Buy options46.44 USD
|Model Number||Molto-2 v2|
|Form-factor||Cuboid with a TFT Screen|
config protection password
|Google Account||fully compatible|
|Azure On-Prem MFA Server||fully compatible|
|Azure Cloud MFA / Office 365 AD Premium P1 or P2||fully compatible|
|Azure Cloud MFA / Office 365 AD Free/Basic||fully compatible|
|Stripe Dashboard||fully compatible|
|Meraki Dashboard||fully compatible|
|ISDecisions UserLock||fully compatible|
|ESET Secure Authentication||fully compatible|
|Watchguard AuthPoint||fully compatible|
Not listed here
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
Device lock feature newStarting from Molto2 v2.1 there is a possibility of locking the screen using the "Lock" button in the Windows app or using
--lockargument of the molto2.py script. This will hide the OTPs from device's screen until unlock button is clicked or
molto2.py --unlockcommand is issued.
SySS Certified ProductMolto2 has received a 'Certified Product' badge from an independent third-party security assessment conducted by SySS GmbH
Molto-2-v2 Multi-profile TOTP Programmable hardware token
A revised version of our popular multi-profile USB-programmable TOTP hardware token that can now hold up to 100 TOTP accounts. The profiles can be provisioned/configured via USB using one of our Molto-2 USB Config tools. Molto-2-v2 also has additional features such as OTP shown as a QR image and HID/Keyboard emulation feature.
▣ RFC 6238 compliant
▣ supports up to 100 accounts/profiles
▣ USB-programmable with the USB Config tool
▣ USB keyboard emulation (USB cable included)
▣ Two display modes: with one TOTP profile per screen and with five TOTP profiles per screen
▣ RTC battery life: 8 years
▣ LCD screen battery: 3-4 months (rechargeable)
▣ Designed, engineered and programmed in Switzerland
|TOTP Profiles||up to 100|
|Programmable||via USB, Windows app or cross-platform Python script|
|Time step||30 or 60 seconds|
|Hash algorithm||SHA1 or SHA256|
||• Configuration password
• Screen security lock feature (v2.1 or newer)
|OTP Length||4, 6, 8 or 10 digits|
|OTP Entry||Manual, HID-emulation1 or by scanning QR code2 (in Mode1 only)|
Migrate from mobile appsToken2 programmable hardware tokens can be used as drop-in replacement of TOTP mobile apps. Token2 has developed solutions to migrate from apps like Google Authenticator and Authy to any of our hardware tokens.
The micro-USB ports used in Molto2 devices are known to be more fragile (as they are PCB surface mounted), therefore, when unplugging the cable from the port, it is recommended to hold the device and pull the cable only in the direction illustrated below, firmly holding the micro-USB connector head. Unplugging the cable otherwise may damage the port or the PCB. For better protection, we recommend using a magnetic adapter.
Azure AD Authentication methods policy migration
In an effort to enhance security and streamline administration, Microsoft introduced the Authentication methods policy for Azure AD. This policy allows administrators to manage the MFA and SSPR settings from a single location, simplifying the overall user experience. However, it's important to note that the migration process has a limitation when it comes to hardware OATH tokens.
Molto2 Receives "Certified Product" Badge from Independent Third-Party Assessment by SySS GmbH
At our company, we believe in delivering safe and secure products to our customers. That's why we engaged SySS GmbH, an independent third-party security company, to conduct a thorough security assessment of our product, Molto2. We are proud to announce that Molto2 has passed this assessment with flying colors and has received a "Certified Product" badge from SySS GmbH.
Introducing Token2 FIDO2 PIN+: The Security Key That Enforces Strong PIN Complexity
We are excited to announce the upcoming launch of our latest product variation, the Token2 FIDO2 PIN+. The PIN+ series is a new variation of our existing security keys that deviates from the FIDO2 standards to provide stronger PIN complexity enforcement.