improve their creditworthiness.
Consider gradual access
Consider gradual access
Rather than binary access control, consider tiered access where lower scores get higher collateral requirements or lower limits, rather than complete denial.
Use sandbox for testing
Use sandbox for testing
Test your access control logic using sandbox endpoints before deploying to production. Sandbox returns deterministic scores based on address, making testing predictable.