As of November 2022, Twilio no longer provides support for Authy SMS/Voice-only customers. Customers who were also using Authy TOTP or Push prior to March 1, 2023 are still supported. The Authy API is now closed to new customers and will be fully deprecated in the future.
For new development, we encourage you to use the Verify v2 API.
Existing customers will not be impacted at this time until Authy API has reached End of Life. For more information about migration, see Migrating from Authy to Verify for SMS.
Before you can secure a user with the Twilio Authy API, you need to create a user
. The API requires you set an email, phone number and country code for each user.
When a user is first created, you will receive an authyid
which you must then store with the user's profile in your own database. Do not lose this ID - you will use it every time you wish to authenticate a user!
Your users can change their phone number registered with the API without your knowledge by using the Authy Mobile or Desktop Application. They may also use the Authy.com phone change security review. You can get webhooks of when this phone number changes via our Webhooks API.
1# Download the helper library from https://github.com/twilio/authy-python2from authy.api import AuthyApiClient34# Your API key from twilio.com/console/authy/applications5# DANGER! This is insecure. See http://twil.io/secure6authy_api = AuthyApiClient('api_key')78user = authy_api.users.create(9email='new_user@email.com',10phone='405-342-5699',11country_code=57)1213if user.ok():14print user.id15# user.id is the `authy_id` needed for future requests16else:17print user.errors()
1{2"message": "User created successfully.",3"user": {4"id": 1235},6"success": true7}
A user may have multiple email addresses but only one phone is associated with each authy_id
. Two separate API calls to register a user with the same device and different emails will return the same authy_id
and store both emails for that user.
POST https://api.authy.com/protected/{FORMAT}/users/new
Name | Type | Description |
---|---|---|
user[email] | String (required) | More than one email can be stored per AuthyID, but only the initially created email will display in the Dashboard until it is removed. (📇 PII ) |
user[cellphone] | String (required) | Foreign key for the AuthyID (the AuthyID will be the primary key going forward). You can use dashes, periods, spaces or nothing to separate parts of the cell phone number. (📇 PII ) |
user[country_code] | String (required) | Numeric calling country code of the country Eg: 1 for the US. 91 for India. 52 for Mexico. See: Country code list dropdown (🏢 not PII ) |
send_install_link_via_sms | Boolean (optional) | Enable or disable an sms message with a link to download the Authy App. See Sending Install Link for detailed behavior. Default can be set from the console. (🏢 not PII ) |
Email and phone number must be valid for the request to succeed. An invalid request will produce the following error response:
1{2"message": "User was not valid",3"success": false,4"errors": {5"email": "is invalid",6"message": "User was not valid"7},8"email": "is invalid",9"error_code": "60027"10}
The send_install_link_via_sms
parameter will override behavior set in the console. Check your application's settings. Note: the parameter is ignored and no install link will be sent if the user has synced a device with the Authy servers in the previous 90 days. You can see last_sync_date
for a user's devices via the User Status endpoint.
If you want to send an install link regardless, we recommend using Twilio Programmable SMS (note: requires a Twilio Phone Number). Include the URL https://authy.com/download/ which will autodetect the device type and redirect the user to the appropriate download link. See the SMS docs for more information.
Enrolling a user (if you use the same phone number they used to sign up for the Authy App) automatically adds your application to their Authy App. You do not need to do any additional work to support TOTP tokens in the Authy app. To support additional Authenticator apps, like Google Authenticator, display a QR code to your users that contain a compatible TOTP secret. The API will return a link to a valid QR code. Instructions for generating that QR code are in the One-Time Passcodes reference documentation.
You might not have the email and the phone number of the user, or if you do, you might not want to share it with Twilio for compliance reasons.
For those cases you can use our Authy App based onboarding flow. The end user must have the Authy App installed and registered, meaning the end user has already provided their phone number and email to us.
