Level up your Twilio API skills in TwilioQuest, an educational game for Mac, Windows, and Linux. Download Now
Build the future of communications.
Start building for free
  • By Kelley Robinson
    How to test Twilio Verify without getting rate limited verify testing

    Twilio Verify offers built in rate limits to help protect your business and its customers from account takeover and toll fraud attacks to your verification flows. This is helpful once you're in production, but can be frustrating during development and testing.

    Unfortunately, we do not offer a free testing sandbox since we have to pay underlying carrier fees for every message sent on our platform and Twilio's test credentials are not compatible with the Verify API.

    You still need to test your project though, so this guide will cover:

    • Common issues like rate limits and expired verifications
    • Best practices for verification testing
    • How to quickly spin up a testing interface during development

    Common Verify API errors during testing

    Error 60203: Max send attempts reached

    For more details, check out the official Twilio docs for Error 60203.

    The API triggers this rate limit after starting 5 verification attempts to the …

    Read More
  • By Kelley Robinson
    3 ways to implement PSD2's strong customer authentication (SCA) requirement 3 ways to implement SCA

    The European Payment Services Directive (PSD2) regulation requires Strong Customer Authentication (SCA) when a payer:

    • Initiates an electronic payment over €30*
    • Accesses their payment account online
    • Does any other remote action "which may imply a risk of payment fraud or other abuses"

    This applies to:

    • Business and/or customers in the European Economic Area
    • Online/debit or credit card-not-present transactions

    Originally the deadline was September 2019, but that's been extended until 31 December 2020 (the SCA deadline in the UK is now 14 September 2021).

    There are three ways to use Twilio to implement SCA for transactions in your application:

    1. Verify SMS One-Time Passcodes (OTP)
    2. Push authentication
    3. Transactional TOTP

    This post will give an overview of each method and provide resources to get started.

    *exempted payments include:

    • Low risk transactions (based on provider's fraud rates)
    • Recurring payments (fixed or variable "merchant initiated")
    • Over the phone payments

    SCA requirements for card-not-present transactions

    SCA …

    Read More
  • By Kelley Robinson
    How to use the Authy API with Google Authenticator (or any compatible authenticator app) How to use the authy api with google authenticator

    TOTP, or Time-based One-time Passwords, is a way to generate short lived authentication tokens commonly used for two-factor authentication (2FA). The algorithm for TOTP is defined in RFC 6238, which means that the open standard can be implemented in a compatible way in multiple applications. You might be familiar with TOTP from apps like Authy or Google Authenticator, but there are a lot of other options including Duo and Microsoft Authenticator.

    Getting users to enable 2FA is half the battle of improving account security, so I recommend giving your customers flexibility over which authenticator app they use.

    The Authy API (connected to, but different than the Authy App) defaults to enrolling the user in the Authy App but this post will show you how to use the API in a way that lets your customers use the authenticator app of their choice.

    Did you know? TOTP is an …

    Read More
  • By Kelley Robinson
    How to add customer authentication to Twilio Flex customer authentication in flex header

    Call center security is a known weak spot for many companies. That's because most call centers only identify and do not actually authenticate users when they call.

    Identity information is usually static data like a phone number or date of birth -- things that a lot of people know about me and you. Identity information is often easy to find or purchase and probably doesn't change. With a little bit of research, hackers can use social engineering to bypass common knowledge-based "verification" based on a user's identity. Authentication is how to prove identity with a factor that could be something you know like a password, something you have like a key, or something you are like a fingerprint.

    Options for actually authenticating users contacting your support system include sending one-time passcodes (OTPs) to a user via SMS or email, callbacks, security PINs, verbal passcodes, voice recognition, and more. For more …

    Read More
  • By Kelley Robinson
    How to incentivize users to enable 2FA 2fa incentives header

    Offering two-factor authentication (2FA) doesn't help secure your customers if they don't opt in to the feature. 2FA helps protect users if the first factor, usually a password, is compromised. Compromise is common for easy to guess passwords and for reused passwords that are breached on another site. The most security conscious users may already have strong, unique passwords and may not need to be convinced to enable 2FA, so how do you convince the most vulnerable users to turn on additional security features?

    A 2019 study on 2FA usability found that only 29% of people thought the inconvenience of 2FA was always worth the security tradeoff. "I just don’t think I have anything that people would want to take from me, so I think that’s why I haven’t been very worried about it," one participant noted.

