Skip to contentSkip to navigationSkip to topbar
Rate this Page:

Verify TOTP Quickstart


(information)

Info

Want to see this in action first? Check out Twilio's Code Exchange and quick deploy a sample TOTP application(link takes you to an external page).

(information)

Info

Looking for open source native libraries that generate TOTPs? Try Kotlin One-Time Password Library(link takes you to an external page) for Android or SwiftOTP(link takes you to an external page) for iOS.

Verify TOTP adds the standards-compliant TOTP (Soft Token) channel to the Verify API, so that you can let your users use authenticator apps like Authy(link takes you to an external page), Google Authenticator, or your own custom app for authentication. It's great for businesses looking for a more secure, private, and lower-cost user authentication option compared to SMS OTP. TOTP even works when the user is offline, like on an airplane. Unlike the Authy API TOTP feature, no PII from the user is required, more user registration options beyond QR codes are supported, and you can configure more code properties.

There are three main steps to use Verify TOTP:

  • Register a user by generating an RFC-6238(link takes you to an external page) compliant seed.
  • Verify that the user correctly added the seed (for example via QR code) to their Authenticator App
  • To verify a registered user, check that the code a user provided matches the code generated by the unique seed.

This Quickstart will walk you through the entire process step-by-step, starting with setting up your Twilio account all the way through verifying a user.

In this Quickstart, you will learn how to:

  1. Setup
    • Sign up for Twilio
    • Create a Verify Service
  2. Register a user and TOTP seed
    • Generate a TOTP seed
    • Generate a QR code
    • Verify a successful registration
  3. Verify a user
    • Create a Challenge
    • Update the Challenge

By the end of this Quickstart, you'll have a solid foundation for implementing Verify TOTP within your app and backend to verify users at login, transaction, and other sensitive actions.

Want a technical overview first?

Check out the Verify TOTP Technical Overview to view its data model and sequence diagrams

Technical Overview(link takes you to an external page)

Sign up for - or sign in to - Twilio

sign-up-for---or-sign-in-to---twilio page anchor
(information)

Info

Already have a Twilio account? Go ahead and skip this section.

You can sign up for a free Twilio trial account here(link takes you to an external page).

  • When you sign up, you'll be asked to verify your personal phone number. This helps Twilio verify your identity.
  • Once you verify your number, you'll be asked to create a project. For the sake of this tutorial, you can click on the "Learn and Explore" template. Give your project a name, or just click "skip remaining steps" to continue with the default.
  • Once you get through the project creation flow, you'll arrive at your project dashboard in the Twilio Console(link takes you to an external page) . This is where you'll be able to access your Account SID, an authentication token, create a Verify Service and more.

Go to Twilio Console > Verify > Services(link takes you to an external page) and create a new Service.

Alternatively, you can select any existing Service. However, we recommend creating a new service for testing so you don't accidentally interfere with a production environment.


Register a user and TOTP seed

register-a-user-and-totp-seed page anchor

To use Verify TOTP, you first register a user by generating an RFC-6238(link takes you to an external page) compliant seed. Then you verify that they've correctly added it to their Authenticator App for generating codes.


Create a new TOTP factor

create-a-new-totp-factor page anchor

The security of TOTP relies on a shared secret between your app and your user, and this is known as the seed. Register a user by creating a TOTP factor, which generates a seed based on a set of default configs and stores it. A corresponding Entity representing your user is also auto-created if it didn't exist.

For security reasons, it is not possible to export TOTP seeds programmatically after creation and they are not returned from the Factor API. If you do need to save seeds, we recommend performing that operation during seed creation.

When creating a TOTP factor, you can optionally pass your own seed (useful for migration scenarios) and modify the default configs. See the Factor resource for reference. Some default configs are also adjustable at the Service resource level, such that all future Factors use them. Type or paste the code sample for this step.

