How does wolkvox ensure security in API integration and access from remote locations?
Table of Contents
Description
wolkvox ensures security in the integration of its APIs through a set of robust controls, designed to protect the confidentiality, integrity, and availability of information. All integrations are conducted over encrypted channels (SSL/TLS), and access is protected by time-limited authentication tokens and private secrets, which require a previous human login.
In addition, wolkvox offers Corona Token, an advanced authentication mechanism that allows secure access from remote locations, balancing usability and security. This system is ideal for environments with distributed work and variable connectivity, ensuring that only authorized users and devices can access the APIs.
Features
Security in API Integration
- SSL/TLS Encryption: All communications with wolkvox APIs are done via HTTPS, ensuring that data travels encrypted and protected.
- Token Authentication: Each API request requires a secure access token, generated after a valid human login. These tokens have a limited duration and can be renewed according to security policies.
- Configurable Functions: The APIs allow specific operations to be configured using GET parameters, facilitating customization according to customer needs.
- Independent Instances: Each operation is configured in a separate instance, which allows for generating specific tokens for each task and changing them periodically.
Corona Token: Advanced Authentication for Remote Access
-
Authentication Based on Trusted IP:
- Access with Corona Token is activated only after the user logs in with valid credentials from an IP registered as secure and from an authorized company endpoint device.
-
Controlled Tolerance to IP Change:
- After initial authentication, a temporary token is granted, allowing the user to access from other (unregistered) IPs for a maximum of 90 days, maintaining productivity without sacrificing security.
-
Revocation due to Credential Expiration:
- The system constantly verifies the validity of the credentials. If these are revoked or marked as invalid, the associated Corona Token immediately becomes invalid, blocking access.
-
Session Control and Traceability:
- All sessions established with Corona Token are logged, allowing for a complete audit and tracking of access from new locations.