How can we help?

On this page, we’ve answered frequently asked questions about authentication in general and the Protectimus two-factor authentication solution in particular. You will learn how multi-factor authentication and OTP tokens work, how to integrate the Protectimus 2FA solution into your infrastructure, and how our billing system and partner program work.

Multi-Factor Authentication (MFA, 3FA) enhances the security of your account by introducing an additional level of verification during the login process. Rather than solely relying on a password, the system may require supplementary confirmation, such as a unique code sent to your phone through an MFA app, chatbot, push notification, SMS, or email. Alternatively, you might be prompted to respond to a confidential question, utilize fingerprint scanning, or employ the face ID functionality.
OTP stands for One-Time Password. It is a password that is valid for only one authentication session. In most cases, such a password has a limited validity time. ОТРs are used in multi-factor authentication systems, where a password is used as the first factor and a token as the second factor.
Our service allows you to pay only for the services that you really need. You can choose any number of services you need and customize your service plan here: https://service.protectimus.com/pricing Use the link above to go to the page where you can click the ‘Configure’ button in the ‘Custom’ service plan section. A pop-up window will appear where you will be able to configure your service plan in accordance with your needs and requirements.
Preset service plans allow us to plan and distribute our resources with better precision; therefore, we offer an additional discount on these plans.
To begin authenticating your users through the Protectimus system, you need to do the following:
  • Register in our service;
  • Create users and assign tokens to users;
  • Create a resource;
  • Assign users created to a project;
  • Download an auxiliary library using our instructions;
  • Activate work with the API by activating a service plan;
Now your users are protected with two-factor authentication from Protectimus!
We currently provide libraries for the following programming languages: Java, Pyton, and PHP. Soon, we will also have libraries for Ruby, .Net, and other programming languages.
To begin authenticating your users through the Protectimus system, you need to do the following:
  • Register in our service;
  • Create users and assign tokens to users;
  • Create a resource;
  • Assign users created to a project;
  • Download an auxiliary library using our instructions;
  • Activate work with the API by activating a service plan;
Now your users are protected with two-factor authentication from Protectimus!
We currently provide libraries for the following programming languages: Java, Pyton, and PHP. Soon, we will also have libraries for Ruby, .Net, and other programming languages.
The Protectimus team is interested in promoting out solution in various spheres and fields worldwide. We are open to all forms of collaboration and ready to reward efforts to promote our cloud service and platform. Therefore, we have developed a reward scheme for customers integrated with our service.
If you are a developer, a reseller, an integrator, or if you have a potential customer, we will be happy to see you among our partners.
The key difference between the platform and the service is that the platform is installed on your equipment, so you are fully responsible for the infrastructure and you monitor the application’s operation. At the same time, the platform can work in closed local area networks, since the Internet connection is not required. The platform can be customized and configured in a way that would optimally meet your needs and requirements.
Our application was written in Java, so it is a cross-platform application.

Send Us A Message

If you have more questions, please use the form below or contact us in another way convenient for you. All  contact details are available on the Contact Us page. As a rule, we respond within one business day.

    Send Us A Message

    If you have more questions, please use the form below or contact us in another way convenient for you. All  contact details are available on the Contact Us page. As a rule, we respond within one business day.

      This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.