Circle Access

Access Verification and Recovery

API Circle Access Verification & Recovery

Our Access Verification and Recovery solution delivers a level of security that was previously achievable only with physical world mechanism.

Escalate when needed for high-risk use cases, with contexts and user behaviors to implement spoof-proof human-in-the-loop identity authentication and verification

With Circle-of-Trust, you can provide the following capabilities for your customers and end users.

  • Spoof-proof actions, events, and data requiring the highest level of security
  • Ensure that Superpowers are always super safe
  • Enable Trusted Restore & Recovery

This capability can be triggered and executed independently or with our CFA solution. Circle-of-Trust has flexible as well as configurable levels of security

Circle-of-Trust also comes with benefits and features like 

  1. All operations are performed within private AES 256 encrypted network, with no external certificate authority or exposure making it impervious to external attack or manipulation.
  2. This solution can be used to protect application and device functions, not just data.
  3. Any level of authentication can be defined:
    • N number of trusted peers
    • Sequenced steps / workflows
    • Visual confirmation
    • Proximity-based confirmation

Enable Circle-of-Trust solution in combination with Auth0 out-of-the-box 

Two Levels of Deployment

Choose from flexible and configurable implementation options to meet your needs.

Level 1: Cryptographic Human-in-the-Loop Authentication

Enables direct authentication between human users over traditional cloud resources for re-authentication and checks to ensure that the authorized user has control over his or her devices.

Developers can implement this solution end-to-end, themselves using existing preferred cloud  services or through Circle hosted services.
Circle-of-Trust Level 2

Level 2: Spoof-proof Human-in-the-Loop Identity Verification

For actions, events, and data requiring the highest level of security
At the highest level of security configuration, Circle-of-Trust operates entirely within Circles that are encrypted with AES 256, without any external avenues for attack. 

A turn-key hosted solution in order to ensure the integrity of the methods and system.

Get started

You can deploy Level 1 Circle-of-Trust capabilities in just a few hours.  It also works together as an integrated step-up escalation for IAM platforms such as Auth0. Pre-requisites for Circle-of-Trust implementation are as follows

  1. Auth 0 and Circle accounts

  2. Circle Service that is the part of Circle Desktop a thin client setup on your systems

  3. Circle Data API

Implementation of Circle-of-Trust:

Our Circle for Auth0 implementation mainly helps in securely storing access tokens in secure capsules that are created by Circle and controlled by Auth0 authentication web server. With this, storage and refresh of authentication tokens generated by Auth0 for SSO can now be done securely on the endpoint device to enable frictionless log-in with no need for user credentials

Use case description: Enabling authentication of users with Human-in-the-loop feature. For this implementation we will be considering 3 types of users

  1. Actual User
  2. Email Authenticator
  3. SMS Authenticator

The implementation of use case mainly consists of 2 segments -

  1. Core application setup and account creation (Detailed implementation steps- Getting Started with Circle-of-Trust)
    • Create an Auth0 account. Go to the Auth0 Dashboard, Applications and create an application and configure - callback urls and enable refresh token
    • Initiate an API call to save the configuration
    • Test by initiating an API call for Circle to login into Auth0
  2. Use case implementation (Detailed implementation steps with demo tips - Human-in-the-loop Authentication )
    • All data points are stored in closed secured capsules which can be opened through a Multi-factor authentication
    • Authentication would generate 2 codes which are sent to the authentication validators of the user
    • Validators would validate themselves and get the code from the users - physically or through call
    • User then enters the codes which in turn helps in unlocks the secured capsules

For more information and other use case implementations 


Demo with detailed implementation steps 

The demo includes an optional escalation to Circle-of-Trust human-in-the-loop distributed identity verification + authentication, along with a simple admin to enable you to create and manage your own Circle-of-Trust for this purpose.  We strongly recommend you read these brief demo tips before starting in order to understand how to configure and run it with these features.
When you are ready, go to the demo to setup and your first Circle-of-Trust!
Get Circle Access Desktop
Circle Access Desktop

You need Circle Service, which is part of the Circle Access Desktop Thin Client, in order to leverage its unique and powerful functionalities that run on the endpoint device.

  • AES 256 encrypted secure capsules to store any kind, and any amount of data.
  • Keep private user data on endpoint devices but accessible to your applications
  • Cloud Back-up, Flexibility & Resilience - But No Keys
Learn more
Circle Data API
Circle Data API
You use the Circle Data API to integrate and implement Data Protection, Privacy and control capabilities.
Learn more
View the code on Github
Go to our Github for code downloads, examples, modules and more.
Learn more

Support & Learning

Circle-of-Trust is implemented with Circle Data API. These resources will help to get you started.  There are other complementary capabilities available that leverage the Circle Data API with Circle Service and Secure Capsules on endpoint devices. Please contact us with your use case for a free consultation.


Check our FAQs and Troubleshooting tips, or post on our Forum


Learn more about the architecture and principles of Circle, and how these are leveraged to deliver the unique capabilities of Circle-of-Trust.

Deploy together with Circle Access Cryptographic CFA


Decentralized frictionless MFA that radically improves your security posture

You may want to consider deploying Circle Access alongside Circle-of-Trust. Circle Access secures user identity and access control with continuous cryptographic credential-free MFA that binds authentication to the specific user and device that has been authorized to eliminate phishing and other breaches caused by stolen or lost credentials.

Contact Us

Turn Key Integrations for Your Workforce Apps

If you're an Enterprise customer you can Implement, provision and start securing your workforce with any of these platform partners in a few hours
Stay tuned for many more coming soon!