Java Servlets Quickstart for Twilio Authy Two-factor - Twilio
Register for SIGNAL by 8/31 for $250 off. Register now.

Java Servlets Quickstart for Twilio Authy Two-factor Authentication

Adding two-factor authentication is an excellent way to reduce frause and increase trust from your users. This quickstart guides you through building a Java Servlets and AngularJS application that restricts access to a URL. Four Authy API channels are demoed: SMS, Voice, Soft Tokens and Push Notifications.

Ready to protect a toy app from malicious hackers? Dive in!

Sign Into (or Sign Up For) a Twilio Account

Create a new Twilio account (you can sign up for a free Twilio trial), or sign into an existing Twilio account.

Create a New Authy Application

Once logged in, visit the Authy Console. Click on the red 'Create New Aplication' (or big red plus ('+') if you already created one) to create a new Authy application then name it something memorable.

Authy create new application

You'll automatically be transported to the Settings page next. Click the eyeball icon to reveal your Production API Key.

Account Security API Key

Copy your Production API Key to a safe place, you will use it during application setup.

Setup the Authy Client on Your Device

This Two-factor Authentication demos two channels which require an installed Authy Client to test: Soft Tokens and Push Authentication. While SMS and Voice channels will work without the client, to try out all four authentication channels download and install Authy Client for Desktop or Mobile:

Clone and Setup the Application

Clone our Java repository locally, then enter the directory. Install all of the necessary node modules:

gradle build

Next, open the file .env.example. There, edit the ACCOUNT_SECURITY_API_KEY, pasting in the API Key from the above step (in the console), and save the file as .env before sourcing it.

In Windows, set the ACCOUNT_SECURITY_API_KEY variable manually.

Enter the API Key from the Account Security console and optionally change the port.
Add Your Application API Key

Enter the API Key from the Account Security console and optionally change the port.

 Once you have added your API Key, you are ready to run! Launch the app with:

gradle appRun

You should get a message your new app is running!

Try the Java Authy Demo

With your phone (optionally with the Authy client installed) nearby, open a new browser tab and navigate to http://localhost:8080/register/index.html

Enter your information and invent a password, then hit 'Register'. Your information is passed to Twilio (you will be able to see your user immediately in the console), and the application is returned a user_id.

Now visit http://localhost:8080/login/index.html and login. You'll be presented with a happy screen:

Token Verification Page

If your phone has the Authy Client installed, you can immediately enter a Soft Token from the client to Verify. Additionally, you can try a Push Notification simply by pushing the labeled button.

If you do not have the Authy Client installed, the SMS and Voice channels will also work in providing a token. To try different channels, you can logout to start the process again.

Loading Code Samples...
Language
package com.twilio.accountsecurity.services;

import com.authy.AuthyApiClient;
import com.authy.OneTouchException;
import com.authy.api.ApprovalRequestParams;
import com.authy.api.Hash;
import com.authy.api.OneTouchResponse;
import com.authy.api.Token;
import com.twilio.accountsecurity.exceptions.TokenVerificationException;
import com.twilio.accountsecurity.models.UserModel;
import com.twilio.accountsecurity.repository.UserRepository;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import static com.twilio.accountsecurity.config.Settings.authyId;

public class TokenService {

    private static final Logger LOGGER = LoggerFactory.getLogger(TokenService.class);

    private AuthyApiClient authyClient;
    private UserRepository userRepository;

    public TokenService(AuthyApiClient authyClient, UserRepository userRepository) {
        this.authyClient = authyClient;
        this.userRepository = userRepository;
    }

    public TokenService() {
        this.authyClient = new AuthyApiClient(authyId());
        this.userRepository = new UserRepository();
    }

    public void sendSmsToken(String username) {
        Hash hash = authyClient
                .getUsers()
                .requestSms(getUserAuthyId(username));

        if(!hash.isOk()) {
            logAndThrow("Problem sending token over SMS");
        }
    }

    public void sendVoiceToken(String username) {
        UserModel user = userRepository.findByUsername(username);

        Hash hash = authyClient.getUsers().requestCall(user.getAuthyId());
        if(!hash.isOk()) {
            logAndThrow("Problem sending the token on a call");
        }
    }

    public String sendOneTouchToken(String username) {
        UserModel user = userRepository.findByUsername(username);

        try {
            ApprovalRequestParams params = new ApprovalRequestParams
                    .Builder(user.getAuthyId(), "Login requested for Account Security account.")
                    .setSecondsToExpire(120L)
                    .addDetail("Authy ID", user.getAuthyId().toString())
                    .addDetail("Username", user.getUsername())
                    .addDetail("Location", "San Francisco, CA")
                    .addDetail("Reason", "Demo by Account Security")
                    .build();
            OneTouchResponse response = authyClient
                    .getOneTouch()
                    .sendApprovalRequest(params);

