This capability can be triggered and executed independently or with our CFA solution. Circle-of-Trust has flexible as well as configurable levels of security.
You can deploy Level 1 Circle-of-Trust capabilities in just a few hours. It also works as an integrated step-up escalation for IAM platforms like Auth0. Pre-requisites for Circle-of-Trust implementation are as follows.
Auth 0 and Circle accounts
Circle Service is part of Circle Desktop, a thin client setup on your systems
Circle Data API
Implementation of Circle-of-Trust:
Our Circle for Auth0 implementation securely store access tokens in Secure Capsules created by Circle and controlled by the Auth0 authentication web server. With this, storage and refresh of authentication tokens generated by Auth0 for SSO can now be done securely on the endpoint device to enable frictionless log-in without user credentials.
Use case description: Enabling authentication of users with a Human-in-the-loop feature. For this implementation, we will be considering 3 types of users.
The implementation of the use case mainly consists of 2 segments -
For more information and other use case implementations
Circle Service a thin client, which is part of the Circle Access Desktop, leverages its unique and powerful functionalities to enable the following functionalities.
Circle-of-Trust is implemented with Circle Data API. These resources will help to get you started. There are other complementary capabilities available that leverage the Circle Data API with Circle Service and Secure Capsules on endpoint devices. Please get in touch with us with your use case for a free consultation.
Check our FAQs and Troubleshooting tips, or post on our Forum
Learn more about the architecture and principles of Circle, and how these are leveraged to deliver the unique capabilities of Circle-of-Trust.
You may want to consider deploying Circle Access alongside Circle-of-Trust. Circle Access secures user identity and access control with continuous cryptographic credential-free MFA that binds authentication to the specific user and device that has been authorized to eliminate phishing and other breaches caused by stolen or lost credentials.
Available for Early Access Customers & Deployments.