Push Authentication

Receive instant push notifications when someone tries to log in. See the location, device, and application—then approve or deny with a single tap.

  • One-tap approval
  • Rich context with each request
  • Works on iOS and Android
  • Instant delivery via FCM/APNs

TOTP Backup Codes

Industry-standard time-based one-time passwords as your reliable backup. Works offline and compatible with any authenticator app.

  • 30-second rotating codes
  • Works without internet
  • Compatible with Google Authenticator
  • QR code setup

Multi-Device Support

Register your iPhone, Android, tablet—even multiple devices. Approve authentication from whichever device is closest.

  • Unlimited devices (Pro)
  • Cross-platform support
  • Easy device management
  • Instant failover

Biometric Authentication

Use Face ID, Touch ID, or fingerprint verification tied to cryptographic server challenges. Your biometrics never leave your device.

  • FIDO2/WebAuthn compliant
  • Hardware-backed security
  • Zero biometric data sharing
  • Phishing resistant
Identity Verification

Beyond authentication

Advanced identity features for when you need to know who's really behind the device.

Hardware Security

Device Attestation

Cryptographically verify that authentication requests come from genuine, uncompromised devices using Apple App Attest and Google Play Integrity.

Zero-Knowledge

Selective Disclosure

Share only the attributes needed for verification. Prove you're over 21 without revealing your birthdate. Privacy by design.

REST API

Identity Proofing API

Let relying parties request on-demand identity verification for high-value transactions, account recovery, or compliance requirements.

W3C Standard

Cryptographic Credentials

Verifiable credentials backed by modern cryptography. Tamper-proof, portable, and under your control.

Enterprise-grade security

Built with the same standards trusted by banks and governments.

End-to-End Encryption

All communications encrypted with TLS 1.3

Auto-Expiring Requests

60-second expiry prevents replay attacks

SHA-256 Key Hashing

API keys hashed before storage

99.99% Uptime SLA

Enterprise-grade reliability

Ready to get started?

Start protecting your accounts in under 2 minutes.