Level up your Twilio API skills in TwilioQuest, an educational game for Mac, Windows, and Linux. Download Now
Build the future of communications.
Start building for free

verify api posts

  • By Luís Leão
    Prácticas recomendadas para la validación del número de teléfono durante la inscripción de nuevos usuarios Prácticas recomendadas para la validación del número de teléfono durante la inscripción de nuevos usuarios

    Tiene un nuevo usuario. Fantástico. Twilio proporciona un conjunto de herramientas para validar y verificar rápido el número de teléfono de un usuario, perfecto para una incorporación rápida y sin problemas. Veamos algunas de las prácticas recomendadas para conseguir que un usuario se registre en el servicio y se ponga en marcha, garantizando la precisión y reduciendo las inscripciones fraudulentas.

    Esta publicación en el blog cubrirá las recomendaciones y las prácticas recomendadas para el registro de usuarios sin problemas que utilizan un número de teléfono. Hay recomendaciones similares para las cuentas de usuarios existentes que proporcionan el número de teléfono por primera vez, incluso si la cuenta de usuario ya existe.

    A la hora de inscribir a un nuevo usuario, deberá centrarse en tres áreas:

    1. Ingresar el número de teléfono, obtener el número de teléfono del usuario.
    2. Validar el número de teléfono, asegurarse de que el número de …
    Read More
  • By Luís Leão
    Práticas recomendadas para gerenciar a lógica de repetição com a 2FA por SMS Práticas recomendadas para gerenciar a lógica de repetição com a 2FA por SMS

    Seres humanos são criaturas impacientes. Embora os códigos de verificação por SMS ou autenticação de dois fatores (2FA) possam ser enviados rapidamente na maioria das partes do mundo, sempre recomendamos a criação de buffers de nova tentativa em fluxos de trabalho de verificação. Isso ajuda a evitar:

    • Enviar spam acidentalmente a um usuário com mensagens de texto repetidas
    • Atingir os limites de taxa de API
    • Fraude de tarifação ou gastos desnecessários

    Embora as práticas recomendadas neste artigo tenham sido escritas com a API de verificação da Twilio em mente, muitas se aplicam a qualquer provedor de 2FA. Combinado com outras práticas recomendadas, como a criação de uma lista de códigos de países permitidos para verificação, essas etapas podem ajudar a garantir que o fluxo de trabalho de verificação do usuário seja o mais uniforme possível.

    Iniciar um aplicativo de demonstração com as práticas recomendadas de repetição de SMS

    Este projeto …

    Read More
  • By Jesse Sumrak
    SMS Verification: What It Is, How It Works, and How to Start SMS Verification: What It Is, How It Works, and How to Start

    Passwords get stolen every day. In 2018, hackers swiped 2.5 billion accounts—that amounts to around 6.85 million stolen passwords per day and 158 per second.

    Now, don't panic. That's why we have SMS verification.

    See, while passwords are relatively easy to steal, phones aren’t. Consumers lose around 70 million smartphones every year, and only 7% recover them.

    While that number might sound alarming (because it is), it's significantly less than 2.5 billion. With SMS verification enabled, a hacker would need your username, password, and access to your phone (and they might even need a password to unlock your phone).

    That's a lot of obstacles to access your sensitive online data.

    So back to SMS verification. What is it, how does it work, and how can you offer it to your customers?

    Great questions. We have answers down below.

    What is SMS verification?

    SMS verification lets websites, apps, banks, and …

    Read More
  • By Elijah Asaolu
    Passwordless Authentication With PHP Using Twilio Verify Passwordless Authentication with PHP using Twilio Verify

    Passwordless authentication refers to an authentication method that does not require a password or any other knowledge-based secret to log a user into a system. This method of authentication adopts the means of authorizing users by sending a unique, one-time code (OTP) or magic link to the user via email, push notification, or text message.

    In this article, you'll learn how the infrastructure underlying passwordless authentication works, and create a small app that uses this authentication approach.

    How it works

    Most passwordless authentication implementations have a single entry point, i.e., a single page for both new users signing up and for existing users logging in to their accounts.

    In a typical implementation, both new and existing users are asked to enter their mobile phone number during either registration or login. After verifying the mobile number, the system checks if the user is an existing one or a new one. If …

    Read More
  • By Matthew Setter
    Authenticate Uploads to Amazon S3 in SlimPHP Using Twilio Verify Authenticate Uploads to S3 in SlimPHP Using Twilio Verify

    It's hard to get away from cloud storage in modern web application development; and with good reason!

    Infrastructure as a Service (IaaS) providers such as Amazon Web Services, Microsoft Azure, Google Cloud Platform, and Alibaba Cloud make storing data anywhere in the world almost trivial, regardless of programming language, operating system, and budget.

    Whether you're storing instrumentation data from a Raspberry Pi-based weather station, or medical records for a nation-state, cloud providers are up to the task. However, they don't do everything for you. They won’t handle tasks such as only letting valid users store legitimate files.

    So in this tutorial, you're going to learn how to use Twilio's Verify API to validate uploads to an Amazon S3 bucket in a Slim framework application which uses the Twig templating engine for the view templates.

