Item logo image for KERI Auth

KERI Auth

keriauth.com
5.0(

1 rating

)
Item media 2 (screenshot) for KERI Auth
Item media 1 (screenshot) for KERI Auth
Item media 2 (screenshot) for KERI Auth
Item media 1 (screenshot) for KERI Auth
Item media 1 (screenshot) for KERI Auth
Item media 2 (screenshot) for KERI Auth

Overview

Authenticate with websites using the decentralized trust of KERI and ACDC, plus centralized roots of trust including GLEIF vLEIs.

KERI Auth enables you to authenticate and authorize yourself with websites requiring the strong security and authenticity guarantees based on KERI decentralized key management and identifiers, ACDC verifiable credentials, and GLEIF vLEI ecosystem's anchors of trust. Websites need to support the polaris-web interfaces. Users will first need to arrange to use a KERI Agent Service (KERIA), a cloud agent. For more information, see https://github.com/webOfTrust/polaris-web, https://github.com/webOfTrust/keria, and https://keriauth.com/.

5 out of 51 rating

Google doesn't verify reviews. Learn more about results and reviews.

Details

  • Version
    0.2.8 8c107bc 2025-01-29
  • Updated
    January 31, 2025
  • Size
    15.4MiB
  • Languages
    English
  • Developer
    LivelyGig LLC
    17517 NE 142nd St Redmond, WA 98052-1236 US
    Website
    Email
    ed@livelygig.com
    Phone
    +1 425-298-7012
  • Trader
    This developer has identified itself as a trader per the definition from the European Union and committed to only offer products or services that comply with EU laws.
  • D-U-N-S
    098178674

Privacy

KERI Auth has disclosed the following information regarding the collection and usage of your data. More detailed information can be found in the developer's privacy policy.

KERI Auth handles the following:

Authentication information

This developer declares that your data is

  • Not being sold to third parties, outside of the approved use cases
  • Not being used or transferred for purposes that are unrelated to the item's core functionality
  • Not being used or transferred to determine creditworthiness or for lending purposes

Related

Keyring Connect

5.0(4)

Extract your verified data from any website using zero-knowledge proofs to protect your privacy.

CC Generator

5.0(2)

Use CC Generator: Fast, secure fake cc gen tool for developers. Create fake credit card number instantly for safe online testing.

Authenticator App

4.1(11)

Use authenticator app as your best 2 factor authentication tool. Generate two factor authentication codes in browser.

eckoWALLET

3.7(57)

The best web extension wallet for the Kadena blockchain.

ІІТ Користувач ЦСК-1. Бібл. підп. (web-р.)

1.5(220)

Бібліотека підпису призначена для управління особистими ключами та сертифікатами, а також формування ЕП та шифрування даних

Anti-CORS, anti-CSP

5.0(5)

Enable cross origin requests blocked by CORS or CSP. Disable CORS and CSP in selected hostnames, preserve security of other websites

NLToken

1.0(13)

NLToken supports the creation of the CSR required to apply for a certificate and the management of online electronic signatures.

TrustedSite

4.5(101)

See which sites you can trust.

Cato Chrome Extension

5.0(8)

Cato Networks Chrome Extension

Web2FA - Authenticator

3.6(5)

Add 2FA security to your accounts and generate codes in Chrome with Web2FA Authenticator

Content Security Policy (CSP) Generator

4.4(14)

Automatically generate content security policy headers online for any website.

zkVC

0.0(0)

Built by PolyFlow to access a user's KYC information using zero knowledge proofs without disclosing any user privacy data.

Keyring Connect

5.0(4)

Extract your verified data from any website using zero-knowledge proofs to protect your privacy.

CC Generator

5.0(2)

Use CC Generator: Fast, secure fake cc gen tool for developers. Create fake credit card number instantly for safe online testing.

Authenticator App

4.1(11)

Use authenticator app as your best 2 factor authentication tool. Generate two factor authentication codes in browser.

eckoWALLET

3.7(57)

The best web extension wallet for the Kadena blockchain.

ІІТ Користувач ЦСК-1. Бібл. підп. (web-р.)

1.5(220)

Бібліотека підпису призначена для управління особистими ключами та сертифікатами, а також формування ЕП та шифрування даних

Anti-CORS, anti-CSP

5.0(5)

Enable cross origin requests blocked by CORS or CSP. Disable CORS and CSP in selected hostnames, preserve security of other websites

NLToken

1.0(13)

NLToken supports the creation of the CSR required to apply for a certificate and the management of online electronic signatures.

TrustedSite

4.5(101)

See which sites you can trust.

Google apps