Create a new TOTP factor

create-a-new-totp-factor-1 page anchor
Node.js
Python
C#
Java
Go
PHP
Ruby
twilio-cli
curl

_15
// Download the helper library from https://www.twilio.com/docs/node/install
_15
// Find your Account SID and Auth Token at twilio.com/console
_15
// and set the environment variables. See http://twil.io/secure
_15
const accountSid = process.env.TWILIO_ACCOUNT_SID;
_15
const authToken = process.env.TWILIO_AUTH_TOKEN;
_15
const client = require('twilio')(accountSid, authToken);
_15
_15
client.verify.v2.services('VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
_15
.entities('ff483d1ff591898a9942916050d2ca3f')
_15
.newFactors
_15
.create({
_15
friendlyName: `Taylor's Account Name`,
_15
factorType: 'totp'
_15
})
_15
.then(new_factor => console.log(new_factor.binding));

Output

_24
{
_24
"sid": "YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_24
"account_sid": "ACXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_24
"service_sid": "VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_24
"entity_sid": "YEXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_24
"identity": "ff483d1ff591898a9942916050d2ca3f",
_24
"binding": {
_24
"secret": "GEZDGNBVGY3TQOJQGEZDGNBVGY3TQOJQ",
_24
"uri": "otpauth://totp/test-issuer:John%E2%80%99s%20Account%20Name?secret=GEZDGNBVGY3TQOJQGEZDGNBVGY3TQOJQ&issuer=test-issuer&algorithm=SHA1&digits=6&period=30"
_24
},
_24
"date_created": "2015-07-30T20:00:00Z",
_24
"date_updated": "2015-07-30T20:00:00Z",
_24
"friendly_name": "Taylor's Account Name",
_24
"status": "unverified",
_24
"factor_type": "totp",
_24
"config": {
_24
"alg": "sha1",
_24
"skew": 1,
_24
"code_length": 6,
_24
"time_step": 30
_24
},
_24
"metadata": null,
_24
"url": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Factors/YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
_24
}

(warning)

Warning

Do not use Personally Identifiable Information for identity. Use an immutable user identifier like a UUID, GUID, or SID.
Verify TOTP uses identity as a unique identifier of a user. You should not use directly identifying information (aka personally identifiable information or PII) like a person's name, home address, email or phone number, etc., as identity because the systems that will process this attribute assume it is not directly identifying information.

(warning)

Warning

Use caution when changing default configs
The default configs for the TOTP code (Config.CodeLength, Config.Skew, Config.TimeStep, and Config.Alg) have been chosen for a typical TOTP use case with a 6-digit length code. Please use caution when changing these configs, as it could reduce the security of the code. For example, reducing the length of the TOTP code (Config.CodeLength) makes the code easier to guess and more vulnerable to a brute force attack. While a shorter length may be necessary for your use case, consider compensating security enhancements, such as limiting the rate at which codes can be checked, reducing Config.Skew, and reducing Config.TimeStep.

The Authy app will not be able to add TOTP tokens if default configs such as Config.CodeLength or Config.TimeStep are changed. Other publicly available authenticator apps that your users might have don't support non-default configs for all mobile OSs; see this 3rd-party analysis of authenticator apps(link takes you to an external page) for details.

Contact Twilio for further guidance.


The user needs to add the seed, and optionally metadata like Issuer and Account Name, to an authenticator app like Google Authenticator, Twilio Authy, or a custom client app that you've provided to your user. This authenticator app needs to securely store the seed and generate TOTP codes using it. A typical way for the user to add the seed is via scanning a QR code. Verify TOTP generates a standard URI (factor.binding.uri) that you can convert into a QR code for this purpose. Verify TOTP does not generate the QR code itself, but there are many free/open-source QR code generators.

For this quickstart, use qr-code-generator.com(link takes you to an external page) to quickly generate a QR code by pasting the URI.

For a real implementation, you could use one of these open-source code libraries:

Scan and add this QR with your favorite authenticator app to mimic what a user would do.

