AUTH Touch

FIDO2 Security Key,
dual USB connectivity

Safeguarding the Modern Enterprise.

Stop account takeovers and experience effortless secure access with AUTH Touch Security Keys — combining strong hardware-based authentication with a seamless user experience. The FIDO2-certified Key, featuring dual USB interfaces, ensures secure, simple, and scalable authentication.

*Supports PIV (Smartcard) — available on request...

Entry-level
Security Key

01
Phishing-Resistant Authentication
o Built on asymmetric public key cryptography.

o Works only with genuine domains—fake or phishing sites cannot authenticate.
02
Capacitive-Touch
o Detects human touch to confirm presence (no accidental activations).

o Prevents remote attackers from triggering the key without user consent.

o Adds an extra layer of user verification while remaining convenient.
03
FIDO2 Support
o Enables seamless passwordless workflows across supported apps and platforms.

o Eliminates risks of stolen, weak, or reused passwords.

o Complies with FIDO2.1 specifications.
04
Hardware-Backed Security
o Embedded with FIPS 140-2 certified secure element.

o Private keys are stored securely on the device (tamper-resistant design), never shared online
05
online call and software dashboard with 3D elements
Enterprise-Ready
o Corporate-edition of Keys with management via AMS solution.

o Supports firmware updates for future-proof deployment.

AUTH Touch Security Key
Advanced Features

Programmable Slots — strengthens authentication by securely storing credentials, reducing dependency on weak or reused passwords.
  • Supports advanced security functions such as HOTP (HMAC-based One-Time Password) and secure password storage.

  • Generates authentication codes that are automatically transmitted to the connected application via AUTH Manager Tool.

  • Allowsstorage of multiple unique secrets, accessible via AUTH Manager Tool.

  • Enables integration of TOTP (Time-based One-Time Password) codes into the security key through the AUTH Manager Tool.

Customizable PIN Management — granular control for enterprises to enforce security compliance
  • Provides enterprise-level flexibility with configurable PIN policies.

  • Supports configurable PIN strength criteria, complexity rules, and minimum PIN length settings to align with organizational security standards.

Resources

Click below to learn more about product variants and case studies

Collapse Arrow