Authy features

A range of authentication options that balance security for your business and usability for users.

Push Authentication

More security. Less hassle.

For frictionless authentication, send a push notification directly to your user’s device, alerting them that an authentication attempt is taking place. Users will have the option to view authentication details and approve or deny access with a single touch. Communication between the user’s smartphone and the Authy API is encrypted end-to-end and cryptographically signed. It’s our simplest, and strongest authentication offering. Available via an SDK to embed the features in your own apps.

  • Authentication via Push notification

  • Go beyond 2FA with passwordless login

  • Go beyond the login and authorize in-application transactions

Soft token TOTP

Top-rated 2FA.

soft tokens avoid the risk of someone intercepting an auth code delivered via SMS, phone call, or email by generating a Time-based One-Time Password (TOTP) on their device. Available for mobile, wearable, or desktop platforms, it even works while the phone is offline, allowing users on laptops to authenticate on plane WiFi.

Combine the API with our free, popular 2FA app for greater security or use the SDK and embed TOTP directly in your existing apps.

  • Offline authentication

  • Multi-device support

  • Cloud backup and sync

OTP via SMS/Voice/Email

Globally-accessible 2FA.

An ideal option for users who cannot install a mobile app. Users simply authenticate with a One-Time Passcode (OTP) sent to their device via SMS, phone call, or email. Because we are built on leading communications platforms, we can reliably deliver codes to over 200 countries.

  • SMS, Voice, and Email

  • Intelligent global routing

  • Multi-language support

WHY AUTHY?


Security Shield with checkmark

Backed by security experts

No need to fear if your developers are not security software development experts. Authy is managed by an expert security operations team and fraud-trained help desk. Our service is also SOC2 compliant for security, so you have trust in our ability to secure our service — we’ve got your back.

Network

One service for all use cases

Different users have different security needs. Authy provides multiple ways to authenticate from the latest in passwordless authentication, to the lowest common dominator, SMS.

Reduce your support burden

Our free Authy apps allow users to manage their own authentication data such as email and phone. No need to increase your help-desk resources or train up security specialists. Reducing cost of deploying increased security to your applications.

One service for all use cases

Different users have different security needs. Authy provides multiple ways to authenticate from the latest in passwordless authentication, to the lowest common dominator, SMS.

CUSTOMER STORIES


Large companies rely on Authy

Twilio’s Authy service helps VMware pave the way for true digital enterprise mobility

VMware partnered with Twilio to embed authentication security into their groundbreaking enterprise mobility management solution. More about VMware

Authy helps Twitch secure millions of accounts with minimum friction

See how the world’s leading social community for gamers assessed critical UX requirements to integrate minimum-friction security into their platform. More about Twitch

Gemini builds safer, more trustworthy digital asset exchange with Authy in the mix

Twilio’s Authy 2FA ensures high-stakes security for next-generation exchange. More about Gemini

AUTHY API


See what you can build with the Authy API

WHY TWILIO


Build on Twilio. Code with Confidence.

Best-in-class channel APIs to keep the conversation going across all channels

Planet with user symbol

8 million developers

Global reach and unrivaled scale that supports over

Browser with build tools

Best-in-class channel APIs to keep the conversation going across all channels

Security Shield with checkmark

190,000 respected brands

Enterprise-grade security and reliability, powering over