With UserLock, you can choose between two different 2FA authentication methods: authenticator applications or programmable hardware tokens.
Many organizations choose an authentication app to balance security, ease of use and cost.
Programmable security tokens or security keys are also a secure, simple way to implement MFA, especially for end-users who don’t have access to a corporate smartphone.
In both TOTP and HOTP, the token (the OTP generator) generates a numeric code. The OTP’s security is based on the fact that the codes are constantly changing (because they’re single use – hence the name!). HOTP works just like TOTP, except that an authentication counter is used instead of a timestamp.