This feature is only supported in the following versions of the Authy App. End users will have to update their mobile applications to the following versions:
1// Example Payload2{3"iss": "My Authy App",4"iat": 1554395479,5"exp": 1554395879,6"context": {7"custom_user_id": "3YgAIZklGPHmwpJfIC0PDy0E7l763OF3BHZo1p2xKhY",8"authy_app_id": "1111111"9}10}1112// Example Header13{14"alg": "HS256",15"typ": "JWT"16}
1// JWT signed with key 'obK3KxxxxxxxxxxxxxxxxxxxxC'2"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJNeSBBdXRoeSBBcHAiLCJpYXQiOjE1NTQzOTU0NzksImV4cCI6MTU1NDM5NTg3OSwiY29udGV4dCI6eyJjdXN0b21fdXNlcl9pZCI6IjNZZ0FJWmtsR1BIbXdwSmZJQzBQRHkwRTdsNzYzT0YzQkhabzFwMnhLaFkiLCJhdXRoeV9hcHBfaWQiOiIxMTExMTExIn19.6pBOX0UL7jTmrudWGsJjT07GD8DlAP6uVlpHVZwJPTs"
First, create a JWT. The token will be used to tie the end user's Authy ID to your application. The token must:
1{2"iss": "{authy_app_name}",3"iat": "{issue date in NumericDate}",4"exp": "{expiration date in NumericDate}",5"context": {6"custom_user_id": "{custom_user_id}",7"authy_app_id": "{app_authy_id}"8}9}10
HS256 is the only algorithm supported.
1{2"alg": "HS256",3"typ": "JWT"4}
iss | The issuer param in the JWT payload MUST be the Application name, other value will raise an error in the validation. |
iat | The date the JWT is issued. The difference between iat and exp cannot be more than 15 minutes. |
exp | The expiration time of the JWT. Used to prevent the JWT from being reused in the future. Maximum expiration time allowed is 15 minutes after the current time. |
custom_user_id | Provided by you, uniquely identifies a user. We are not expecting PII or any sensitive data, so please do not provide phone numbers, emails, SSN, or other identifying information . If you only have PII to identify your users we recommend to either: • Create a de-identified ID like a UUID • De-identify the PII by sending us the HMAC of the PII. Use URL safe Base64 encoding. |
authy_app_id | The application id can be retrieved from console by going to Applications selecting the Application, and browsing to settings. |
During development, you can validate your JWT using https://jwt.io/. The example can be found here.
Next, create a QR string with the following format:
authy://account?token={JWT}
1// JWT created using example payload above2// signed with example API key 'obK3KxxxxxxxxxxxxxxxxxxxxC'34authy://account?token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJNeSBBdXRoeSBBcHAiLCJpYXQiOjE1NTQzOTU0NzksImV4cCI6MTU1NDM5NTg3OSwiY29udGV4dCI6eyJjdXN0b21fdXNlcl9pZCI6IjNZZ0FJWmtsR1BIbXdwSmZJQzBQRHkwRTdsNzYzT0YzQkhabzFwMnhLaFkiLCJhdXRoeV9hcHBfaWQiOiIxMTExMTExIn19.6pBOX0UL7jTmrudWGsJjT07GD8DlAP6uVlpHVZwJPTs
Note: we do not recommend storing the QR code since it can potentially leak sensitive data. Instead, we recommend:
After the QR code is generated display it so your user can scan it with the Authy App.
Keep in mind the QR codes expire, so don't display it for more time than the assigned expiration. The mobile device requires internet connectivity to complete the flow.
After the end user scans the QR code there are two ways to get the user's Authy ID (required for subsequent verification challenges).
