We normally do not provide free samples. If you want to test the functionality, feel free to use our virtual TOTP toolset. It fully emulates our hardware tokens.
All our token models support Azure Cloud MFA as long as your Azure AD license is P1 or P2. If you do not have any Azure AD license, you can still benefit from our tokens, but only the programmable ones. They act as a drop-in replacement of mobile authenticator apps (i.e. Microsoft Authenticator or Google Authenticator).
Discounts are possible with orders starting from 50 units. To request a discounted quote, add the products to the basket, proceed with the checkout and at the final phase, click on Request quote button.
This depends on the authentication system itself. If the system supports importing the seeds (custom secret keys), then normally there is no limitation. For example, with Office 365 Azure MFA OATH TOTP feature, one token can be assigned to multiple users even within the same tenant. Right now Azure MFA does not check hardware token uniqueness at all (neither the serial number nor the seed), so, for instance, two users sitting in the same room may share a single token. Other services, like Google or Facebook, do not allow custom seeds to be imported, instead, they generate the seed at the server side and show it as a QR code and base32 string only once during the enrollment. These services are meant to be used with TOTP mobile apps on smartphones only, where users are supposed to scan the QR code using the phone to add the profile to the mobile authenticator app (such as Google Authenticator). Our programmable tokens can be used to eliminate the requirement of possessing a smartphone, the seed encoded in the QR code can be transferred to the programmable token so it can be used as a standalone TOTP device. (the process of transferring the seed to the token requires an Android phone or a Windows PC with NFC module- but this is for initial provisioning only, subsequent user logins can be done using the token only. So, with systems like Google Account, you cannot have one token assigned to more than one user, as there is no control over the seeds. There is, however, a theoretical possibility of using the token "programmed" to be used with a Google account with Azure MFA: you should save the base32 seed shown by Google when enrolling and import it to Azure MFA, so the seeds of Google and Azure MFA will be the same and therefore the same token can be used for both services.
DUO supports TOTP hardware tokens, but they have not fully implemented the time drift adjustment as per RFC6238. So, after some time, the tokens' hardware clock will become out of sync and the OTP codes will not be accepted by DUO authentication servers because of the system clock not matching. The time of the token then needs to be adjusted keeping the current seed intact. This is only possible with Token2 programmable tokens with unrestricted time sync: miniOTP-2 and OTPC-P1. Read more about using Token2 hardware tokens with DUO here.