Buy options
47.83 USDModel Number | Molto-2 v2 |
---|---|
Form-factor | Cuboid with a TFT Screen |
Functions | TOTP configurable |
Dimensions | 74×53×12.9 mm |
Weight | 40 gr |
Programmable |
100 profiles config protection password HID/Keyboard emulation |
Product ID | T2-72 |
Wordpress | fully compatible | |
---|---|---|
Google Account | fully compatible | |
Azure On-Prem MFA Server | fully compatible | |
Azure Cloud MFA / Office 365 AD Premium P1 or P2 | fully compatible | |
Azure Cloud MFA / Office 365 AD Free/Basic | fully compatible | |
Stripe Dashboard | fully compatible | |
Meraki Dashboard | fully compatible | |
ISDecisions UserLock | fully compatible | |
ESET Secure Authentication | fully compatible | |
Watchguard AuthPoint | fully compatible | |
Duo | fully compatible | |
WebUntis | fully compatible | |
Not listed here |
Write us |
|
If the system you are using is not included in the compatibility list, it does not necessarily indicate incompatibility. We encourage you to refer to our integration guides page or get in touch with us for more information. |
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
Device lock feature new
Starting from Molto2 v2.1 there is a possibility of locking the screen using the "Lock" button in the Windows app or using--lock
argument of the molto2.py script. This will hide the OTPs from device's screen until unlock button is clicked or molto2.py --unlock
command is issued.SySS Certified Product
Molto2 has received a 'Certified Product' badge from an independent third-party security assessment conducted by SySS GmbHMolto-2-v2 Multi-profile TOTP Programmable hardware token
A revised version of our popular multi-profile USB-programmable TOTP hardware token that can now hold up to 100 TOTP accounts. The profiles can be provisioned/configured via USB using one of our Molto-2 USB Config tools. Molto-2-v2 also has additional features such as OTP shown as a QR image and HID/Keyboard emulation feature.
▣ RFC 6238 compliant
▣ supports up to 100 accounts/profiles
▣ USB-programmable with the USB Config tool
▣ USB keyboard emulation (USB cable included)
▣ Two display modes: with one TOTP profile per screen and with five TOTP profiles per screen
▣ RTC battery life: 8 years
▣ LCD screen battery: 3-4 months (rechargeable)
▣ Designed, engineered and programmed in Switzerland
Specifications
Dimensions | 74x53x12.9 mm |
TOTP Profiles | up to 100 |
Programmable | via USB, Windows app or cross-platform Python script |
Time sync | Yes1 |
Time step | 30 or 60 seconds |
Hash algorithm | SHA1 or SHA256 |
Protection |
• Configuration password • Screen security lock feature (v2.1 or newer) |
OTP Length | 4, 6, 8 or 10 digits |
OTP Entry | Manual, HID-emulation2 or by scanning QR code3 (in Mode1 only) |
1 - Time synchronization is performed using one of the USB configuration tools. The expected time drift is between 1 and 30 seconds per year (depending on ambient temperature), and a periodic sync of the system clock may be required (i.e., every 1 or 2 years, depending on the drift tolerance of the authentication system).
2 - HID functionality will allow sending the current OTP via keyboard emulation when connected over USB. Instead of entering the OTP manually, pressing the 'M' button is sufficient.
3 - The current OTP will be displayed as a QR image. This is useful when automating OTP entry on a different system (e.g., a mobile app) to avoid typing errors. An example where this is particularly useful is EVV (Electronic Visit Verification).
Migrate from mobile apps
Token2 programmable hardware tokens can be used as drop-in replacement of TOTP mobile apps. Token2 has developed solutions to migrate from apps like Google Authenticator and Authy to any of our hardware tokens (or mobile apps).Functionality overview
The micro-USB ports used in Molto2 devices are known to be more fragile (as they are PCB surface mounted), therefore, when unplugging the cable from the port, it is recommended to hold the device and pull the cable only in the direction illustrated below, firmly holding the micro-USB connector head. Unplugging the cable otherwise may damage the port or the PCB. For better protection, we recommend using a magnetic adapter.
Related products
Blog
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.
24-05-2024
Reminder: Our management tools for FIDO2.1 Security Keys are Open Source!
Just a quick reminder: our FIDO2.1 Manager tool, your go-to solution for managing FIDO2 credentials securely, is fully open source! Both the Windows version, created with PowerShell, and a Linux (C++ and Python) version are available.