Buy options38.00 CHF
|Model Number||Molto-2 v2|
|Form-factor||Cuboid with a TFT Screen|
config protection password
|Google Account||fully compatible|
|Azure On-Prem MFA Server||fully compatible|
|Azure Cloud MFA / Office 365 AD Premium P1 or P2||fully compatible|
|Azure Cloud MFA / Office 365 AD Free/Basic||fully compatible|
|Stripe Dashboard||fully compatible|
|Meraki Dashboard||fully compatible|
|ISDecisions UserLock||fully compatible|
|ESET Secure Authentication||fully compatible|
|Watchguard AuthPoint||fully compatible|
Not listed here
Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
Molto-2-v2 Multi-profile TOTP Programmable hardware token
A revised version of our popular multi-profile USB-programmable TOTP hardware token that can now hold up to 100 TOTP accounts. The profiles can be provisioned/configured via USB using one of our Molto-2 USB Config tools. Molto-2-v2 also has additional features such as OTP shown as a QR image and HID/Keyboard emulation feature.
▣ RFC 6238 compliant
▣ supports up to 100 accounts/profiles
▣ USB-programmable with the USB Config tool
▣ USB keyboard emulation (USB cable included)
▣ Two display modes: with one TOTP profile per screen and with five TOTP profiles per screen
▣ RTC battery life: 8 years
▣ LCD screen battery: 3-4 months (rechargeable)
▣ Designed, engineered and programmed in Switzerland
|TOTP Profiles||up to 100|
|Programmable||via USB, Windows app or cross-platform Python script|
|Time step||30 or 60 seconds|
|Hash algorithm||SHA1 or SHA256|
|Configuration protection||Password protected - password can be changed|
|OTP Length||4, 6, 8 or 10 digits|
|OTP Entry||Manual, HID-emulation1 or by scanning QR code2 (in Mode1 only)|
Migrate from mobile appsToken2 programmable hardware tokens can be used as drop-in replacement of TOTP mobile apps. Token2 has developed solutions to migrate from apps like Google Authenticator and Authy to any of our hardware tokens.
1 HID Emulation
If Mode1 display mode is active, the device can send the OTP over USB thanks to HID emulation function built-in. This will allow minimizing the user actions needed to authenticate with any 2FA-enabled system. The video below shows the process of logging in to a Gmail account using this feature (the user selects Google profile on the device and presses a button instead of typing in the 6 digits. Molto-2 will also submit the form as it sends the Enter key together with OTP)
2 OTP as QRIf Mode1 display mode is active, the devices showing the OTP as a QR code have the most potential of greatly improving user experience, especially with custom apps, if QR scanning in implemented.
Buttons and screen elements
Molto-2 physical buttons and visual display elements are described in the figure below:
Molto-2 v2 supports two display modes: one TOTP profile per screen (Mode1) or 5 TOTP profiles per screen (Mode2).
You can switch between modes by long pressing the M button on the device (see video demonstration below)
Unplugging the USB cable
The micro-USB port used in Molto2 devices are known to be more fragile (as they are PCB surface mounted), therefore, when unplugging the cable from the port, it is recommended to hold the device and pull the cable only in the direction illustrated below, firmly holding the micro-USB connector head. Unplugging the cable otherwise may damage the port or the PCB.
molto2.py - Molto2 USB Config tool
molto2.py is a solution developed by Token2 to program and configure the Molto2v2 TOTP hardware tokens using pyscard python library. It works under Linux, macOS and Windows.
Introducing Passwordless Login for Our Website!
At Token2, we are always looking for ways to improve the user experience and make it as convenient and secure as possible. That's why we are excited to announce the addition of a passwordless login option for our website.
Provisioning Token2 TOTP programmable tokens - a universal guide
We have a lot of integration guides describing the process of enrolling our programmable tokens with different systems, such as Google, Microsoft, Facebook and many others.