|Model Number||Molto-2 v2|
|Form-factor||Cuboid with a TFT Screen|
config protection password
|Google Account||fully compatible|
|Azure On-Prem MFA Server||fully compatible|
|Azure Cloud MFA / Office 365 AD Premium P1 or P2||fully compatible|
|Azure Cloud MFA / Office 365 AD Free/Basic||fully compatible|
|Stripe Dashboard||fully compatible|
|Meraki Dashboard||fully compatible|
|ISDecisions UserLock||fully compatible|
|ESET Secure Authentication||fully compatible|
|Watchguard AuthPoint||fully compatible|
Not listed here
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
Molto-2-v2 Multi-profile TOTP Programmable hardware token
A revised version of our popular multi-profile USB-programmable TOTP hardware token that can now hold up to 100 TOTP accounts. The profiles can be provisioned/configured via USB using one of our Molto-2 USB Config tools. Molto-2-v2 also has additional features such as OTP shown as a QR image and HID/Keyboard emulation feature.
▣ RFC 6238 compliant
▣ supports up to 100 accounts/profiles
▣ USB-programmable with the USB Config tool
▣ USB keyboard emulation (USB cable included)
▣ Two display modes: with one TOTP profile per screen and with five TOTP profiles per screen
▣ RTC battery life: 8 years
▣ LCD screen battery: 3-4 months (rechargeable)
▣ Designed, engineered and programmed in Switzerland
|TOTP Profiles||up to 100|
|Programmable||via USB, Windows app or cross-platform Python script|
|Time step||30 or 60 seconds|
|Hash algorithm||SHA1 or SHA256|
||• Configuration password
• Screen security lock feature (v2.1 or newer)
|OTP Length||4, 6, 8 or 10 digits|
|OTP Entry||Manual, HID-emulation1 or by scanning QR code2 (in Mode1 only)|
Migrate from mobile appsToken2 programmable hardware tokens can be used as drop-in replacement of TOTP mobile apps. Token2 has developed solutions to migrate from apps like Google Authenticator and Authy to any of our hardware tokens.
1 HID Emulation
If Mode1 display mode is active, the device can send the OTP over USB thanks to HID emulation function built-in. This will allow minimizing the user actions needed to authenticate with any 2FA-enabled system. The video below shows the process of logging in to a Gmail account using this feature (the user selects Google profile on the device and presses a button instead of typing in the 6 digits. Molto-2 will also submit the form as it sends the Enter key together with OTP)
2 OTP as QRIf Mode1 display mode is active, the devices showing the OTP as a QR code have the most potential of greatly improving user experience, especially with custom apps, if QR scanning in implemented.
Buttons and screen elements
Molto-2 physical buttons and visual display elements are described in the figure below:
Molto-2 v2 supports two display modes: one TOTP profile per screen (Mode1) or 5 TOTP profiles per screen (Mode2).
You can switch between modes by long pressing the M button on the device (see video demonstration below)
Unplugging the USB cable
The micro-USB ports used in Molto2 devices are known to be more fragile (as they are PCB surface mounted), therefore, when unplugging the cable from the port, it is recommended to hold the device and pull the cable only in the direction illustrated below, firmly holding the micro-USB connector head. Unplugging the cable otherwise may damage the port or the PCB.
Device lock feature newStarting from Molto2 v2.1 there is a possibility of locking the screen using the "Lock" button in the Windows app or using
--lockargument of the molto2.py script. This will hide the OTPs from device's screen until unlock button is clicked or
molto2.py --unlockcommand is issued.
iOS Mail or Outlook App for Office 365 Users with Passwordless Authentication
As more and more organizations adopt a passwordless method of authentication, users are faced with the challenge of configuring their email accounts on their mobile devices.
Unlocking the Benefits of Azure Passwordless with FIDO2 Keys
We understand that some of our customers have questions and concerns about migrating to Azure Passwordless with FIDO2 keys. With this blog post, we aim to address and clarify some of the common queries that may arise regarding the technology.
Top myths about FIDO2 security keys and Passwordless access
We have been getting quite a lot of questions about the security level of FIDO keys, in the light of some recent news and research papers covering potential vulnerabilities of both the protocol stack itself and the hardware of certain implementations.