Buy options
24.47 USDModel Number | C302-i |
---|---|
Form-factor | dongle |
Functions | TOTP configurable |
Dimensions | 49×26×8 mm |
Weight | 17 gr |
Programmable | 1 profile unrestricted time sync |
Product ID | T2-52 |
Wordpress | fully compatible | |
---|---|---|
Google Account | fully compatible | |
Azure On-Prem MFA Server | fully compatible | |
Azure Cloud MFA / Office 365 AD Premium P1 or P2 | fully compatible | |
Azure Cloud MFA / Office 365 AD Free/Basic | fully compatible | |
Stripe Dashboard | fully compatible | |
Meraki Dashboard | fully compatible | |
ISDecisions UserLock | fully compatible | |
ESET Secure Authentication | fully compatible | |
Watchguard AuthPoint | fully compatible | |
Duo | fully compatible | |
WebUntis | fully compatible | |
Not listed here |
Write us |
|
If the system you are using is not included in the compatibility list, it does not necessarily indicate incompatibility. We encourage you to refer to our integration guides page or get in touch with us for more information. |
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
Token2 C302-i programmable hardware token
NFC programmable hardware token in a classic keyfob/dongle format than can be programmed using our burner apps available for Android, iPhone, macOS※, Linux※ or Windows※
※ - require additional NFC Writer hardware, different for each platform
Specifications:
Built-in Button, 6 Character LCD Screen
Security Algorithm: TOTP
OTP Length: 6 digits
OTP Time interval: 30 seconds
Hash algorithm: sha1 (default) or sha256 (set using NFC burner)
Dimensions: 49.8 x 26 x 8.25mm
Water & dust resistance: IP67
Operating Temperature: 0°C .. 50°C
Tamper Evident / Tamper Protection
Battery Type: Lithium Magnesium
Battery Lifetime: 5-6 Years (depending on usage)
Programmable: Yes
Maximal seed length: 63 bytes (126 hex / 101 base32)
Time sync: Yes [unrestricted: setting time will keep the seed intact]
NFC Burner for iOS
The burner app for iPhones is ready and can be installed from Apple AppStore. In addition to burning the seeds, the app will also allow configuring advanced settings, such as the hash algorithm (sha-1 or sha-2), the time offset (30 seconds or 60 seconds), the display power-off time out (from 15 seconds to 120 seconds) and time synchronization.Compatibility
All iPhones starting from iPhone 7 support NFC (iPhone 6 and 6S have the required hardware but Apple somehow botched the implementation so it’s not usable to third parties). None of the iPad models has the chip, nor do iPod touch devices. While our burner app will most probably work on all devices mentioned above, we were only able to test on the following models so far: iPhone 8, iPhone X, iPhone 11You can attach this token to a keyring with an additional accessory, a rope loop, which is included for free with every token ordered
read more...Related products
NFC Reader/Writer device for Token2 NFC Burner for Windows and T2F2-NFC FIDO2 Keys
NFC Reader/Writer device for Token2 NFC ...
OrderSilicone Case for key fob type hardware tokens (C202, C301i and C302i)
Silicone Case for key fob type hardware ...
OrderBlog
21-11-2024
New iOS 18.1 Update Breaks Support for FIDO2.1 Final Keys
The latest iOS 18.1 release has introduced an unexpected issue affecting FIDO2.1 Final keys, rendering them incompatible with the new update. This issue is not limited to Token2's security keys but impacts devices from all manufacturers adhering to the FIDO2.1 final specification.
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.