Example

example page anchor

Using this URI:


_10
otpauth://totp/Twilio:John%E2%80%99s%20Account%20Name?secret=GEZDGNBVGY3TQOJQGEZDGNBVGY3TQOJQ&issuer=Twilio&algorithm=SHA1&digits=6&period=30

Generates this QR code using qr-code-generator.com:(link takes you to an external page)

qr_code.

Scanning this QR using the Twilio Authy app generates this token:

IMG_858FC9886A0B-1 (1).

How to share the seed without a QR code

how-to-share-the-seed-without-a-qr-code page anchor

Instead of a QR code, you can pass the seed to the user's authenticator app by displaying it for manual entry by the user (supported by most commercial authenticator apps), including it in a deep link, or sending it via another authenticated channel.


Verify that the user has successfully registered

verify-that-the-user-has-successfully-registered page anchor

When the Factor is first created, it's in an "unverified" status. To verify the Factor, the user needs to demonstrate that they are able to generate a correct code based off of the seed.

Use the code generated by your authenticator app and type or paste the code sample for this step.

(information)

Info

Be sure to update the AuthPayload value with your latest TOTP code before sending the API request. The expiration window (Config.TimeStep) of the TOTP code defaults to 30 seconds. If the TOTP code is correct, then the Factor status will change to "verified". If it's incorrect, the Factor status will remain "unverified."

Node.js
Python
C#
Java
Go
PHP
Ruby
twilio-cli
curl

_12
// Download the helper library from https://www.twilio.com/docs/node/install
_12
// Find your Account SID and Auth Token at twilio.com/console
_12
// and set the environment variables. See http://twil.io/secure
_12
const accountSid = process.env.TWILIO_ACCOUNT_SID;
_12
const authToken = process.env.TWILIO_AUTH_TOKEN;
_12
const client = require('twilio')(accountSid, authToken);
_12
_12
client.verify.v2.services('VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
_12
.entities('ff483d1ff591898a9942916050d2ca3f')
_12
.factors('YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
_12
.update({authPayload: '293412'})
_12
.then(factor => console.log(factor.status));

Output

_20
{
_20
"sid": "YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_20
"account_sid": "ACXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_20
"service_sid": "VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_20
"entity_sid": "YEXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_20
"identity": "ff483d1ff591898a9942916050d2ca3f",
_20
"date_created": "2015-07-30T20:00:00Z",
_20
"date_updated": "2015-07-30T20:00:00Z",
_20
"friendly_name": "friendly_name",
_20
"status": "verified",
_20
"factor_type": "totp",
_20
"config": {
_20
"alg": "sha1",
_20
"skew": 1,
_20
"code_length": 6,
_20
"time_step": 30
_20
},
_20
"metadata": null,
_20
"url": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Factors/YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
_20
}

(information)

Info

The Factor SID (YFXXX..) is included in the response when you create a Factor. If you don't have the Factor SID, you can List Factors for your user's Entity, and identify the one that is factor_type = totp.

Node.js
Python
C#
Java
Go
PHP
Ruby
twilio-cli
curl

_12
// Download the helper library from https://www.twilio.com/docs/node/install
_12
// Find your Account SID and Auth Token at twilio.com/console
_12
// and set the environment variables. See http://twil.io/secure
_12
const accountSid = process.env.TWILIO_ACCOUNT_SID;
_12
const authToken = process.env.TWILIO_AUTH_TOKEN;
_12
const client = require('twilio')(accountSid, authToken);
_12
_12
client.verify.v2.services('VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
_12
.entities('ff483d1ff591898a9942916050d2ca3f')
_12
.factors
_12
.list({limit: 20})
_12
.then(factors => factors.forEach(f => console.log(f.sid)));

