Build the future of communications.
Start Building for Free

verify api posts

  • By Kelley Robinson
    What is Silent Network Authentication? What is Silent Network Authentication?

    Silent Network Authentication (SNA) is a form of secure consumer authentication to protect end-users, accounts, and transactions without requiring users to wait or leave your app. It uses direct carrier connections to verify possession of a phone number in the background without requiring user input. There are neither 6 digit passcodes nor authenticator app downloads, which also means there is nothing for a fraudster to phish. Because of this, SNA is immune to social engineering while continuing to be a user friendly solution.

    Silent Network Authentication is built on top of the same system that carriers use to authenticate mobile phone calls and data sessions on the network so your business has a high level of assurance for each verified phone number.

    The underlying authentication system is standardized and well trusted but extending this type of authentication to businesses via an API like Verify's Silent Network Authentication channel is relatively …

    Read More
  • By Prosper Ugbovo
    Send One Time Passwords Over Voice Calls in PHP Using Twilio Verify Send One Time Passwords Over Voice Calls in PHP Using Twilio Verify.

    In recent years, user authentication in web applications has become a serious concern. For example, one-time passwords (OTP) are utilized to verify a user's identity; the most frequent method for sending OTPs is via SMS to the user's registered cellphone number.

    In this tutorial you will learn how to send one-time passwords to users over voice calls in PHP using Twilio's Verify Api. In doing so, you will create an OTP system that can be used as an additional security layer for specific operations in your application.

    Prerequisites

    To follow this tutorial, you need the following:

    Application Process

    Here's …

    Read More
  • By Kelley Robinson
    How to do phone verification in Twilio Studio Blog header: How to do phone verification in Twilio Studio

    If you operate a contact center that allows users to access sensitive account information or make payments or changes to the account, you'll want to have a strategy for verifying those users' identities. Twilio's Verify API makes it easy to send one-time passcodes for phone verification or two-factor authentication (2FA) to a variety of channels including email, SMS, and WhatsApp.

    Twilio Studio is a great tool for building complex low-code workflows including IVRs and contact centers. Studio is also extremely extendable and powerful. Studio Subflows are a great way to create reusable snippets of functionality. This blog post will show you how to create a Studio Subflow for sending an SMS one-time passcode (OTP) that can be used for phone verification or 2FA.

    puzzle piece illustration to show the idea of pieces connecting in the same way twilio studio connects pieces

    Prerequisites for building a Verify subflow in Studio

    To follow along with this tutorial you'll need the following:

    1. A Twilio account - sign up or sign in …
    Read More
  • By Kelley Robinson
    Buenas prácticas para administrar la lógica de reintentos con SMS o 2FA Copy of C04 Blog Text (4).png

    Los seres humanos son criaturas impacientes, por lo que, aunque la verificación por SMS o los códigos de autenticación de dos factores (2FA) pueden llegar rápidamente en la mayoría de las partes del mundo, siempre recomendamos crear topes de reintento en los flujos de trabajo de verificación. Esto ayuda a prevenir lo siguiente:

    • Enviar mensajes de texto repetidos accidentalmente a un usuario
    • Superar los límites de tasa de API
    • Fraude telefónico o gastos innecesarios

    Si bien las prácticas recomendadas de esta publicación están escritas con la API de Twilio Verify en mente, muchas se aplican independientemente de su proveedor de 2FA. Junto con otras prácticas recomendadas, como la creación de una lista de códigos de país para realizar la verificación, estos pasos pueden ayudar a garantizar que su flujo de trabajo de verificación de usuario sea lo más fluido posible.

    Read More
  • By Luís Leão
    Prácticas recomendadas para la validación del número de teléfono durante la inscripción de nuevos usuarios Prácticas recomendadas para la validación del número de teléfono durante la inscripción de nuevos usuarios

    Tiene un nuevo usuario. Fantástico. Twilio proporciona un conjunto de herramientas para validar y verificar rápido el número de teléfono de un usuario, perfecto para una incorporación rápida y sin problemas. Veamos algunas de las prácticas recomendadas para conseguir que un usuario se registre en el servicio y se ponga en marcha, garantizando la precisión y reduciendo las inscripciones fraudulentas.

    Esta publicación en el blog cubrirá las recomendaciones y las prácticas recomendadas para el registro de usuarios sin problemas que utilizan un número de teléfono. Hay recomendaciones similares para las cuentas de usuarios existentes que proporcionan el número de teléfono por primera vez, incluso si la cuenta de usuario ya existe.

    A la hora de inscribir a un nuevo usuario, deberá centrarse en tres áreas:

    1. Ingresar el número de teléfono, obtener el número de teléfono del usuario.
    2. Validar el número de teléfono, asegurarse de que el número de …
    Read More
  • By Luís Leão
    Práticas recomendadas para gerenciar a lógica de repetição com a 2FA por SMS Práticas recomendadas para gerenciar a lógica de repetição com a 2FA por SMS

    Seres humanos são criaturas impacientes. Embora os códigos de verificação por SMS ou autenticação de dois fatores (2FA) possam ser enviados rapidamente na maioria das partes do mundo, sempre recomendamos a criação de buffers de nova tentativa em fluxos de trabalho de verificação. Isso ajuda a evitar:

    • Enviar spam acidentalmente a um usuário com mensagens de texto repetidas
    • Atingir os limites de taxa de API
    • Fraude de tarifação ou gastos desnecessários

    Embora as práticas recomendadas neste artigo tenham sido escritas com a API de verificação da Twilio em mente, muitas se aplicam a qualquer provedor de 2FA. Combinado com outras práticas recomendadas, como a criação de uma lista de códigos de países permitidos para verificação, essas etapas podem ajudar a garantir que o fluxo de trabalho de verificação do usuário seja o mais uniforme possível.