    Tutorial Requirements

    To follow this tutorial you need the following components:

    • PHP 7.4, …
    Read More
  • By Kelley Robinson
    Best Practices für die Verwaltung von Logik für Wiederholungsversuche mit SMS 2FA Best Practices für die Verwaltung von Logik für Wiederholungsversuche mit SMS 2FA

    Hallo und Danke fürs Lesen! Dieser Blogpost ist eine Übersetzung von Best practices for managing retry logic with SMS 2FA. Während wir unsere Übersetzungsprozesse verbessern, würden wir uns über Dein Feedback an help@twilio.com freuen, solltest Du etwas bemerken, was falsch übersetzt wurde. Wir bedanken uns für hilfreiche Beiträge mit Twilio Swag :)

    Menschen sind ungeduldige Wesen. In den meisten Teilen der Welt mögen SMS-Verifizierung oder Zwei-Faktor-Authentisierung (2FA) zwar schnell Anwendung finden, doch wir empfehlen immer, Wiederholungspuffer in Verifizierungs-Workflows zu integrieren. Dadurch wird Folgendes verhindert:

    • Versehentliches Spamming eines Benutzers mit wiederholten Textnachrichten
    • Erreichen von API-Ratenbegrenzungen
    • Gebührenbetrug oder unnötige Ausgaben

    Die Best Practices in diesem Beitrag wurden zwar mit Blick auf die Twilio Verify-API verfasst, doch viele gelten unabhängig von deinem 2FA-Anbieter. In Kombination mit anderen Best Practices wie der Erstellung einer Zulassungsliste von Ländervorwahlen zur Verifizierung können diese Schritte dazu beitragen, dass dein Workflow für die Benutzerverifizierung so reibungslos wie …

    Read More
  • By Kelley Robinson
    Best practices for phone number validation during new user enrollment best practices for phone number validation during new user enrollment

    You have a new user! Great! Twilio provides a set of tools for quickly validating and verifying a user's phone number, perfect for quick and seamless onboarding. Let's look at some best practices for how to get a user registered for your service and on their way while ensuring accuracy and reducing fraudulent sign ups.

    This blog post will cover recommendations and best practices for seamless user registration that uses a phone number. Similar recommendations apply to existing user accounts that are providing their phone number for the first time, even if the user account already exists.

    You'll want to focus on three areas when enrolling a new user:

    1. Phone number input, collecting the phone number from the user.
    2. Phone number validation, ensuring the phone number is legitimate.
    3. Phone number verification, ensuring that the user has access to the phone number.

    Best practices for phone number input …

    Read More
  • By Diane Phan
    How to Allow Users to Upload Media Files to the Cloud How to Allow Users to Upload Media Files to the Cloud

    There are many factors to consider when building a public-facing website. For example, a developer would need to consider what is necessary to protect not only the users but also the project. They would need to figure out how to securely store the data - especially if the project consists of sensitive information.

    In this tutorial, you will learn how to develop a functional website to authenticate your users and protect their identity before allowing them to upload an image file to your cloud storage. After authenticating the users, the project can give users the option to upload an image file through the site and store the files in a cloud.

    The application will use two key technologies:

    Read More
  • By Kelley Robinson
    Best practices for managing retry logic with SMS 2FA best practices for managing retry logic with SMS 2FA

    Humans are impatient creatures, so while SMS verification or two-factor authentication (2FA) codes may come through quickly in most parts of the world, we always recommend building retry buffers into verification workflows. This helps prevent:

    • Accidentally spamming a user with repeated text messages
    • Hitting API rate limits
    • Toll fraud or unnecessary spend

    While the best practices in this post are written with the Twilio Verify API in mind, many apply regardless of your 2FA provider. Combined with other best practices like building an allow list of country codes to verify, these steps can help make sure your user verification workflow is as seamless as possible.

    Launch a demo application with SMS retry best practices

    This project is also available to Quick Deploy on the Twilio Code Exchange -- no code required!

    I built an application that shows off the best practices outlined in this post. The application is quick to …

    Read More
  • By Kelley Robinson
    Bonnes pratiques de nouvelle tentative A2F par SMS Bonnes pratiques de nouvelle tentative A2F par SMS

    Les êtres humains sont des créatures impatientes. Ainsi, bien que les codes de vérification SMS ou d'authentification à double facteur (A2F ou 2FA) puissent être rapidement générés dans la plupart des régions du monde, nous recommandons toujours de créer des tampons de nouvelles tentatives dans les workflows de vérification. Cela permet d'éviter :

    • Le spamming accidentel d'un utilisateur avec des messages texte répétés
    • L'atteinte des limites de taux d'API
    • La fraude à la tarification ou les dépenses inutiles

    Les bonnes pratiques de ce post sont rédigées pour l'API Twilio Verify, mais beaucoup d'entre elles s'appliquent indépendamment de votre fournisseur d'A2F. Associées à d'autres bonnes pratiques, comme la création d'une liste d'autorisation des codes de pays à vérifier, ces étapes peuvent vous aider à garantir que votre workflow de vérification utilisateur est aussi fluide que possible.

    Lancer une application de démonstration avec les bonnes pratiques de nouvelle tentative par …

    Read More
  • Newer
    Older
    Sign up and start building
    Not ready yet? Talk to an expert.