About IAM

The Identity and Access Management documentation covers how to manage your Twilio accounts (projects), securely authenticate Twilio REST API requests, and best practices for accessing Twilio.

This document covers the following:

  • How to get started with the Twilio REST API.
  • The Accounts section which offers guidance on how to pick the right account architecture.
  • API Keys which are the best way to authenticate API requests.
  • Credentials which allow for Public Keys management, products like Public Key Client Validation and Voice Recordings Encryption.
  • Public Key Client Validation which helps organizations in compliance-heavy industries meet strict security requirements, such as not relying on shared secrets, validating the sender, or verifying message content.
  • Single Sign-On which reduce compliance and security risks for organizations by giving businesses control over user authentication and user revocation via corporate mandated tools.
  • Twilio Connect which allows you to obtain authorization to perform API functions on behalf of another Twilio account holder.