Facebook Icon Facebook Icon Twitter Icon Twitter Icon Linkedin Icon Linkedin Icon Blog Icon Blog Icon Checkmark Icon Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Clock Icon Clock Icon Cloud Icon Cloud Icon Cloud Upload Icon Cloud Upload Icon Compass Icon Compass Icon Medium count 1 Icon Medium count 1 Icon Medium count 2 Icon Medium count 2 Icon Medium count 3 Icon Medium count 3 Icon Medium count 4 Icon Medium count 4 Icon Medium count 5 Icon Medium count 5 Icon Medium count 6 Icon Medium count 6 Icon Medium count 7 Icon Medium count 7 Icon Medium count 8 Icon Medium count 8 Icon Medium count 9 Icon Medium count 9 Icon Medium count 10 Icon Medium count 10 Icon Medium count 11 Icon Medium count 11 Icon Medium count 12 Icon Medium count 12 Icon Medium count 13 Icon Medium count 13 Icon Medium count 14 Icon Medium count 14 Icon Medium count 15 Icon Medium count 15 Icon Device with a checkmark Icon Device with a checkmark Icon Device Icon Device Icon Documentation Icon Documentation Icon Dollar Sign Icon Dollar Sign Icon Extend Icon Extend Icon Eye Icon Eye Icon Gear Icon Gear Icon Globe Icon Globe Icon Graph Icon Graph Icon Guidelines Icon Guidelines Icon Laptop Icon Laptop Icon Layers with checkmark Icon Layers with checkmark Icon Key Icon Key Icon Lock Icon Lock Icon Paper Airplane Icon Paper Airplane Icon Pencil Icon Pencil Icon Phone Icon Phone Icon Reliability Icon Reliability Icon Reset Icon Reset Icon Shield with Checkmark Icon Shield with Checkmark Icon Timer Icon Timer Icon Tools Icon Tools Icon Tutorial Icon Tutorial Icon Upload Icon Upload Icon User with Checkmark Icon User with Checkmark Icon User Icon User Icon Wallet Icon Wallet Icon Case Study Icon Case Study Icon Video Icon Video Icon Webinar Icon Webinar Icon White Paper Icon White Paper Icon

2FA in 1 Story Point

The fastest and easiest path to two-factor authentication

Get Your Free Api Key

Inherent security expertise

The Authy service is backed by an expert security operations team and fraud-trained help desk—you don’t have to build security systems to guard against attack.

Plug and play

The Authy REST API takes care of the tedious details like key management and secure data structuring. You get 2 simple end-points and pre-built libraries to add security in your login flow with the language of your choice.

Track record of success

Authy is designed for scale and reliability. Authy currently protects over 10,000 websites with a 99.999% uptime and 400ms average API response time. And you never have to worry about maintaining cloud service. Check Status >

See the code


curl "http://sandbox-api.authy.com/protected/json/users/new?api_key=d57d919d11e6b221c9bf6f7c882028f9" \
-d user[email]="[email protected]" \
-d user[cellphone]="317-338-9302" \
-d user[country_code]="54"

# EXAMPLE RESPONSE:
# {
#   "message":"User created successfully.",
#   "user": {
#     "id": 1
#   },
#   "success":true
# }

curl -i "http://sandbox-api.authy.com/protected/json/verify/0000000/1?api_key=d57d919d11e6b221c9bf6f7c882028f9"

# EXAMPLE RESPONSE:
# {
#   "success":"true",
#   "message":"Token is valid.",
#   "token":"is valid"
# }

curl "http://sandbox-api.authy.com/protected/json/phones/verification/start?api_key=d57d919d11e6b221c9bf6f7c882028f9" \
-d via="sms" \
-d phone_number="111-111-1111" \
-d country_code="1"

# EXAMPLE RESPONSE:
# {
#   "carrier":"AT&T Mobility (New Cingular Wireless PCS, LLC)",
#   "is_ported":false,
#   "is_cellphone":true,
#   "message":"Text message sent to +1 111-111-1111",
#   "success":true
# }

User login securely without the hassle

Black phone illustration

Authy OneCode

Receive seven digit, one-time pass codes on-demand, delivered via SMS or text-to-speech phone calls to a registered number.

Gold phone illustration

Authy SoftToken

Get a new seven digit authentication code every twenty seconds, available via the Authy app.

Black phone illustration

Authy OneTouch

Approve or deny an authentication request with a simple yes/no approval. Receive push notifications on any previously authorized smartphone.

Authy for Wordpress

Add the Two-Factor Authentication Plugin to your WordPress site and protect your content from hackers and hijackers without required development or security knowledge.

Learn More

Authy for SSH

Lock your machines with certificates + tokens and enjoy a strong authentication in less than a minute using 2-factor Authentication. Even activate secure shared access to your servers.

Learn More

Authy for OpenVPN

Whether you use certificates, passwords, PAM or LDAP you can easily integrate a Two-Step Verification using Authy.

Learn More