This capability can be triggered and executed independently or with our CFA solution. Circle-of-Trust has flexible as well as configurable levels of security
You can deploy Level 1 Circle-of-Trust capabilities in just a few hours. It also works together as an integrated step-up escalation for IAM platforms such as Auth0. Pre-requisites for Circle-of-Trust implementation are as follows
Auth 0 and Circle accounts
Circle Service that is the part of Circle Desktop a thin client setup on your systems
Circle Data API
Implementation of Circle-of-Trust:
Our Circle for Auth0 implementation mainly helps in securely storing access tokens in secure capsules that are created by Circle and controlled by Auth0 authentication web server. With this, storage and refresh of authentication tokens generated by Auth0 for SSO can now be done securely on the endpoint device to enable frictionless log-in with no need for user credentials
Use case description: Enabling authentication of users with Human-in-the-loop feature. For this implementation we will be considering 3 types of users
The implementation of use case mainly consists of 2 segments -
For more information and other use case implementations
You need Circle Service, which is part of the Circle Access Desktop Thin Client, in order to leverage its unique and powerful functionalities that run on the endpoint device.
Circle-of-Trust is implemented with Circle Data API. These resources will help to get you started. There are other complementary capabilities available that leverage the Circle Data API with Circle Service and Secure Capsules on endpoint devices. Please contact us with your use case for a free consultation.
Check our FAQs and Troubleshooting tips, or post on our Forum
Learn more about the architecture and principles of Circle, and how these are leveraged to deliver the unique capabilities of Circle-of-Trust.
You may want to consider deploying Circle Access alongside Circle-of-Trust. Circle Access secures user identity and access control with continuous cryptographic credential-free MFA that binds authentication to the specific user and device that has been authorized to eliminate phishing and other breaches caused by stolen or lost credentials.
Available for Early Access Customers & Deployments.