The implementation of Data Visibility and Control will require
6 easy steps to enable Circle's Data Visibility and Control:
Setup Circle Rest API
Initiate one time authentication with Circle Server to start Circle Service on your local machine
Setup your application and confirm by verifying communication
Get a Bearer Token for managing API sessions
Generate signatures for devices/ users
Create your own circle and invite users to it by two code validation process and share the data securely
For detailed step by step integration and implementation of Data Visibility and Control capabilities of Circle Data refer to
You need Circle Service, which is part of the Circle Access Desktop Thin Client, in order to leverage its unique and powerful functionalities that run on the endpoint device.
You use the Circle Data API to integrate and implement Data Protection, Privacy and control capabilities
Go to our Github for code downloads, examples, modules and more.
The Data Visibility and Control of Circle Data can be implemented with Circle Data API. More advanced and customer capabilities can leverage the Circle Data API with Circle Service and Secured Capsules on endpoint devices. Please contact us with your use case for a free consultation.
Check our FAQs and Troubleshooting tips, or post on our Forum
Learn more about the breakthrough architecture and principles of Circle Data, and the amazing ways it delivers Data Protection, Privacy and Control for Data Owners.