Buy options
€18.00Model Number | OTPC-N |
---|---|
Form-factor | credit card |
Functions | TOTP sha1 |
Dimensions | 85.60 × 53.98 × 0.84 mm |
Weight | 5 gr |
Programmable | |
Product ID | T2-59 |
Wordpress | fully compatible | |
---|---|---|
Azure On-Prem MFA Server | fully compatible | |
Azure Cloud MFA / Office 365 AD Premium P1 or P2 | fully compatible | |
Watchguard AuthPoint | fully compatible | |
ESET Secure Authentication | fully compatible | |
Google Account | not compatible | |
Meraki Dashboard | not compatible | |
Not listed here |
Write us |
|
If the system you are using is not included in the compatibility list, it does not necessarily indicate incompatibility. We encourage you to refer to our integration guides page or get in touch with us for more information. |
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
OTPC-N classic TOTP Display card - nonbranded
Non-branded (white) version of the OTPC-N TOTP card. No logo/branding applied. Vinyl stickers can be used (printing on the cards is not possible).
Specifications
Form-factor: credit card
Algorithm: TOTP
Time offset: 30 seconds
Number of digits: 6
Clock accuracy :
Screen type: e-Ink
Screen size: 20 × 5 mm
Dimensions: 85.60 × 53.98 × 0.84 mm
Weight: 5 gr
Expected lifetime: 3-5 years
Nonprogrammable
Obtaining the seeds/secrets/CSV files for TOTP tokens
The process of requesting factory-set seeds for Token2 hardware tokens is described here.Blog
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.
24-05-2024
Reminder: Our management tools for FIDO2.1 Security Keys are Open Source!
Just a quick reminder: our FIDO2.1 Manager tool, your go-to solution for managing FIDO2 credentials securely, is fully open source! Both the Windows version, created with PowerShell, and a Linux (C++ and Python) version are available.