Many organisations in the banking sector are still using RSA SecurID with hardware tokens for multi factor authentication (MFA). However, employees might forget their hardware token thus won’t be able to login. This leads to high support costs, poor user experience and reduced productivity. This is the exact challenge that one of our customers in banking is trying to address. So we worked together to explore how Twilio Verify Service can be leveraged as an alternative MFA. This will allow their employees to login their protected systems by using a One-Time Password (OTP) delivered to their employee’s mobile phone.
How does Twilio Verify work with RSA SecurID?
We use Twilio Functions as a proxy between RSA Authentication Manager and Twilio Verify service because RSA Authentication Manager’s HTTP-Plugin does not support HTTP(s) basic authentication, while Twilio Verify REST API requires basic authentication.
What you will need to code along with this post:
- Twilio Account
- Twilio Verify service that you will create in Twilio Console
- Twilio Function that you will create in Twilio Console
- RSA SecurID and Administrator access to RSA Authentication Manager
Login to the Twilio Console either as an account owner or an account administrator. You can create a Twilio account for free.
Setting up the Twilio Verify Service
Go to Verify in the console and create a new Verify service.
Setting up the Twilio Function
Go to Twilio Functions and click Create a Function button. From the pop-up window, select Blank and click the Create button
Give the function a name, in this example, we name it as “RSA Verify”. Update the PATH with a long random string so that it is not easily guessable. Please note down the full URL including the path that you created.
To protect your Twilio Function from being abused, make sure to create a long random string for the path and keep the full path (
https://xxx-xxx.twil.io/YOUR_LONG_RANDOM_STRING) safe. Do not publish it on the Internet.
Make sure you untick the Check for valid Twilio signature which allows applications other than Twilio to make requests to your function. Next, copy the code from my GitHub project and replace everything in the CODE area.
The function will take two parameters as input: the Verify Service SID (
verify_sid) and a shared secret (
api_secret), which is a long random password shared between the function and RSA security manager. Parameters are passed in via https post in request body.
Next, we need to setup two environment variables and also update dependencies. Click Configure in the left navigation.
On the Configuration page, please tick the Enable ACCOUND_SID and AUTH_TOKEN checkbox. Press the plus icon under Environment Variables and type a new variable name called API_SECRET. Please generate a long complex password for the Value of API_SECRET.
To prevent toll fraud on your account, please use strong complex password for API_SECRET and keep it safe. This is the shared secret between your RSA Authentication Manager and your Twilio function.
Repeat the process to create another environment variable called VERIFY_SID and update the value with the value of your Verify Service SID (
VAXXX...) that you created in the previous step.
Last, update Twilio version under the Dependencies to 3.36.0 or higher. Don’t forget to press the Save button to save the changes you made.
Everything in Twilio is now setup, let us head over to RSA Authentication Manager.
Configuring RSA Authentication Manager
Go to SMS configuration tab on the On-Demand Tokencode Delivery page as shown below.
Under Tokencode Delivery by SMS section
- Tick the Enable the delivery of On-Demand Tokencodes using SMS service checkbox
- Select user’s mobile number attribute from the dropdown menu of User Attribute to Provide SMS Destination. This is the mobile number to which the SMS OTP will be sent.
- Select the Default country code from the drop-down menu (Optional)
- Select HTTP from the SMS plug-in drop-down menu
Under SMS Provider Configuration section:
Copy the full path of your RSA Verify Twilio Function (
https://xxx-xxx.twil.io/YOUR_LONG_RANDOM_STRING) to the Base URL field
Download the certificate (see note) from your Twilio function, use the full URL of your function without the path (
https://xxx-xxx.twil.io/) and import the certificate by clicking Import Certificate.
Note: The easiest way to download the certificate is to point your web browser (e.g. Safari on MacOS) to your Twilio function (https://xxx-xxx.twil.io/) and save the certificate to your local disk.
Next, select POST from the HTTP Method drop-down menu and copy the following string into the Parameters field
- Enter the Service SID value (
VAXXX...) for Account User Name
- Enter the value of API_SECRET for Account Password
- Copy the word
pendinginto the Success Response Code field
- Copy the following line into the Response Format field (note there is a leading period)
Please also configure SMS HTTP Proxy Configuration if HTTP proxy is used. Please speak to your network administrator for proxy detail. Leave it empty if HTTP proxy is not used in your network.
Do not forget to Click Update to save the SMS configuration.
To test your configuration, under Test SMS Provider Integration:
- In the Mobile phone number to test fields, select a country code, and enter the number for a mobile phone that receives the test message and the OTP.
- Click Send Test Text Message.
The system saves all of your changes before the test is conducted. If the connection is unsuccessful, you see an error message.
Using Twilio Verify and RSA SecurID together
As you can see from this example, Twilio Verify service is very easy to use. Twilio Functions offer a lot of flexibility. It glues the two services (RSA Authentication Manager and Twilio Verify service) with just a few lines of codes so the services can interact with each other. If you have any questions, please leave a comment below or reach me on my GitHub.
Dr Mingchao Ma has more than 15 years’ experience in Cybersecurity. In the account security team at Twilio he helps customers build solutions using Twilio Cloud security APIs. He previously worked at Microsoft UK helping financial sector customers adopt Microsoft Cloud security technologies. Before this he was a lead security architect at IBM UK. Mingchao has a PhD in information security, and cybersecurity certifications such as CISSP-ISSAP, CISM, SABSA etc. He is a Microsoft Certified Azure Solutions Architect Expert, Microsoft 365 Certified Enterprise Administrator Expert and Microsoft Certified Azure DevOps Engineer Expert.