    Iniciar um aplicativo de demonstração com as práticas recomendadas de repetição de SMS

    Este projeto …

    Read More
  • By Jesse Sumrak
    SMS Verification: What It Is & How It Works SMS Verification: What It Is & How It Works

    Passwords get stolen every day. In 2018, hackers swiped 2.5 billion accounts—that amounts to around 6.85 million stolen passwords per day and 158 per second.

    Now don't panic. That's why we have SMS verification.

    See, while passwords are relatively easy to steal, phones aren’t. Consumers lose around 70 million smartphones every year, and only 7% recover them.

    While that number might sound alarming (because it is), it's significantly less than 2.5 billion. With SMS verification enabled, a hacker would need your username, password, and access to your phone (and they might even need a password to unlock your phone).

    That's a lot of obstacles to access your sensitive online data.

    So back to SMS verification. What is it, how does it work, and how can you offer it to your customers?

    Great questions. We have answers down below.

    What is SMS verification?

    SMS verification lets websites, apps, banks, and …

    Read More
  • By Elijah Asaolu
    Passwordless Authentication With PHP Using Twilio Verify Passwordless Authentication with PHP using Twilio Verify

    Passwordless authentication refers to an authentication method that does not require a password or any other knowledge-based secret to log a user into a system. This method of authentication adopts the means of authorizing users by sending a unique, one-time code (OTP) or magic link to the user via email, push notification, or text message.

    In this article, you'll learn how the infrastructure underlying passwordless authentication works, and create a small app that uses this authentication approach.

    How it works

    Most passwordless authentication implementations have a single entry point, i.e., a single page for both new users signing up and for existing users logging in to their accounts.

    In a typical implementation, both new and existing users are asked to enter their mobile phone number during either registration or login. After verifying the mobile number, the system checks if the user is an existing one or a new one. If …

    Read More
  • By Matthew Setter
    Authenticate Uploads to Amazon S3 in SlimPHP Using Twilio Verify Authenticate Uploads to S3 in SlimPHP Using Twilio Verify

    It's hard to get away from cloud storage in modern web application development; and with good reason!

    Infrastructure as a Service (IaaS) providers such as Amazon Web Services, Microsoft Azure, Google Cloud Platform, and Alibaba Cloud make storing data anywhere in the world almost trivial, regardless of programming language, operating system, and budget.

    Whether you're storing instrumentation data from a Raspberry Pi-based weather station, or medical records for a nation-state, cloud providers are up to the task. However, they don't do everything for you. They won’t handle tasks such as only letting valid users store legitimate files.

    So in this tutorial, you're going to learn how to use Twilio's Verify API to validate uploads to an Amazon S3 bucket in a Slim framework application which uses the Twig templating engine for the view templates.

    Tutorial Requirements

    To follow this tutorial you need the following components:

    • PHP 7.4, …
    Read More
  • By Kelley Robinson
    Best Practices für die Verwaltung von Logik für Wiederholungsversuche mit SMS 2FA Best Practices für die Verwaltung von Logik für Wiederholungsversuche mit SMS 2FA

    Hallo und Danke fürs Lesen! Dieser Blogpost ist eine Übersetzung von Best practices for managing retry logic with SMS 2FA. Während wir unsere Übersetzungsprozesse verbessern, würden wir uns über Dein Feedback an help@twilio.com freuen, solltest Du etwas bemerken, was falsch übersetzt wurde. Wir bedanken uns für hilfreiche Beiträge mit Twilio Swag :)

    Menschen sind ungeduldige Wesen. In den meisten Teilen der Welt mögen SMS-Verifizierung oder Zwei-Faktor-Authentisierung (2FA) zwar schnell Anwendung finden, doch wir empfehlen immer, Wiederholungspuffer in Verifizierungs-Workflows zu integrieren. Dadurch wird Folgendes verhindert:

    • Versehentliches Spamming eines Benutzers mit wiederholten Textnachrichten
    • Erreichen von API-Ratenbegrenzungen
    • Gebührenbetrug oder unnötige Ausgaben

    Die Best Practices in diesem Beitrag wurden zwar mit Blick auf die Twilio Verify-API verfasst, doch viele gelten unabhängig von deinem 2FA-Anbieter. In Kombination mit anderen Best Practices wie der Erstellung einer Zulassungsliste von Ländervorwahlen zur Verifizierung können diese Schritte dazu beitragen, dass dein Workflow für die Benutzerverifizierung so reibungslos wie …

    Read More
  • Newer
    Older
    Sign up and start building
    Not ready yet? Talk to an expert.