Create Vault

Step by step process

1

Ownership

The first step is selecting one of two options:

  • Single Address Ownership: The vault is owned and fully controlled by the creator, offering simplicity and flexibility.

  • Multisig Ownership: Ownership is shared among multiple parties, enhancing security and reducing reliance on a single individual.

2

Accessibility

Customize how users interact with your vault:

  • Underlying Asset: Define the primary asset for deposits, which also serves as the reference for the price oracle.

  • Vault Keeper: Manage who can deposit into your vault by restricting access to a curated user list or keeping it open to the public. Integrate KYC/KYB through third-party providers or handle the whitelist manually.

  • Visibility: Decide whether your vault appears on Lagoon’s UI for public access or remains private.

3

Role Settings

Vault administrator can clearly define roles and distribute responsibilities across the Whitelist Manager, Asset Manager, Price Oracle, Vault Keeper and fee receiver.

You can create highly decentralized vaults, with each role managed by a different stakeholder, or highly centralized ones, where a single entity controls everything.

Each approach comes with its own trade-offs to consider.

4

Fee Structures

Lagoon natively supports customizable fee models, including performance fees, management fees, and entry/exit fees. You can select the structure that best suits your strategy. All fee calculations and distributions are automated within your vault, ensuring seamless and accurate management.

5

Define Your DeFi Scope

Set the scope of DeFi protocols your vault will interact with by whitelisting options, ensuring a secure and transparent operational framework:

  • Protocol Whitelisting from DeFi-Kit library: Manage funds while maintaining client custody using integrated protocols. The range of available applications will continue to grow over time.

  • Custom Contract Whitelisting: Add any protocol by integrating it into the DeFi-Kit library.

Whitelisted protocols are visible to users, so ensure they meet your clients' trust expectations.

Last updated