Circle API Demos

Circle Access

Circle Access

Cryptographic Credential-free Authentication

Frictionless cryptographic authentication that radically improves both security and UX to protect your data, apps and resources

  • Security without Friction
  • Continuous Authentication with Biometrics
  • Zero Attack Surface in the Cloud

What this demo shows

This is a simple demo of Circle Access, which enables frictionless, cryptographic credential-free authentication. Circle Access has 3 UX options for end users and automatically detects and adjusts to what the user has installed on the device they are currently using to request access to a Web site. You can try all three in this demo.

Circle Access Lite

Circle Access Light
No install on any device
Browser based cryptographic credential-free authentication
  • No install required on any device
  • QR code scan - no codes or other 2FA
  • Continuous authentication
  • Biometric identity verification

Circle Access Mobile

Circle Access Mobile
Install on mobile, no footprint 
on other devices
A secure mobile authentication app like no other
  • QR code scan for other devices
  • No install required on other devices
  • Continuous authentication
  • Biometric identify verification
  • Direct log-in on mobile

Circle Access Desktop

Circle Access Desktop
Install thin agent
A secure mobile authentication app like no other
  • Install 1x & forget
  • Your device is your auto log-in
  • Sync multiple devices
  • Continuous authentication
  • Biometric identify verification optional
  • Works together with Circle Access mobile

What you will need

Circle Access Lite

You do not need any application or installation whatsoever to try out Circle Access Lite. It uses HTML5 to store and manage cryptographic keys on your mobile phone for authentication.

Circle Access Mobile

You need the Circle Access Mobile App to leverage the on-device cryptographic capabilities of Circle Access Mobile and Digital Trust use cases.

Note: Circle Access Mobile also includes Circle Service, so you gain all of the Data Protection, Privacy, and Control capabilities of Circle Data at the same time.

Circle Desktop

Download and install Circle Access Desktop thin agent. This installs Circle Service to leverage its unique and powerful functionalities that run on the endpoint device.

  • AES 256 encrypted secure capsules to store any kind and any amount of data.
  • Keep private user data on endpoint devices but accessible to your applications.
  • Cloud backup, flexibility & resilience - but no keys
Get Circle Access Desktop

Ready?

We suggest you read the tips below first.  But you can also just go ahead!

Try the demo now

How to use the demo

If you want to try all three UX options, proceed with this order.

1. Circle Lite

Test this first with neither Circle Access Mobile nor Circle Access Desktop installed.   

  • If those are installed on the device you use to log in, they will be detected and automatically log you in.

The first time you use Circle Access, you need to go through the steps to set up and authenticate yourself as you. This is the typical process of confirming an email or text message link. You will get step-by-step guidance.

Then proceed as follows.

  1. Click the log-in button on the device you use to log in to the website.
  2. The website will serve a QR code
  3. Start your mobile phone camera and scan the QR code.
  4. That's it.

2. Circle Access Mobile

Now you can install Circle Access Mobile.   You will need to go through the first-time configuration and authentication as a new mobile app user.

Then proceed as follows.

  1. Click the log-in button on the device you use to log in to the website.
  2. The website will serve a QR code
  3. Start the Circle Access Mobile App and scan the QR code.
  4. That's it.

3. Circle Access Desktop

Now you can install Circle Access Desktop. In this case, you can add and synch Circle Access Desktop with your existing Circle Access Mobile user account.   The steps for that are proper in the Circle Access Mobile app.

Then proceed as follows.

  1. Click the log-in button on the device you use to log in to the website.
  2. That's it.   

The website will talk to Circle Access Desktop, which will cryptographically authenticate and confirm your identity. Then its logs you in with no additional steps. 

As a developer, you can, if desired, configure Circle Access Desktop to run extra steps and checks, such as requiring:

  1. A biometric identity scan on the device that is logging in; or
  2. QR code scan on Circle Access Mobile as an initial extra step the first time, daily, or whatever cadence you like.

This is good for situations where a PC / Laptop / Workstation is shared by multiple users or any case where access to such devices may not be as secure as desired. You can still ensure that access is restricted to the actual authenticated user while preserving a very low friction UX.