Frequently Asked Questions

FAQ Category: Credential Free MFA

Cryptographic Credential-Free Authentication
The Circle Data APIs power Zero Trust Data Protection, Privacy & Control
Safeguard your data on endpoint devices and in Cloud
Put Your Enterprise in Charge of its Data While Respecting Your Employees' Privacy
With Circle, NOBODY other than the Data Owner has access to their data - or metadata - EVER
FAQ Categories (Buttons)
  • All
  • Circle Access Desktop (15)
  • Credential Free MFA (15)
  • Circle Access Mobile (9)
  • Circle Access (5)
  • Circle Access Lite (4)
  • Circle-of-Trust (3)
  • End-to-End Data Protection (3)
  • Enterprise Data Visibility & Control (3)
  • Data Privacy & Compliance (2)
  • Digital Trust (2)
How to Add your Email to Circle Access Desktop
Circle Access Desktop uses credential-less authentication to login to websites utilizing circle Access. To be able to use these features you must first set-up your application with information required by your provider. To add you email address, open the settings in Circle Desktop Click add next to Email addresses, and enter the email address which […]
Read more
How to Enable Biometrics in Circle Access Mobile
Biometrics allows you to use your face, or your fingerprints as your security to prevent unauthorized users from accessing your app. To enable biometrics first launch the Circle Access Mobile app and tap on Device Security. Tap Enable Device Security You will be prompted to either use your fingerprint for authentication or facial scan. After […]
Read more
Add Your Phone Number to Circle Access Mobile
Before you Start You will need to download the Circle Access on your mobile device before you can use it's features. If you haven't done so already you can download it here: For many applications you may be required to have your phone number registered to your Circle Access account. To do so launch the […]
Read more
How to Add Your Email to Circle Access Mobile
Before you Start You will need to download the Circle Access on your mobile device before you can use it's features. If you haven't done so already you can download it here: Adding your Email or many applications you may be required to have your email address registered to your Circle Access account. To do […]
Read more
How to Obtain Error Logs for Circle Tray
Issue: Error logs are required for further troubleshooting Causes: An issue is occurring that requires obtaining any error logs for troubleshooting Solution: First verify if there are any crash reports. You can do this by opening Windows Event Viewer. Expand the Windows Logs folder on the left and click applications. Navigate through the list and […]
Read more
How to Perform a Clean Uninstall of Circle Tray
Issue: A clean uninstall is required to troubleshoot an issue Causes: An issue is occurring that requires a clean uninstall Solution: To perform a clean uninstall for Circle Access Desktop first you will need to uninstall the app. Navigate to Control Panel and click Uninstall a Program Locate Circle within the list, and click Uninstall […]
Read more
Does Circle Access protect my company from MFA Bombing?
Yes. "MFA Bombing" is a new type of exploit that defeats traditional MFA that many organizations believe to be quite strong. This recent article in Ars Technica provides a good summary. Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA Not all MFA is created equal, as script kiddies and elite […]
Read more
How Is Circle Access CCFA Different than Using an X.509 Certificate for Email?
The architecture and approach of Circle Access differs from a certificates in several significant ways. There are two common use cases for X.509 certificates: securing emails and; securing authentication for access to Web server. We will focus here on securing email. Securing Email 1. X.509 certificates tie identity to an email address whereas Circle ties […]
Read more
What is the difference between Circle DLT versus Blockchain?
"Blockchain" and "Distributed Ledger Technology" (or "DLT") are too very big buzzwords today that are often misunderstood, or misused. Here is where Circle fits. A Simple Definition to Blockchain Technology Blockchain is a decentralized, distributed and often public database type where data is saved in blocks, such that the hashcode present in any block is […]
Read more
What's the relationship between Circle Access Desktop and Circle Access Mobile?
Circle Access 360 integrates: Circle Access Mobile - your smartphone is your log-in Circle Access Desktop - your device is your log-in The technical details of this are beyond the scope of this article, but we will try to summarize briefly here. Circle Access Mobile (CAM) With CAM, your smartphone is you. It accomplishes this […]
Read more