Buy options36.70 GBP
|Cuboid with a TFT Screen
config protection password
|Azure On-Prem MFA Server
|Azure Cloud MFA / Office 365 AD Premium P1 or P2
|Azure Cloud MFA / Office 365 AD Free/Basic
|ESET Secure Authentication
Not listed here
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
Device lock feature newStarting from Molto2 v2.1 there is a possibility of locking the screen using the "Lock" button in the Windows app or using
--lock argument of the molto2.py script. This will hide the OTPs from device's screen until unlock button is clicked or
molto2.py --unlock command is issued.
SySS Certified ProductMolto2 has received a 'Certified Product' badge from an independent third-party security assessment conducted by SySS GmbH
Molto-2-v2 Multi-profile TOTP Programmable hardware token
A revised version of our popular multi-profile USB-programmable TOTP hardware token that can now hold up to 100 TOTP accounts. The profiles can be provisioned/configured via USB using one of our Molto-2 USB Config tools. Molto-2-v2 also has additional features such as OTP shown as a QR image and HID/Keyboard emulation feature.
▣ RFC 6238 compliant
▣ supports up to 100 accounts/profiles
▣ USB-programmable with the USB Config tool
▣ USB keyboard emulation (USB cable included)
▣ Two display modes: with one TOTP profile per screen and with five TOTP profiles per screen
▣ RTC battery life: 8 years
▣ LCD screen battery: 3-4 months (rechargeable)
▣ Designed, engineered and programmed in Switzerland
|up to 100
|via USB, Windows app or cross-platform Python script
|30 or 60 seconds
|SHA1 or SHA256
|• Configuration password
• Screen security lock feature (v2.1 or newer)
|4, 6, 8 or 10 digits
|Manual, HID-emulation2 or by scanning QR code3 (in Mode1 only)
1 - Time synchronization is performed using one of the USB configuration tools. The expected time drift is between 1 and 30 seconds per year (depending on ambient temperature), and a periodic sync of the system clock may be required (i.e., every 1 or 2 years, depending on the drift tolerance of the authentication system).
2 - HID functionality will allow sending the current OTP via keyboard emulation when connected over USB. Instead of entering the OTP manually, pressing the 'M' button is sufficient.
3 - The current OTP will be displayed as a QR image. This is useful when automating OTP entry on a different system (e.g., a mobile app) to avoid typing errors.
Migrate from mobile appsToken2 programmable hardware tokens can be used as drop-in replacement of TOTP mobile apps. Token2 has developed solutions to migrate from apps like Google Authenticator and Authy to any of our hardware tokens (or mobile apps).
The micro-USB ports used in Molto2 devices are known to be more fragile (as they are PCB surface mounted), therefore, when unplugging the cable from the port, it is recommended to hold the device and pull the cable only in the direction illustrated below, firmly holding the micro-USB connector head. Unplugging the cable otherwise may damage the port or the PCB. For better protection, we recommend using a magnetic adapter.
We're excited to introduce Token2 PIN+ Release 2, our latest FIDO2 Key that boasts an unmatched advantage: the ability to store up to 300 passkeys (aka resident keys or discoverable credentials). This significant capacity provides unparalleled flexibility and convenience for managing your online accounts securely.
In response to a glaring gap in the market, we are thrilled to introduce the first standalone FIDO2.1 Passkey Management Tool for Windows. Fueled by the necessity for a user-friendly solution, our tool addresses the discomfort users face with command line tools and Chromium-based methods.
Microsoft has recently unveiled a groundbreaking development in user authentication, introducing a game-changing feature of Microsoft Authenticator, at least for accounts protected with FIDO2 Security Keys.