How can we help?
On this page, we’ve answered frequently asked questions about authentication in general and the Protectimus two-factor authentication solution in particular. You will learn how multi-factor authentication and OTP tokens work, how to integrate the Protectimus 2FA solution into your infrastructure, and how our billing system and partner program work.
What is Multi-Factor Authentication (MFA)?
Multi-Factor Authentication (MFA, 3FA) enhances the security of your account by introducing an additional level of verification during the login process. Rather than solely relying on a password, the system may require supplementary confirmation, such as a unique code sent to your phone through an MFA app, chatbot, push notification, SMS, or email. Alternatively, you might be prompted to respond to a confidential question, utilize fingerprint scanning, or employ the face ID functionality.
What does ОТРmean?
OTP stands for One-Time Password. It is a password that is valid for only one authentication session. In most cases, such a password has a limited validity time. ОТРs are used in multi-factor authentication systems, where a password is used as the first factor and a token as the second factor.
Can the service plan I choose be customized to better meet my needs and requirements?
Our service allows you to pay only for the services that you really need. You can choose any number of services you need and customize your service plan here: https://service.protectimus.com/pricing Use the link above to go to the page where you can click the ‘Configure’ button in the ‘Custom’ service plan section. A pop-up window will appear where you will be able to configure your service plan in accordance with your needs and requirements.
Why does a customized service plan cost more than a preset plan with the same parameters?
Preset service plans allow us to plan and distribute our resources with better precision; therefore, we offer an additional discount on these plans.
What do I need to do to configure support of two-factor authentication on my website?
To begin authenticating your users through the Protectimus system, you need to do the following:
- Register in our service;
- Create users and assign tokens to users;
- Create a resource;
- Assign users created to a project;
- Download an auxiliary library using our instructions;
- Activate work with the API by activating a service plan;
What programming languages do you provide integration libraries for?
We currently provide libraries for the following programming languages: Java, Pyton, and PHP. Soon, we will also have libraries for Ruby, .Net, and other programming languages.
What do I need to do to configure support of two-factor authentication on my website?
To begin authenticating your users through the Protectimus system, you need to do the following:
- Register in our service;
- Create users and assign tokens to users;
- Create a resource;
- Assign users created to a project;
- Download an auxiliary library using our instructions;
- Activate work with the API by activating a service plan;
What programming languages do you provide integration libraries for?
We currently provide libraries for the following programming languages: Java, Pyton, and PHP. Soon, we will also have libraries for Ruby, .Net, and other programming languages.
What is the affiliate program offered by Protectimus?
The Protectimus team is interested in promoting out solution in various spheres and fields worldwide. We are open to all forms of collaboration and ready to reward efforts to promote our cloud service and platform. Therefore, we have developed a reward scheme for customers integrated with our service.
Who can become a partner?
If you are a developer, a reseller, an integrator, or if you have a potential customer, we will be happy to see you among our partners.
How is the platform different from the service? Why do I need the platform, and what are its advantages?
The key difference between the platform and the service is that the platform is installed on your equipment, so you are fully responsible for the infrastructure and you monitor the application’s operation. At the same time, the platform can work in closed local area networks, since the Internet connection is not required. The platform can be customized and configured in a way that would optimally meet your needs and requirements.
What OS can the platform be installed in?
Our application was written in Java, so it is a cross-platform application.
Send Us A Message
If you have more questions, please use the form below or contact us in another way convenient for you. All  contact details are available on the Contact Us page. As a rule, we respond within one business day.
Send Us A Message
If you have more questions, please use the form below or contact us in another way convenient for you. All  contact details are available on the Contact Us page. As a rule, we respond within one business day.