Output

_33
{
_33
"factors": [
_33
{
_33
"sid": "YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_33
"account_sid": "ACXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_33
"service_sid": "VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_33
"entity_sid": "YEXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_33
"identity": "ff483d1ff591898a9942916050d2ca3f",
_33
"date_created": "2015-07-30T20:00:00Z",
_33
"date_updated": "2015-07-30T20:00:00Z",
_33
"friendly_name": "friendly_name",
_33
"status": "unverified",
_33
"factor_type": "totp",
_33
"config": {
_33
"alg": "sha1",
_33
"skew": 1,
_33
"code_length": 6,
_33
"time_step": 30
_33
},
_33
"metadata": null,
_33
"url": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Factors/YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
_33
}
_33
],
_33
"meta": {
_33
"page": 0,
_33
"page_size": 50,
_33
"first_page_url": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Factors?PageSize=50&Page=0",
_33
"previous_page_url": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Factors?PageSize=50&Page=0",
_33
"url": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Factors?PageSize=50&Page=0",
_33
"next_page_url": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Factors?PageSize=50&Page=1",
_33
"key": "factors"
_33
}
_33
}


Congratulations! You've just completed the first Verify TOTP sequence: register user and TOTP seed. The second sequence is to verify (authenticate) a user with their authenticator app, whenever they need to login to your app or perform some other sensitive action. Read on for the step-by-step instructions.


To verify a user, the user needs to read the latest code generated by their authenticator app and provide it to you. Then you need to create a Challenge and include the code as the AuthPayload. If the code is correct, then the Challenge will be created with a status of approved. Incorrect codes will result in a Challenge that is created with a status of pending, and will eventually expire. In the event of an incorrect code, you can ask the user to provide a new code and create a new Challenge to check if it's correct. Alternatively, you can update the existing Challenge with a new AuthPayload value, but this approach is probably more complicated to implement. Type or paste the code sample for this step.

Create a TOTP challenge to validate a token

create-a-totp-challenge-to-validate-a-token page anchor
Node.js
Python
C#
Java
Go
PHP
Ruby
twilio-cli
curl

_15
// Download the helper library from https://www.twilio.com/docs/node/install
_15
// Find your Account SID and Auth Token at twilio.com/console
_15
// and set the environment variables. See http://twil.io/secure
_15
const accountSid = process.env.TWILIO_ACCOUNT_SID;
_15
const authToken = process.env.TWILIO_AUTH_TOKEN;
_15
const client = require('twilio')(accountSid, authToken);
_15
_15
client.verify.v2.services('VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
_15
.entities('ff483d1ff591898a9942916050d2ca3f')
_15
.challenges
_15
.create({
_15
authPayload: '123456',
_15
factorSid: 'YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX'
_15
})
_15
.then(challenge => console.log(challenge.status));

Output

_33
{
_33
"sid": "YC02aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
_33
"account_sid": "ACXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_33
"service_sid": "VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_33
"entity_sid": "YEXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_33
"identity": "ff483d1ff591898a9942916050d2ca3f",
_33
"factor_sid": "YFXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
_33
"date_created": "2015-07-30T20:00:00Z",
_33
"date_updated": "2015-07-30T20:00:00Z",
_33
"date_responded": "2015-07-30T20:00:00Z",
_33
"expiration_date": "2015-07-30T20:00:00Z",
_33
"status": "approved",
_33
"responded_reason": "none",
_33
"details": {
_33
"message": "Hi! Mr. John Doe, would you like to sign up?",
_33
"date": "2020-07-01T12:13:14Z",
_33
"fields": [
_33
{
_33
"label": "Action",
_33
"value": "Sign up in portal"
_33
}
_33
]
_33
},
_33
"hidden_details": {
_33
"ip": "172.168.1.234"
_33
},
_33
"metadata": null,
_33
"factor_type": "totp",
_33
"url": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Challenges/YC02aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
_33
"links": {
_33
"notifications": "https://verify.twilio.com/v2/Services/VAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Entities/ff483d1ff591898a9942916050d2ca3f/Challenges/YC02aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Notifications"
_33
}
_33
}


Now that you've verified your first user, we'd love your feedback on your experience and whether you plan to use Verify TOTP in production. We'd be happy to discuss your plans and offer suggestions. In addition, explore adding Verify's other verification channels beyond TOTP.

We can't wait to see what you build!


Rate this Page: