Parties
A party represents a real-world actor — either an individual or an organization — that participates in document distribution workflows. Parties enable identity reuse across docks, allowing the same entity to act as a distributor in one dock and a recipient in another.Core Concept
Think of parties as your counterparty directory. Instead of creating separate recipient records for the same entity in every dock, you create one party record and assign them roles where needed.Party vs. Recipient
| Aspect | Party | Recipient |
|---|---|---|
| Scope | Organization-level | Dock-level |
| Represents | Real-world entity | Access grant within a specific dock |
| Reusability | One party, multiple docks | Tied to a single dock |
| Identity | Persistent, consistent | Context-specific |
| Linkage | Can be linked to recipients | Can link to a party |
Party Types
Individual
Natural persons who participate in workflows:- Homeowners receiving closing documents
- Patients receiving medical records
- Investors receiving financial statements
- Auditors reviewing compliance documents
Organization
Legal entities that participate in workflows:- Title companies
- Insurance carriers
- Lenders and banks
- Healthcare providers
- Government agencies
- Escrow companies
Party Roles
Roles define what a party can do within a specific dock:DISTRIBUTOR
The party uploads artifacts, creates policies, and manages distribution:- Permissions: Create artifacts, define policies, add recipients
- Typical Actors: Title companies, insurance carriers, healthcare providers
- Example: A title company distributing closing packets to lenders and buyers
RECIPIENT
The party retrieves artifacts through access recipes:- Permissions: Access documents via policies, download via retrieval API
- Typical Actors: Lenders, insurers, auditors, regulators, patients
- Example: A lender receiving loan documentation from a title company
Multi-Role Parties
A party can hold different roles in different docks:Real-World Scenarios
Title Company (Organization Party)
Party: Premier Title Services (type: ORGANIZATION) Scenario 1: Title Insurance DistributionPatient (Individual Party)
Party: Sarah Johnson (type: INDIVIDUAL) Scenario 1: Hospital RecordsLender (Organization Party)
Party: Wells Fargo Mortgage (type: ORGANIZATION) Scenario 1: Loan OriginationParty Lifecycle
1. Create Party
Create the party record at the organization level:2. Assign Role in Dock
Grant the party a role within a specific dock:- Party must belong to the organization
- Dock must belong to the same organization
- Role combination (dockId + partyId + role) must be unique
3. Link to Recipient (Optional)
When creating a recipient, link them to the party:4. Query Party Roles
List all roles a party has across docks:Party Identifiers
Parties can have various identifiers for different contexts:External Reference
Use theexternalRef field to store authoritative identifiers:
- Organizations: Federal EIN, DUNS number, state business registration
- Individuals: Social Security Number (hashed), patient ID, employee ID
Recipient Identifiers
When a party is linked to a recipient, they inherit the dock’s identifier schema:- Insurance: NAIC number, FEIN
- Healthcare: NPI number, medical record number
- Real Estate: License number, escrow agent ID
Best Practices
Creating Parties
✅ Do:- Create one party per real-world entity
- Use consistent
externalReffor authoritative identification - Include industry and region in metadata for filtering
- Set a primary email for communications
- Create duplicate parties for the same entity
- Put sensitive PII in metadata (use
externalReffor SSNs, hashed) - Create parties at the dock level (use organization scope)
Assigning Roles
✅ Do:- Assign DISTRIBUTOR role to entities that upload documents
- Assign RECIPIENT role to entities that retrieve documents
- Review role assignments quarterly
- Use descriptive dock names for clarity
- Assign both roles in the same dock (creates confusion)
- Forget to link recipients to parties (loses identity benefits)
- Grant DISTRIBUTOR role to external parties without verification
Industry Patterns
Financial Services:- Create parties for: lenders, title companies, insurers, auditors
- Common external refs: FEIN, NMLS ID, DUNS
- Typical metadata: credit ratings, geographic regions, relationship tiers
- Create parties for: providers, insurers, patients, government agencies
- Common external refs: NPI, tax ID, medical record number
- Typical metadata: specialties, network status, compliance certifications
- Create parties for: agents, brokers, lenders, title companies, buyers, sellers
- Common external refs: license numbers, MLS IDs
- Typical metadata: market areas, transaction volume, specialization
Security Considerations
Data Isolation
- Party data is organization-scoped
- Party roles are dock-scoped (but validated against organization)
- Party identifiers are visible only within the organization
- Cross-organization party matching is not supported (by design)
Privacy
- Store sensitive identifiers (SSN, MRN) in
externalRef, not metadata - Consider hashing sensitive identifiers
- Party email addresses are used for notifications (ensure opt-in)
Related Concepts
- Organizations — Top-level tenant boundary
- Docks — Workspaces where parties have roles
- Recipients — Access grants linked to parties
- Machine Authentication — Automated access by parties
API Endpoints
- Create Party
- List Parties
- Assign Party Role
- List Party Roles
- Create Recipient — With party linkage