GET https://api.authy.com/protected/{FORMAT}/registrations/status?custom_user_id={CUSTOM_USER_ID}
URL
Name | Description |
---|---|
FORMAT String | The format to expect back from the REST API call. json or xml . |
CUSTOM_USER_ID String | ID provided by you to uniquely identify a user. (🏢 not PII ) |
Name | Description |
---|---|
status String | Possible responses: "pending", the user didn't scan the QR code yet. "expired", the received JWT was expired, it was either created with a short duration or the user took to long to scan. "completed", the user was successfully added. Make sure you keep your time in sync with an NTP server. |
authy_id Number | Uniquely identifies a user in the Authy API. Use this ID to call other Authy API endpoints. |
1# Download the helper library from https://github.com/twilio/authy-python2from authy.api import AuthyApiClient34# Your API key from twilio.com/console/authy/applications5# DANGER! This is insecure. See http://twil.io/secure6authy_api = AuthyApiClient('api_key')78# NOTE: this feature only available in authy-python version 2.2.5+9user = authy_api.users.registration_status(10custom_user_id='3YgAIZklGPHmwpJfIC0PDy0E7l763OF3BHZo1p2xKhY')1112if user.ok():13print user.id14# user.id is the `authy_id` needed for future requests15else:16print user.errors()
1{2"registration": {3"status": "completed",4"authy_id": 111111115},6"success": true7}
You can subscribe to a webhook that will notify you in real time when the registration is successful or not.
The payload for event user_registration_completed
:
1"method": "POST",2"params": {3"events": [4{5"event": "user_registration_completed",6"time": "2019-04-09T22:26:10.503Z",7"objects": {8"app": {9"b_custom_code_allowed": false,10"b_custom_message_allowed": false,11"s_account_sid": "AC5f123456eabfa99ee3441ef1e84ad528",12"s_device_app": null,13"s_errors": "",14"s_id": "54321",15"s_name": "Application Name",16"s_type": null17},18"registration": {19"s_app_id": 54321,20"s_authy_id": 123456,21"s_custom_id": "885de433faedf8475426f11baeee2424f88fd935"22},23"user": {24"as_authy_ids": [25"123456"26],27"b_banned": false,28"s_authy_id": "123456",29"s_country_code": "57",30"s_errors": "",31"s_locale": "en",32"s_phone_number": "953a0fd8c9ec2a9f16a5ce58183cfa03"33}34},35"request": {36"id": "413fd53c-09af-43d6-8390-c346de8ccf0c",37"ip": "IPv4_99a65f1a9e58fe49150aed5a188459b9b0b47157"38},39"public": true40}41],42"webhook_id": "WH_50087ea9-9568-4839-9191-b43908a4abd4"43},44"url": "https://example.io/webhook"45}
The payload for event user_registration_failed
:
1{2"method": "POST",3"params": {4"events": [5{6"event": "user_registration_failed",7"time": "2019-04-09T22:26:10.503Z",8"objects": {9"app": {10"b_custom_code_allowed": false,11"b_custom_message_allowed": false,12"s_account_sid": "AC5f586933eabfa99ee3441ef1e84ad528",13"s_device_app": null,14"s_errors": "",15"s_id": "54321",16"s_name": "Application Name",17"s_type": null18},19"error": {20"s_code": "60000"21}22},23"request": {24"id": "413fd53c-09af-43d6-8390-c346de8ccf0c",25"ip": "IPv4_99a65f1a9e58fe49150aed5a188459b9b0b47157"26},27"public": true28}29],30"webhook_id": "WH_50087ea9-9568-4839-9191-b43908a4abd4"31},32"url": "https://example.io/webhook"33}
1# Download the helper library from https://github.com/twilio/authy-python2from authy.api import AuthyApiClient34# Your API key from twilio.com/console/authy/applications5# DANGER! This is insecure. See http://twil.io/secure6authy_api = AuthyApiClient('api_key')78status = authy_api.users.status(authy_id)910if status.ok():11print(status.content)
1{2"status": {3"authy_id": 123,4"confirmed": true,5"registered": true,6"country_code": 1,7"phone_number": "XXX-XXX-1111",8"email": "user@domain.com",9"devices": [10"desktop",11"iphone"12],13"has_hard_token": false,14"account_disabled": false,15"detailed_devices": [16{17"creation_date": 1540576334,18"device_id": 123123,19"device_type": "authy",20"last_sync_date": 1540576768,21"os_type": "desktop",22"registration_device_id": null,23"registration_method": "sms",24"enabled_unlock_methods": "",25"last_unlock_method_used": "unknown",26"last_unlock_date": "unknown"27},28{29"creation_date": 1540594738,30"device_id": 456456,31"device_type": "authy",32"last_sync_date": 1540601752,33"os_type": "ios",34"registration_device_id": null,35"registration_method": "sms",36"enabled_unlock_methods": "pin, fingerprint",37"last_unlock_method_used": "pin",38"last_unlock_date": 154060175239}40],41"deleted_devices": [42{43"creation_date": 1540481558,44"deletion_date": 1540481571,45"device_id": 789789,46"device_type": "authy",47"last_sync_date": 1540481560,48"os_type": "desktop",49"registration_device_id": 123123,50"registration_method": "push"51}52],53},54"message": "User status.",55"success": true56}
The user status endpoint will only return a subset of the information for a given user, until that user has verified a token or approved/denied a OneTouch request.
