Circle Access 360

Frictionless, totally secure credential-free authentication that radically improves both security AND User Experience 

Two UX options that work together:
  • Circle Access Mobile - your smartphone is your log-in
  • Circle Access Desktop - your device is your log-in
Circle Access

Circle Access eliminates phishing and other breaches caused by stolen or lost credentials.

by cryptographically binding authentication to the specific user and device that has been authorized.
Circle Access 360 integrates Circle Access Mobile and Circle Access Desktop for the ultimate in convenience and flexiblity combined with unrivaled security.
Sign Up Now - It's FREE
Try the Demo

Credential-Free Codeless 2FA
Your Smartphone is Your Log-in

Continuous biometric authentication ensure your smarthphone is YOU.

Optimize your app for user experience and privacy, lower user friction and speed up the registration, login and auth factors.
Circle Access Mobile
Circle Access Desktop

Credential-Free Device-based Log-in
Your Device is Your Log-in

Completely frictionless cryptographic credential-free authentication that binds user access to authorized, registered devices.

Enable biometric-powered continuous authentication when needed for real-time security monitoring.

Take the Next Step

Get Started

Integrate Circle Access 360 with your Web site or Web application in a few hours.  Try the Step-by-Step guides to get you started.
async function checkCircleServiceIsRunning() {
  let isRunning = await Circle.isServiceRunning();
  if (isRunning) {
    document.getElementById('runningResult').innerText = 'CircleService is running!';
  } else {
    document.getElementById('runningResult').innerText = 'Can not find CircleService!';
  }
}

(function() {
  checkCircleServiceIsRunning();
})();

 

Getting Started with Circle Access 360
Demo
Try an interactive demo of Circle Access 360 along with code tips and explanations.
API References
Use the Circle Access REST API methods and documentation to integrate Circle Access 360 with your Web site or application.

Learn More

Secure authentication is  critical, but just one part of implementing a log-in and access control UX for end users.  Many of the most important decisions are up to you. 

These guides, sample app tutorials, and targeted links to API reference docs will get you across the deploy line.
Circle Access Primer
Learn about the different ways you can implement Circle Access and how it works
Understanding Circle
Learn more about the architecture and principles of Circle, and the amazing things it can do
Troubleshooting & Diagnostics
Check our FAQs and Troubleshooting tips, or post on our Forum

Explore More Features

Authorization APIs

The Circle Access Authorization APIs gives developers the means to create any kind of authorization flow. For example, it can create a flow for approving payments from 3 different people with different weights for each.

The Authorization API is a part of Circle Verite, with many capabilities that can be combined with other platforms.
Authorization Workflow Demo
Demo
Check out the Authorization API Demo to see a very simple live example.