Security that's simple,
powerful, and complete
From basic two-factor authentication to advanced identity verification—everything you need to protect what matters.
Push Authentication
Receive instant push notifications when someone tries to log in. See the location, device, and application—then approve or deny with a single tap.
- One-tap approval
- Rich context with each request
- Works on iOS and Android
- Instant delivery via FCM/APNs
TOTP Backup Codes
Industry-standard time-based one-time passwords as your reliable backup. Works offline and compatible with any authenticator app.
- 30-second rotating codes
- Works without internet
- Compatible with Google Authenticator
- QR code setup
Multi-Device Support
Register your iPhone, Android, tablet—even multiple devices. Approve authentication from whichever device is closest.
- Unlimited devices (Pro)
- Cross-platform support
- Easy device management
- Instant failover
Biometric Authentication
Use Face ID, Touch ID, or fingerprint verification tied to cryptographic server challenges. Your biometrics never leave your device.
- FIDO2/WebAuthn compliant
- Hardware-backed security
- Zero biometric data sharing
- Phishing resistant
Beyond authentication
Advanced identity features for when you need to know who's really behind the device.
Device Attestation
Cryptographically verify that authentication requests come from genuine, uncompromised devices using Apple App Attest and Google Play Integrity.
Selective Disclosure
Share only the attributes needed for verification. Prove you're over 21 without revealing your birthdate. Privacy by design.
Identity Proofing API
Let relying parties request on-demand identity verification for high-value transactions, account recovery, or compliance requirements.
Cryptographic Credentials
Verifiable credentials backed by modern cryptography. Tamper-proof, portable, and under your control.
Enterprise-grade security
Built with the same standards trusted by banks and governments.
End-to-End Encryption
All communications encrypted with TLS 1.3
Auto-Expiring Requests
60-second expiry prevents replay attacks
SHA-256 Key Hashing
API keys hashed before storage
99.99% Uptime SLA
Enterprise-grade reliability
Ready to get started?
Start protecting your accounts in under 2 minutes.