Item logo image for KERI Auth

KERI Auth

keriauth.com
5.0(

1 rating

)
Item media 1 (screenshot) for KERI Auth

Overview

Authenticate with websites using the decentralized trust of KERI and ACDC, plus centralized roots of trust including GLEIF vLEIs.

KERI Auth enables you to authenticate and authorize yourself with websites requiring the strong security and authenticity guarantees based on KERI decentralized key management and identifiers, ACDC verifiable credentials, and GLEIF vLEI ecosystem's anchors of trust. Websites need to support the polaris-web interfaces. Users will first need to arrange to use a KERI Agent Service (KERIA), a cloud agent. For more information, see https://github.com/webOfTrust/polaris-web, https://github.com/webOfTrust/keria, and https://keriauth.com/.

Details

  • Version
    0.2.8 8c107bc 2025-01-29
  • Updated
    January 31, 2025
  • Size
    15.4MiB
  • Languages
    English
  • Developer
    LivelyGig LLC
    17517 NE 142nd St Redmond, WA 98052-1236 US
    Website
    Email
    ed@livelygig.com
    Phone
    +1 425-298-7012
  • Trader
    This developer has identified itself as a trader per the definition from the European Union and committed to only offer products or services that comply with EU laws.
  • D-U-N-S
    098178674

Privacy

KERI Auth has disclosed the following information regarding the collection and usage of your data. More detailed information can be found in the developer's privacy policy.

KERI Auth handles the following:

Authentication information

This developer declares that your data is

  • Not being sold to third parties, outside of the approved use cases
  • Not being used or transferred for purposes that are unrelated to the item's core functionality
  • Not being used or transferred to determine creditworthiness or for lending purposes

Related

Website Safety Checker

5.0

Use website safety checker to automatically run safety checks on any website to ensure its legitimacy. Stay safe while browsing!

Pleasant Password Server Auto-Filler

3.4

Access & fill site passwords with Pleasant Password Server

2FA Authenticator Guard

4.0

Free 2FA on Browser! Multi-layered encryption secures data. Replaces Google Authenticator, no phone needed. Ultimate security focus.

Keyring Connect

5.0

Extract your verified data from any website using zero-knowledge proofs to protect your privacy.

Authenticator app

3.0

Authenticator app for two factor authentication. Scan authenticator QR codes & generate 2FA codes directly in Google Chrome browser.

ІІТ Користувач ЦСК-1. Бібл. підп. (web-р.)

1.6

Бібліотека підпису призначена для управління особистими ключами та сертифікатами, а також формування ЕП та шифрування даних

Anti-CORS, anti-CSP

4.6

Enable cross origin requests blocked by CORS or CSP. Disable CORS and CSP in selected hostnames, preserve security of other websites

NLToken

1.0

NLToken supports the creation of the CSR required to apply for a certificate and the management of online electronic signatures.

Cato Chrome Extension

5.0

Cato Networks Chrome Extension

Web2FA - Authenticator

3.1

Add 2FA security to your accounts and generate codes in Chrome with Web2FA Authenticator

Force HTTPS - Browse Securely, Everywhere

0.0

Automatically redirects to the secure HTTPS version of websites.

CORS Unblock

5.0

Web apps cross-origin access with precise domain control and simple permissions.

Website Safety Checker

5.0

Use website safety checker to automatically run safety checks on any website to ensure its legitimacy. Stay safe while browsing!

Pleasant Password Server Auto-Filler

3.4

Access & fill site passwords with Pleasant Password Server

2FA Authenticator Guard

4.0

Free 2FA on Browser! Multi-layered encryption secures data. Replaces Google Authenticator, no phone needed. Ultimate security focus.

Keyring Connect

5.0

Extract your verified data from any website using zero-knowledge proofs to protect your privacy.

Authenticator app

3.0

Authenticator app for two factor authentication. Scan authenticator QR codes & generate 2FA codes directly in Google Chrome browser.

ІІТ Користувач ЦСК-1. Бібл. підп. (web-р.)

1.6

Бібліотека підпису призначена для управління особистими ключами та сертифікатами, а також формування ЕП та шифрування даних

Anti-CORS, anti-CSP

4.6

Enable cross origin requests blocked by CORS or CSP. Disable CORS and CSP in selected hostnames, preserve security of other websites

NLToken

1.0

NLToken supports the creation of the CSR required to apply for a certificate and the management of online electronic signatures.

Google apps