|Azure On-Prem MFA Server||fully compatible|
|Azure Cloud MFA / Office 365 AD Premium P1 or P2||fully compatible|
|Watchguard AuthPoint||fully compatible|
|ESET Secure Authentication||fully compatible|
|Google Account||not compatible|
|Meraki Dashboard||not compatible|
Not listed here
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
Token2 C202 classic TOTP hardware token with SHA1 hash
please note that C202 replaces the retired C200 and C101 models
- Built-in Button, 6 Character LCD Screen
- Security Algorithm: TOTP as per RFC6238 with SHA1 hash
- OTP Length: 6 digits
- OTP Time interval: 30 seconds
- Dimensions: 49.8 x 26 x 8.25mm
- Water resistance: IP67
- Secret hash: random - factory programmed
- Hardware Certification: RoHS Compliant
- Operating Temperature: -10°C .. 50°C
- Tamper Evident / Tamper Protection
- Battery Type: Standard Lithium Battery
- Battery Lifetime: 5-7 Years (depending on usage)
Independent Compliance Check
RFC6238 compliance confirmed by CertX, the first swiss accredited certification body for product certification in the scope of industrial cybersecurity and functional safety.
TOKEN2 C202 TOTP hardware token - Independent Compliance Check report by CertX
You can attach this token to a keyring with an additional accessory, a rope loop, which is included for free with every token orderedread more...
Silicone Case for key fob type hardware tokens (C202, C301i and C302i)
Silicone Case for key fob type hardware ...Order
iOS Mail or Outlook App for Office 365 Users with Passwordless Authentication
As more and more organizations adopt a passwordless method of authentication, users are faced with the challenge of configuring their email accounts on their mobile devices.
Unlocking the Benefits of Azure Passwordless with FIDO2 Keys
We understand that some of our customers have questions and concerns about migrating to Azure Passwordless with FIDO2 keys. With this blog post, we aim to address and clarify some of the common queries that may arise regarding the technology.
Top myths about FIDO2 security keys and Passwordless access
We have been getting quite a lot of questions about the security level of FIDO keys, in the light of some recent news and research papers covering potential vulnerabilities of both the protocol stack itself and the hardware of certain implementations.