Circle API Demos

Circle Access

Circle Access

Cryptographic Credential-free Authentication

Frictionless cryptographic authentication that radically improves both security and UX to protect your data, apps and resources

  • Security without Friction
  • Continuous Authentication with Biometrics
  • Zero Attack Surface in the Cloud

What this demo shows

This is a simple demo of Circle Access, which enables frictionless, cryptographic credential free authentication. Circle Access has 3 UX options for end users, and automatically detects and adjust to what the user has installed on the device they are currently using to request access to a Web site. You can try all three in this demo.

Circle Access Lite

Circle Access Light
No install on any device
Browser based cryptographic credential-free authentication
  • No install required on any device
  • QR code scan - no codes or other 2FA
  • Continuous authentication
  • Biometric identity verification

Circle Access Mobile

Circle Access Mobile
Install on mobile, no footprint 
on other devices
A secure mobile authentication app like no other
  • QR code scan for other devices
  • No install required on other devices
  • Continuous authentication
  • Biometric identify verification
  • Direct log-in on mobile

Circle Access Desktop

Circle Access Desktop
Install thin agent
A secure mobile authentication app like no other
  • Install 1x & forget
  • Your device is your auto log-in
  • Sync multiple devices
  • Continuous authentication
  • Biometric identify verification optional
  • Works together with Circle Access mobile

What you will need

Circle Access Lite

You do not need any application or installation whatsoever to try out Circle Access Lite. It uses HTML5 to store and manage cryptographic keys on your mobile phone for authentication purposes.

Circle Access Mobile

You need the Circle Access Mobile App in order to leverage the on-device cryptographic capabilities of Circle Access Mobile and Digital Trust use cases.

Note: Circle Access Mobile also includes Circle Service, so you gain all of the Data Protection, Privacy and Control capabilities of Circle Data at the same time.

Circle Desktop

Download and install Circle Access Desktop thin agent. This installs Circle Service in order to leverage its unique and powerful functionalities that run on the endpoint device.

  • AES 256 encrypted secure capsules to store any kind, and any amount of data.
  • Keep private user data on endpoint devices but accessible to your applications
  • Cloud back-up, flexibility & resilience - but no keys
Get Circle Access Desktop

Ready?

We suggest you read the tips below first.  But you can also just go ahead!

Try the demo now

How to use the demo

If you want to try all three UX options, you should proceed in this order.

1.  Circle Lite

Test this first, with neither Circle Access Mobile or Circle Access Desktop installed.   

  • If those are installed on the device you are using in to log-in, they will be detected and automatically log you in.

The first time you use Circle Access, you need to go through the steps to set-up and authenticate yourself as you. This is the typical process of confirming an email or text message link. You will get step-by-step guidance.

Then proceed as follows.

  1. On the device that you are using to log-in to the website, click on the log-in button
  2. The website will serve a QR code
  3. Start your mobile phone camera and scan the QR code.
  4. That's it.

2.  Circle Access Mobile

Now you can install Circle Access Mobile.   You will need to to through the first time configuration and authentication as a new user of the mobile app.

Then proceed as follows.

  1. On the device that you are using to log-in to the website, click on the log-in button
  2. The website will serve a QR code
  3. Start the Circle Access Mobile App and scan the QR code.
  4. That's it.

3.  Circle Access Desktop

Now you can install Circle Access Desktop.  In this case, you can add and synch Circle Access Desktop with your existing Circle Access Mobile user account.   The steps for that are right in Circle Access Mobile app.

Then proceed as follows.

  1. On the device that you are using to log-in to the website, click on the log-in button
  2. That's it.   

The website will talk to Circle Access Desktop, which will cryptographically authenticate and confirm your identity.  Then its logs you in with no additional steps. 

As a developer, you can if desired configure Circle Access Destkop to run extra steps and checks, such as requiring:

  1. A biometric identity scan on the device that is logging in; or
  2. QR code scan on Circle Access Mobile as an initial extra step the first time, or daily, or whatever cadence you like.

This is good for situations where a PC / Laptop / Workstation is shared by multiple users, or any situation where access to such devices may not be as secure as desired.  You can still insure that access is restricted to the actual authenticated user while preserving a very low friction UX.