Circle Access

Digital Trust for User Journeys

With our Digital Trust for User Journeys, you can ensure Zero Trust implementation for users by tracking and validating all their actions and transactions. 

It uses cryptographic authentication, multi-party authorization and immutable Distributed Ledger Technology (DLT)
  • Know and verify the user behind every action
    • Automatically enforce cryptographic signatures for every user action and deliver an unparalleled level of digital trust in user actions, transactions and interactions.
    • Enable continuous positive identity verification via device-based biometrics throughout the user session to deliver an immutable proof of identity and possession of device.
  • Authorize safely, securely & efficiently, but with bullet-proof oversight and controls
    • Using Circle access Authorization API we can easily build multiparty approval workflows that can ensure business agility without compromising any governance protocols.
  • Guarantee data integrity for auditing, investigations and compliance
    • You can leverage Circle's built-in immutable distributed ledger to ensure the integrity of data, and build functions to securely export it from Circles when needed for auditing, investigations and compliance

Ensure Digital Trust for User Journeys with simple API configurations

Get started

The implementation of Digital Trust User Journeys will require 

  • Circle Access API 
  • Circle Access Mobile App

Our Digital Trust solution can be implemented independently or alongside our CFA solution.  In standalone mode its API endpoints can be used to configure workflows and integrate with other traditional MFA services.

Below is an implementation of one of the most popular use cases, but there really is no limit beyond your imagination! If you have any questions or custom support needs, please contact us.

Build workflows to securely authorize digital actions and transactions

Using Circle Access authorization API we can easily build multiparty approval workflows that can ensure business agility without compromising any governance protocols. Here are 6 easy steps of integration with an interactive demo

1

Set up Circle Access API - Getting Started with Circle Access API

2

Install Circle Access mobile

3

Create a contract for authorization

4

Send the contract to a set of recipients who will be authorizing the user

5

Accept the contract and track the approval processes

6

Get approvals from your team members and complete the authorization process

For more information and other use case implementations 

Digital Trust

Interactive demo for multi-party authorization 

An interactive demo with detailed steps for building a multi-party authorization workflow. This enables users to authorize a particular action with multiple parties. 

The demo shows how to create a workflow for approving payments

Circle Access Mobile
Circle Access Mobile App
You need the Circle Access Mobile App in order to fully leverage the cryptographic capabilities of Circle Access for Digital Trust use cases.
Circle Access API
Circle Access API
You use the Circle Access API to integrate and implement Digital Trust capabilities.  You can deploy Circle Access with your Web site or application literally in minutes!  Digital Trust capabilities are built-in and configuration and/or extension easy.
Learn more
View the code on Github
Go to our Github for code downloads, examples, modules and more.
Learn more

Support & Learning

The baseline capabilities for Digital Trust for User Journeys are implemented with Circle Access API. These resources will help to get you started

Support

Check our FAQs and Troubleshooting tips, or post on our Forum

Learning

Check out this page with tips and interactive code examples to accelerate your learning.