How can we help?

On this page, we’ve answered frequently asked questions about authentication in general and the Protectimus two-factor authentication solution in particular. You will learn how multi-factor authentication and OTP tokens work, how to integrate the Protectimus 2FA solution into your infrastructure, and how our billing system and partner program work.

Multi-Factor Authentication (MFA, 3FA) enhances the security of your account by introducing an additional level of verification during the login process. Rather than solely relying on a password, the system may require supplementary confirmation, such as a unique code sent to your phone through an MFA app, chatbot, push notification, SMS, or email. Alternatively, you might be prompted to respond to a confidential question, utilize fingerprint scanning, or employ the face ID functionality.

OTP stands for One-Time Password. It is a password that is valid for only one authentication session. In most cases, such a password has a limited validity time. ОТРs are used in multi-factor authentication systems, where a password is used as the first factor and a token as the second factor.

A one-time password is generated with a secret key that is ‘built into’ your token and that is known only to our service. No other device can generate the correct one-time password without the knowledge of secret and securely protected information. We use password generation algorithms that virtually eliminate the possibility of a password getting hacked.


Since a token is not connected to a server in any way, it is impossible to intercept a password while it is being transferred.


A potential intruder may try to simply come up with the correct password by trying various combinations of characters, but the system is well protected against this type of attack – after a certain number of attempts, an account is locked for 5 minutes, which renders such an attack ineffective.

Today, multi-factor authentication with one-time passwords is widely recognized as the most reliable and effective mechanism of protection against unauthorized access. The ОТР mechanism is more reliable that authentication based on biometric parameters and undoubtedly much more reliable than regular static passwords.

The problem with biometric authentication is that a parameter verified can be copied, but it can’t be modified. It is easy to obtain a person’s fingerprint and make a copy of it, but a person’s fingerprint cannot be changed or modified, unlike a token that can be re-issued. Besides, how would you even know that your biometric data was copied?


Of course, many attempts have been made to improve the mechanism, and it is not as easy to trick the modern scanners – they are smart enough to distinguish between a real person and a mechanical copy. But it makes little sense to try to outsmart a scanner, because in the end the scan result is transformed into a set of digital characters. And, as already mentioned above, biometric parameters do not change, which means that once such data is lost, your authenticators (your fingerprints, your eye retina, etc.) are compromised forever.


Besides, biometric authentication always involves assessment that’s probabilistic in nature; it is aimed at assessing a tested sample’s equivalence to the reference standard. Therefore, depending on the settings, there is either a chance that access to the system will be given to a person with similar characteristics or a chance that a valid user will not be given access to the system.


Moreover, when one considers all the various ways in which potential intruders can gain access to one’s biometric data, one begins to doubt whether it is reasonable to use biometric data at all.


ОТРs eliminate the possibility of all the situations described above.In our opinion, biometrics can serve as an effective identification tool, but the task of authentication is best left to ОТРs.

Our solution operates based on the OATH standards accepted in the two-factor authentication industry worldwide.

Contact us through the feedback form! If your idea is indeed interesting, we will find a way to express our gratitude.

If you have found a bug in our system, contact us using any method convenient for you; we will fix the bug as soon as possible, and you will be rewarded for your help.

We are an open innovative company interested in various forms of mutually beneficial collaboration. We are ready to encourage ideas that will help us optimize our expenses, increase our profits, and improve to become a better company. Learn about our affiliate program, or share your ideas, comments, and recommendations through the feedback form.

Our service allows you to pay only for the services that you really need. You can choose any number of services you need and customize your service plan here: https://service.protectimus.com/pricing Use the link above to go to the page where you can click the ‘Configure’ button in the ‘Custom’ service plan section. A pop-up window will appear where you will be able to configure your service plan in accordance with your needs and requirements.
Preset service plans allow us to plan and distribute our resources with better precision; therefore, we offer an additional discount on these plans.

You can change, temporarily suspend, or activate a service plan at any time.

Most likely, you have created more objects than the service plan you are interested in allows. You need either to use a service plan that has a sufficient range of services or to have fewer objects to be able to use a less expensive service package.

Of course, you can suspend payments from your account if necessary by clicking the ‘Deactivate’ button in the column specifying your current service plan on this page: pricing Once your plan is deactivated, your account will be debited for the amount of payment for the current date. Your account will not be further debited until the plan is re-activated.Please note that if your service plan is not active, you will not be able to use the API, which means that you will not be able to authenticate your users through our system.

