To use circle-of-trust, you first need to configure your access policies to trigger zero-trust identity verification. This can be done by adding a policy that requires users to perform multi-factor authentication, or by using another mechanism that supports this feature. Once this is done, users will be prompted to verify their identity, when they attempt to access sensitive data or perform sensitive actions.
Circle-of-trust can be used with any type of authentication system, including biometric systems that keeps humans in the loop. It is also compatible with a variety of different applications and services, making it easy to integrate into your existing infrastructure.