Buy options
36.22 GBPModel Number | Molto-2 v2 |
---|---|
Form-factor | Cuboid with a TFT Screen |
Functions | TOTP configurable |
Dimensions | 74×53×12.9 mm |
Weight | 40 gr |
Programmable |
100 profiles config protection password HID/Keyboard emulation |
Product ID | T2-72 |
Wordpress | fully compatible | |
---|---|---|
Google Account | fully compatible | |
Azure On-Prem MFA Server | fully compatible | |
Azure Cloud MFA / Office 365 AD Premium P1 or P2 | fully compatible | |
Azure Cloud MFA / Office 365 AD Free/Basic | fully compatible | |
Stripe Dashboard | fully compatible | |
Meraki Dashboard | fully compatible | |
ISDecisions UserLock | fully compatible | |
ESET Secure Authentication | fully compatible | |
Watchguard AuthPoint | fully compatible | |
Duo | fully compatible | |
WebUntis | fully compatible | |
Not listed here |
Write us |
|
If the system you are using is not included in the compatibility list, it does not necessarily indicate incompatibility. We encourage you to refer to our integration guides page or get in touch with us for more information. |
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
Device lock feature new
Starting from Molto2 v2.1 there is a possibility of locking the screen using the "Lock" button in the Windows app or using--lock
argument of the molto2.py script. This will hide the OTPs from device's screen until unlock button is clicked or molto2.py --unlock
command is issued.SySS Certified Product
Molto2 has received a 'Certified Product' badge from an independent third-party security assessment conducted by SySS GmbHMolto-2-v2 Multi-profile TOTP Programmable hardware token
A revised version of our popular multi-profile USB-programmable TOTP hardware token that can now hold up to 100 TOTP accounts. The profiles can be provisioned/configured via USB using one of our Molto-2 USB Config tools. Molto-2-v2 also has additional features such as OTP shown as a QR image and HID/Keyboard emulation feature.
▣ RFC 6238 compliant
▣ supports up to 100 accounts/profiles
▣ USB-programmable with the USB Config tool
▣ USB keyboard emulation (USB cable included)
▣ Two display modes: with one TOTP profile per screen and with five TOTP profiles per screen
▣ RTC battery life: 8 years
▣ LCD screen battery: 3-4 months (rechargeable)
▣ Designed, engineered and programmed in Switzerland
Specifications
Dimensions | 74x53x12.9 mm |
TOTP Profiles | up to 100 |
Programmable | via USB, Windows app or cross-platform Python script |
Time sync | Yes1 |
Time step | 30 or 60 seconds |
Hash algorithm | SHA1 or SHA256 |
Protection |
• Configuration password • Screen security lock feature (v2.1 or newer) |
OTP Length | 4, 6, 8 or 10 digits |
OTP Entry | Manual, HID-emulation2 or by scanning QR code3 (in Mode1 only) |
1 - Time synchronization is performed using one of the USB configuration tools. The expected time drift is between 1 and 30 seconds per year (depending on ambient temperature), and a periodic sync of the system clock may be required (i.e., every 1 or 2 years, depending on the drift tolerance of the authentication system).
2 - HID functionality will allow sending the current OTP via keyboard emulation when connected over USB. Instead of entering the OTP manually, pressing the 'M' button is sufficient.
3 - The current OTP will be displayed as a QR image. This is useful when automating OTP entry on a different system (e.g., a mobile app) to avoid typing errors. An example where this is particularly useful is EVV (Electronic Visit Verification).
Migrate from mobile apps
Token2 programmable hardware tokens can be used as drop-in replacement of TOTP mobile apps. Token2 has developed solutions to migrate from apps like Google Authenticator and Authy to any of our hardware tokens (or mobile apps).Functionality overview
The micro-USB ports used in Molto2 devices are known to be more fragile (as they are PCB surface mounted), therefore, when unplugging the cable from the port, it is recommended to hold the device and pull the cable only in the direction illustrated below, firmly holding the micro-USB connector head. Unplugging the cable otherwise may damage the port or the PCB. For better protection, we recommend using a magnetic adapter.
Related products
Blog
03-12-2024
Automated FIDO2 Registration for Entra ID
At Token2, we work to provide organizations with easy-to-use tools. We're excited to share our new manual on FIDO2 Key Automated Registration for Entra ID.
25-11-2024
Shipping to Ukraine: Our New Partnership with Nova Post
After encountering issues with other carriers, we partnered with Nova Poshta for deliveries to Ukraine. Successful test shipments now allow us to proudly offer faster, more reliable delivery with better tracking and service for our Ukrainian customers.
22-11-2024
Self-Service for Hardware OATH Tokens in Entra ID with SHA256 Support
A recent update to Microsoft Entra ID now allows end-users to self-service hardware OATH tokens, removing the need for administrators to manually activate them. Admins can upload hardware tokens into a "public repository" via Graph API, allowing users to assign tokens to their accounts independently.