Book Image

Twilio Best Practices

Book Image

Twilio Best Practices

Overview of this book

Table of Contents (15 chapters)
Twilio Best Practices
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we covered three helpful tips to keep your Twilio account and application secure:

  • First, we enabled Two-Factor Authentication to keep our account secure, even if someone finds out our password.

  • Next, we learned how to make sure that the requests your app receives genuinely come from Twilio, by either using the HTTP Basic Authentication or by verifying the cryptographic request signature.

  • Finally, we set up alerts to inform us and take appropriate action when certain usage thresholds are reached using Twilio's Usage Triggers, helping protect your app from abuse and coding errors.

In the next chapter, we'll learn how to effectively test and debug our applications and make them ready for release.