Inside Your Kraken Account: Features, Controls and Portfolio Tools
Account Dashboard Capabilities
- Real-time portfolio valuation across all held cryptocurrencies and fiat currencies
- Three verification tiers (Starter, Intermediate, Pro) unlocking progressively higher limits and features
- Granular security controls including separate 2FA for sign-in, trading, funding and API access
- Full compliance with FinCEN KYC/AML requirements across all account tiers
Completing a Kraken account login brings you to a dashboard designed for comprehensive digital asset management. Unlike exchanges that reduce the post-login experience to a simple trading interface, Kraken provides a full financial control center where you can monitor portfolio performance, manage security settings, configure funding methods, stake assets for rewards and access detailed transaction history — all from a unified interface that adapts to your verification level.
The dashboard presents your total portfolio value in your preferred fiat currency, with a breakdown by asset allocation. Real-time price feeds update your holdings continuously, while historical performance charts show daily, weekly, monthly and yearly returns. For traders who operate across spot, margin and futures markets, the unified balance view consolidates positions across all products into a single net asset value, providing a clear picture of total exposure and available capital.
Account security is managed through a dedicated settings panel that represents one of the most granular control systems available on any cryptocurrency exchange. Kraken allows you to configure independent two-factor authentication requirements for four distinct action categories: sign-in, trading, funding and API key operations. This means you can maintain a streamlined login experience with TOTP while requiring a hardware security key for any withdrawal or sensitive account change. The Global Settings Lock adds a time-delayed freeze on all configuration changes, creating a buffer period that prevents real-time attackers from modifying your security settings even with valid credentials.