Once a user is created and registered with your application, you can request information on that user from Twilio. Using the User status call, you will receive:
Response Parameter | Description |
---|---|
country_code | Country code of the phone number. |
phone_number | Last 4 digits of phone number (XXX-XXX-1234 ). None if the user was registered without providing phone number. |
email | Email provided when the user was added. None If user was added without email this field will be empty. |
devices | List of devices, options are: android , android_tablet , ios , iphone , iphone_sdk , chrome, authy_chrome , sms , android_sdk |
detailed_devices | List of devices including detailed registration information. See Detailed Devices below. |
deleted_devices | Useful for determining a chain of trust. See Authy trust-chain for added devices for more information. Devices deleted before June 15th 2019 won't be returned. |
multidevice_updated_at | Unix timestamp of the last time the user changed the multidevice toggle status (true/false) on any device |
mutidevice_enabled | true if multidevice is enabled, false if multidevice is disabled. |
registered | true when the Authy Mobile/Desktop App was registered. |
confirmed | true when the user has used a valid code before. |
Determine which end-user apps to trust for authentication. Our API records uniquely identifiable numbers for every installed app, as well as the sequence of app installs and the methods of installation. More information in our blog post: Authy trust-chain for added devices.
Information returned in the detailed_device
section of the user status
endpoint includes:
registration_method
: how the device was added (sms
, call
, push
).
last_sync_date
: Unix timestamp of last time the device was synced with Authy servers.
registration_device_id
: device ID of the approving device if registration_method
is push
. New as of 2019-06-15, devices added before this date will be null
. See Authy trust-chain for added devices for more information
enabled_unlock_methods
: one or more of pin
, faceid
, fingerprint
, password, none
, unknown
. Refers to the unlock method for the entire app, not just the settings page.
last_unlock_method
: enabled method last used.
last_unlock_date
: Unix timestamp of last time the device was unlocked.
GET https://api.authy.com/protected/{FORMAT}/users/{AUTHY_ID}/status
Name | Description |
---|---|
FORMAT String | The format to expect back from the REST API call. json or xml . |
AUTHY_ID Integer | The Authy ID of the user. Create an Authy ID by registering a user. Note that password delivery may be upgraded to use the Authy application; see response parameters below. |
Name | Description |
---|---|
user_ip String | IP of the user requesting to see the application details. Optional. (📇 PII ) |
1# Download the helper library from https://github.com/twilio/authy-python2from authy.api import AuthyApiClient34# Your API key from twilio.com/console/authy/applications5# DANGER! This is insecure. See http://twil.io/secure6authy_api = AuthyApiClient('api_key')78deleted = authy_api.users.delete(authy_id)910if deleted.ok():11print deleted.content
1{2"message": "User removed from application",3"success": true4}
If you want to remove a user from your application you can use the Remove API. Note: removing a user will immediately disable token verifications.
Best practice is to remove a user if they disable Two-factor Authentication or remove an account with your App. If you accidentally remove a user, you can recover users through the Console - but we suggest that you instead go through your registration flow again.
curl -X POST https://api.authy.com/protected/{FORMAT}/users/{USER ID}/remove -H "X-Authy-API-Key: {KEY}"
Name | Type | Description |
---|---|---|
user_ip | String (optional) | The ip requesting to remove the user (📇 PII ) |