    This sentiment reflects something the security researcher Cormac Herley wrote about a decade …

    Read More
  • By Kelley Robinson
    Best practices to secure inbound calls to your contact center Best practices to secure your contact center header

    As companies firm up their website authentication with increased security like two-factor authentication, attackers are flocking to less secure channels like call centers to impersonate their victims and gain access to their accounts. Account takeover (ATO) like this is growing at a staggering rate, up 72% in 2019 according to the 2020 Javelin Identity Fraud Study, "due in large part to technological advancements that have made it easier for criminals to manipulate and socially engineer information". As businesses move more of their operations away from in-person stores in the wake of COVID-19, call center security is more important than ever.

    While ATO is possible on your website, over half of financial services companies said call centers were the primary attack channel for ATO. That's because call center agents are fallible to social engineering, a form of hacking that uses psychological manipulation to bypass security measures guarded by humans. …

    Read More
  • By Kelley Robinson
    Secure your video conference with one-time passcodes How to protect your video conference with one-time passcodes

    As we dutifully practice social distancing, live video conferencing is increasingly popular. From company meetings to yoga classes and magic shows, traditional in person events are going virtual. But while technology connects us, it also comes with privacy and security risks.

    This post will show you how to add one-time passcode authentication on top of your Twilio Video application to ensure that only registered users are able to access the conference.

    While passwords may help protect against war dialing, they don't guarantee that the people joining the video conference should be allowed to participate. A lot of people are still widely sharing Zoom meeting IDs and passwords.

    One-time passcode authentication is useful for gating:

    • Paid content like workout classes, political fundraisers, or live dating shows.
    • Sensitive content with an access control list (ACL)

    This tutorial will walk you through adding Twilio Verify SMS verification to …

    Read More
  • By Kelley Robinson
    How to build a one-time passcode protected conference line with Twilio Verify and Python Header protected conference line

    You can protect your conference call with a static passcode, and while that offers more security than nothing at all, passcodes can be guessed or leaked -- especially if they're reused over time. You can also verify the caller ID of the person calling in, but spoofing phone numbers is still easy and prevalent.

    One time passcodes (OTP) offer additional security by ensuring that a user has access to the phone and number they claim to own. By sending an OTP to the user's number or email you can have confidence the person joining your call is who they say they are.

    The code in this post will secure your conference line in two ways:

    1. Check that the person calling is a known participant
    2. Prevent anyone from spoofing a phone number in order to join the call with an OTP

    Follow the tutorial below or check out the completed …

    Read More
  • By Kelley Robinson
    Build fast checkout with SMS verification using Stripe and Twilio stripe fast checkout

    Stripe and Twilio have teamed up to build a sample application that shows you how to securely collect and store payment details from your customers and use Twilio Verify to send returning customers an authentication code before charging their saved card details.

    Demo and resources

    If you prefer to watch this tutorial, you can find a recording of how to set up the sample application on the Stripe Developers YouTube channel:

    Youtube video recording of a code walkthrough

    Running the sample on your local machine

    The sample application comes with two backend implementations one in JavaScript (Node) and one in Python (Flask). In this tutorial we outline how to set up the Node.js backend. You can find instructions for running the Python Flask server here.

    Creating the sample with the Stripe CLI

    The most convenient way to set up a Stripe …

    Read More
  • By Kelley Robinson
    How to sanitize phone numbers before sending mass alerts Sanitize phone numbers header image

    If you're planning on sending mass text notifications you'll want to make sure that the numbers you're sending to are valid. This post will quickly show how to use the Twilio Lookup API to sanitize your data, checking that:

    • Phone numbers are real
    • Phone numbers are formatted correctly
    • Phone numbers are mobile

    Validating and sanitizing phone numbers will mean fewer API errors for sending to non-existent, incorrectly formatted, or landline numbers, giving you greater confidence in your system.

    Twilio.org is offering a $500 kickstart credit and additional product discounts for apps that offer public benefits during the COVID-19 crisis. Learn more: https://ahoy.twilio.com/covid19-contact.

    Prerequisites for sanitizing phone numbers

    The Lookup API does not support bulk requests. If you anticipate a high volume of requests, please contact …

    Read More
  • Newer
    Older
    Sign up and start building
    Not ready yet? Talk to an expert.