The implementation of Data Visibility and Control will require
6 easy steps to enable Circle's Data Visibility and Control:
Setup Circle Rest API
Initiate one time authentication with Circle Server to start Circle Service on your local machine
Setup your application and confirm by verifying communication
Get a Bearer Token for managing API sessions
Generate signatures for devices/ users
Create your own circle and invite users to it by two code validation process and share the data securely
For detailed step by step integration and implementation of Data Visibility and Control capabilities of Circle Data refer to
You need Circle Service, part of the Circle Access Desktop thin client, to enable the following functionalities on the endpoint device.
Use Circle Data API to integrate and implement Data Protection, Privacy, and control capabilities
The Data Visibility and Control of Circle Data can be implemented with Circle Data API. More advanced customer capabilities can leverage the Circle Data API with Circle Service and Secured Capsules on endpoint devices. Please contact us with your use case for a free consultation.
Check our FAQs and Troubleshooting tips, or post on our Forum
Learn more about the breakthrough architecture and principles of Circle Data, and the amazing ways it delivers Data Protection, Privacy and Control for Data Owners.