Buy options
5.26 CHFPlease check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
TOTPRadius user license
5.26 CHF
About TOTPRadius
TOKEN2 TOTPRadius provides the RADIUS RFC-2865 for TOTP RFC-6238 based authentication. With TOTPRadius you can integrate a large variety of third-party products and systems with multifactor authentication. It works with numerous products and services like Cisco Meraki, Citrix XenApp/XenDesktop, VMWare View, and many others that provide support for RADIUS servers to validate the second factor for user authentication.
TOTPRadius user licenses are per-user and perpetual. Perpetual licenses do not expire, so you can continue to use the appliance as long as you want. Currently, these licenses are including access to product updates within the same version branch and regular technical support.
How to generate the license key
After completing the purchase you will receive an email containing the order URL. To generate the TOTPRadius user licenses, click on the "generate CAL" button on the order page and provide the Host ID. The license key will be generated and sent to your email address.
Blog
21-11-2024
New iOS 18.1 Update Breaks Support for FIDO2.1 Final Keys
The latest iOS 18.1 release has introduced an unexpected issue affecting FIDO2.1 Final keys, rendering them incompatible with the new update. This issue is not limited to Token2's security keys but impacts devices from all manufacturers adhering to the FIDO2.1 final specification.
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.