ποΈArchitecture
UDAI is designed as a modular, high-scale Digital Public Infrastructure (DPI). It separates identity, registry, and operational logic into distinct layers to ensure maximum interoperability and security.
System Overview
1. Core Data Models
UDAI operates on 12 Canonical Data Models that ensure a single source of truth for the entire ecosystem.
Identity: Users, Pilot Credentials, Organisation, Organisation Membership.
Hardware: Drone Model, Drone, Payload, Drone Ownership.
Operational: Mission, Flight Plan, Flight Session, Flight Data, Airspace Restriction Zone.
2. API Architecture (The Five Pillars)
The API is exposed via five strictly isolated pillars, ensuring that failures in one domain (e.g., Telemetry) do not affect others (e.g., Authentication).
Authentication: RBAC/CBAC management and identity verification.
Fleet: Distributed registry of aerial assets.
Mission: Orchestration of complex flight plans and approvals.
Telemetry: High-throughput ingestion and fan-out of live flight data.
Airspace: Real-time management of 3D geospatial constraints.
3. Server Environments
Production (
api.udai.live): High-availability cluster for live operations.Staging (
staging-api.udai.live): Pre-production environment for integration testing.Local: Development environment for rapid iteration.
4. Gateway Layer
Auth Gateway
The first entry point for all requests. It enforces:
Identity Proofing: Verifying
partner-api-keyandUser JWT.Context Extraction: Identifying the
X-Organization-IDto set the tenant scope.Rate Limiting: Preventing DDoS and API abuse at the edge.
API Gateway / Router
Handles the internal routing of requests to the appropriate pillar services. It coordinates cross-pillar calls (e.g., checking if a Pilot is authorized in the Auth pillar before allowing a Mission creation in the Mission pillar).
Last updated