            if(!response.isSuccess()) {
                logAndThrow("Problem sending the token with OneTouch");
            }
            return response.getApprovalRequest().getUUID();
        } catch (OneTouchException e) {
            logAndThrow("Problem sending the token with OneTouch: " + e.getMessage());
        }
        return null;
    }

    public void verify(String username, String token) {
        Token verificationResult = authyClient
                .getTokens()
                .verify(getUserAuthyId(username), token);

        if(!verificationResult.isOk()) {
            logAndThrow("Token verification failed");
        }
    }

    public String retrieveOneTouchStatus(String uuid) {
        try {
            return authyClient
                    .getOneTouch()
                    .getApprovalRequestStatus(uuid)
                    .getApprovalRequest()
                    .getStatus();
        } catch (OneTouchException e) {
            logAndThrow(e.getMessage());
            return "";
        }
    }

    private void logAndThrow(String message) {
        LOGGER.warn(message);
        throw new TokenVerificationException(message);
    }

    private Integer getUserAuthyId(String username) {
        UserModel user = userRepository.findByUsername(username);
        return user.getAuthyId();
    }
}
Two-Factor Authentication Channels

And there you go, Authy Two-factor Authentication is on and your Java app is protected!

What's Next?

Now that you are keeping the hackers out of this demo app using Twilio Authy Two-factor Authentication, you can find all of the detailed descriptions for options and API calls in our Two-factor Authentication API Reference. If you're also building a registration flow, also check out our Phone Verification product and the Verification Quickstart which uses this codebase.

For additional guides and tutorials on account security and other products, in Node.js and in our other languages, take a look at the Docs.

 

Need some help?

We all do sometimes; code is hard. Get help now from our support team, or lean on the wisdom of the crowd browsing the Twilio tag on Stack Overflow.

Loading Code Samples...
package com.twilio.accountsecurity.services;

import com.authy.AuthyApiClient;
import com.authy.OneTouchException;
import com.authy.api.ApprovalRequestParams;
import com.authy.api.Hash;
import com.authy.api.OneTouchResponse;
import com.authy.api.Token;
import com.twilio.accountsecurity.exceptions.TokenVerificationException;
import com.twilio.accountsecurity.models.UserModel;
import com.twilio.accountsecurity.repository.UserRepository;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import static com.twilio.accountsecurity.config.Settings.authyId;

public class TokenService {

    private static final Logger LOGGER = LoggerFactory.getLogger(TokenService.class);

    private AuthyApiClient authyClient;
    private UserRepository userRepository;

    public TokenService(AuthyApiClient authyClient, UserRepository userRepository) {
        this.authyClient = authyClient;
        this.userRepository = userRepository;
    }

    public TokenService() {
        this.authyClient = new AuthyApiClient(authyId());
        this.userRepository = new UserRepository();
    }

    public void sendSmsToken(String username) {
        Hash hash = authyClient
                .getUsers()
                .requestSms(getUserAuthyId(username));

        if(!hash.isOk()) {
            logAndThrow("Problem sending token over SMS");
        }
    }

    public void sendVoiceToken(String username) {
        UserModel user = userRepository.findByUsername(username);

        Hash hash = authyClient.getUsers().requestCall(user.getAuthyId());
        if(!hash.isOk()) {
            logAndThrow("Problem sending the token on a call");
        }
    }

    public String sendOneTouchToken(String username) {
        UserModel user = userRepository.findByUsername(username);

        try {
            ApprovalRequestParams params = new ApprovalRequestParams
                    .Builder(user.getAuthyId(), "Login requested for Account Security account.")
                    .setSecondsToExpire(120L)
                    .addDetail("Authy ID", user.getAuthyId().toString())
                    .addDetail("Username", user.getUsername())
                    .addDetail("Location", "San Francisco, CA")
                    .addDetail("Reason", "Demo by Account Security")
                    .build();
            OneTouchResponse response = authyClient
                    .getOneTouch()
                    .sendApprovalRequest(params);

            if(!response.isSuccess()) {
                logAndThrow("Problem sending the token with OneTouch");
            }
            return response.getApprovalRequest().getUUID();
        } catch (OneTouchException e) {
            logAndThrow("Problem sending the token with OneTouch: " + e.getMessage());
        }
        return null;
    }

    public void verify(String username, String token) {
        Token verificationResult = authyClient
                .getTokens()
                .verify(getUserAuthyId(username), token);

        if(!verificationResult.isOk()) {
            logAndThrow("Token verification failed");
        }
    }

    public String retrieveOneTouchStatus(String uuid) {
        try {
            return authyClient
                    .getOneTouch()
                    .getApprovalRequestStatus(uuid)
                    .getApprovalRequest()
                    .getStatus();
        } catch (OneTouchException e) {
            logAndThrow(e.getMessage());
            return "";
        }
    }

    private void logAndThrow(String message) {
        LOGGER.warn(message);
        throw new TokenVerificationException(message);
    }

    private Integer getUserAuthyId(String username) {
        UserModel user = userRepository.findByUsername(username);
        return user.getAuthyId();
    }
}