Skip to main content
The Zeckta OTP (One-Time Password) service is a high-security component designed for Two-Factor Authentication (2FA) and identity validation. Unlike standard messaging, the OTP service manages the entire lifecycle of a security challenge—from generation and salted hashing to session-based verification.

How It Works

Zeckta uses a Session-Based approach. Every OTP request generates a unique sessionId which must be provided during the verification phase. This ensures that the code entered by the user is validated against the specific attempt triggered by your application.

The Lifecycle Flow

  1. Request: Your application triggers an OTP for a destination phone number.
  2. Storage: Zeckta generates a 6-digit code, hashes it using SHA-256 with a secure pepper, and stores the session in a Redis cache.
  3. Delivery: The message is queued and dispatched via the high-speed SMS outbox.
  4. Verification: The user submits the code; Zeckta compares hashes and returns the validation result.

Default Configuration

To maintain high security and protect your workspace from brute-force attempts, the following defaults are enforced:
SettingDefault ValueDescription
Code Length6 DigitsNumeric characters (0-9).
Expiry (TTL)3 MinutesSessions are automatically purged after 180 seconds.
Max Attempts3 AttemptsThe session is locked/deleted after 3 failed tries.
Rate Limit3 per 10 minLimits requests per phone number to prevent spam.
Session ReuseEnabledReuses an active session if a new request is made within the TTL.

API Endpoints

ActionMethodEndpoint
Send OTPPOST/v1/messaging/otp/request
Verify CodePOST/v1/messaging/otp/verify

Security Features

  • Salted Hashing: Codes are never stored in plain text. We use SHA-256 hashing combined with a system-level pepper and the unique sessionId as a salt.
  • Anti-Abuse: Integrated rate-limiting at the workspace and destination levels ensures your SMS credits are protected from automated scripts.
  • Audit Trail: Every request and verification attempt is logged in a persistent audit database for security compliance and troubleshooting.

Next Steps