Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
English (US)
US English (US)
CO Spanish (Colombia)
  • Home
  • Cibersecurity and Compliance

How does wolkvox ensure security in API integration and access from remote locations?

Written by Jhon Bairon Figueroa

Updated at November 6th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • wvx Digital Interaction
  • wvx Voice Interaction
  • wvx Conversational AI
  • wvx Control Interactions
  • wvx CRM
  • wvx Agent
  • wvx Studio
  • Cibersecurity and Compliance
  • Release
    wolkvox Manager release wolkvox Agent release wolkvox CRM release
+ More

Table of Contents

Description Features

Description

wolkvox ensures security in the integration of its APIs through a set of robust controls, designed to protect the confidentiality, integrity, and availability of information. All integrations are conducted over encrypted channels (SSL/TLS), and access is protected by time-limited authentication tokens and private secrets, which require a previous human login.

In addition, wolkvox offers Corona Token, an advanced authentication mechanism that allows secure access from remote locations, balancing usability and security. This system is ideal for environments with distributed work and variable connectivity, ensuring that only authorized users and devices can access the APIs.

 

Features

Security in API Integration

  • SSL/TLS Encryption: All communications with wolkvox APIs are done via HTTPS, ensuring that data travels encrypted and protected.
  • Token Authentication: Each API request requires a secure access token, generated after a valid human login. These tokens have a limited duration and can be renewed according to security policies.
  • Configurable Functions: The APIs allow specific operations to be configured using GET parameters, facilitating customization according to customer needs.
  • Independent Instances: Each operation is configured in a separate instance, which allows for generating specific tokens for each task and changing them periodically.

 

Corona Token: Advanced Authentication for Remote Access

  • Authentication Based on Trusted IP:
    • Access with Corona Token is activated only after the user logs in with valid credentials from an IP registered as secure and from an authorized company endpoint device.
  • Controlled Tolerance to IP Change:
    • After initial authentication, a temporary token is granted, allowing the user to access from other (unregistered) IPs for a maximum of 90 days, maintaining productivity without sacrificing security.
  • Revocation due to Credential Expiration:
    • The system constantly verifies the validity of the credentials. If these are revoked or marked as invalid, the associated Corona Token immediately becomes invalid, blocking access.
  • Session Control and Traceability:
    • All sessions established with Corona Token are logged, allowing for a complete audit and tracking of access from new locations.

 

 

remote access api security

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How Is Physical Access Management to Wolkvox Facilities Conducted?
  • How Does wolkvox Conduct Internal and External Audits Related to the ISMS?
  • Where Are wolkvox Services Hosted?

2025 Wolkvox

Information security policy | Privacy Policy

Expand