Welcome to the MIRACL Trust developer documentation (please note that our Single Sign On (SSO), ADFS and RADIUS/OTP documentation is found here).MIRACL Trust is a user authentication service which completely replaces the typical password-based authentication which is normally used when accessing online services, so removes your largest cyber-security risk, and streamlines your user experience to increase customer satisfaction.
Once your website/application is configured, when your users click to login they are presented with our simple PIN interface (the 'M-Pad') to register and authenticate themselves:
Here you will find all you need to integrate the MIRACL Trust secure login system into your own website/application and deliver the highest level of security for users logging in to your services.
To gain a full understanding of how our basic authentication works it is recommended that you read through the introductory explanations given in 'Register / Create a new app' (explains how to register and obtain keys for a new service/app in the administration portal), 'Authorization Flow Explained' and 'Intro to the Login Button'.
You can then learn:
In Web SDK instructions, how to use any of our basic web SDKs (based on the OpenID Connect authentication protocol). This section expands on the 'Authorization Flow Explained' page and appropriates it to the language of each SDK. Here you will find the basic SDK installation process with sample apps for each SDK, and a breakdown of the code involved in creating apps.
In Mobile SDK instructions, how to make a custom app which can be used as a mobile PIN pad for logging into websites (as an alternative to our own MIRACL Trust authenticator app found in the app stores), or a self-contained app which logs in to itself.
Back in Web SDK instructions, how to use our web SDKs to make use of our Pluggable Verification feature. PV can be used to add an extra layer of security by allowing use of other factors to verify a user for their one-off initial registration (activation codes, account numbers, scanned id documents, etc. can be used instead of a standard ‘click on an email verification link’). Currently only the .NET and .NET Core (documentation coming soon) SDKs support this.
Again, please note that our Single Sign On (SSO), ADFS and RADIUS/OTP documentation is found here
Developer note: For developers wishing to implement their own OIDC code without the assistance of our SDKs, the issuerURL is
Finally, there is an Admin Portal Guide, which gives instructions on how to make use of the MIRACL Trust authentication portal dashboard to manage your apps, as well as access statistical overviews and reports.Top