If you allowed for our system credit to be used, the system will continue to work even with a negative balance in your account. If the credit limit has been used up, and your account has not been replenished, the system’s services will be temporarily suspended.

We realize the importance of our system for the success of your business, and we will keep the system working for you even when your account balance reaches zero. The system will continue to work even when you are “in the red”, giving you ‘system credit’ which you must repay when you replenish your account; please note that no commission fee is charged for this service. The credit amount depends on the amount of services you purchased in the last 12 months. Also, you will receive a notification when your account balance is critically close to zero, to make sure that the system does not stop working due to lack of funds in your account. You can enable or disable the ‘Credit’ service in your profile in Protectimus Service, in the ‘Financial Settings’ tab.

For an active service plan, your account is debited once a day. It happens either according to a specific schedule, or following the first deactivation of a service plan.

To begin authenticating your users through the Protectimus system, you need to do the following:
  • Register in our service;
  • Create users and assign tokens to users;
  • Create a resource;
  • Assign users created to a project;
  • Download an auxiliary library using our instructions;
  • Activate work with the API by activating a service plan;
Now your users are protected with two-factor authentication from Protectimus!

We currently provide libraries for the following programming languages: Java, Pyton, and PHP. Soon, we will also have libraries for Ruby, .Net, and other programming languages.

Yes, that’s absolutely correct. We have done everything we can to make the integration process as simple as possible. We offer different levels of integration: from authentication to full-scale management of tokens, users, and resources through the API. If you choose the basic support of two-factor authentication on your resource, the integration process will take about 2 hours. Naturally, the integrator level and your system’s complexity level should be taken into consideration.

A token is a device or software used to generate one-time passwords.
To prevent negative consequences of a token being stolen, there is a PIN code that eliminates the possibility of a potential intruder using a stolen token. A PIN code is a set of 4 digits entered by the user when a token is issued. Besides, unlike a regular static password, theft of a token is always easy to discover, which means that a user can quickly lock and re-issue a token to prevent a potential intruder’s malicious and/or unauthorized actions.
We support tokens that operate based on the standard OATH algorithms: by time, by event, and by server response.Both software and hardware tokens can be used.

We offer a wide variety of Protectimus tokens optimized for use in our system. In addition, you can use other standard tokens, for example: SafeNet, Yubico, and Google Authenticator.

Yes, you can. Please contact our support service.

The number of stars shows a token’s integrity level. The more golden stars, the higher a token’s level of reliability. The integrity level depends on how the secret key is stored, what algorithm is used, and how difficult it is for a potential intruder to access a generated password.

To prevent a token from getting stolen, there is a PIN code that makes it impossible for a potential intruder to use a stolen token. So, use your PIN code.


Besides, unlike a regular static password, theft of a token is always easy to discover, which means that a user can quickly lock his/her account to prevent a potential intruder’s malicious and/or unauthorized actions.

A token does not need to be connected to a server to generate a password; therefore, it is impossible to intercept a password while it is being transferred.

A token is a stand-alone device that independently generates a one-time password. No access to any network(s) is required.

The Protectimus team is interested in promoting out solution in various spheres and fields worldwide. We are open to all forms of collaboration and ready to reward efforts to promote our cloud service and platform. Therefore, we have developed a reward scheme for customers integrated with our service.
If you are a developer, a reseller, an integrator, or if you have a potential customer, we will be happy to see you among our partners.

To become our partner, you will need to complete the process of registration that will not take much time.

After a customer’s registration and their referral confirmation of you as the person that recommended our solution, you will be receiving 10% of all this customer’s payments for services for a period of one year.

There are two options for using the money you earn: you can cash it or transfer it to any Protectimus account. If you choose the latter option, the amount you will receive will be increased by 25%.

It is very easy. You can specify the withdrawal amount and the payment recipient’s account details by clicking on your email in the right-hand upper corner in the service and then going to the Affiliate Program section. After verifying all the details, the operator will make a payment.

The key difference between the platform and the service is that the platform is installed on your equipment, so you are fully responsible for the infrastructure and you monitor the application’s operation. At the same time, the platform can work in closed local area networks, since the Internet connection is not required. The platform can be customized and configured in a way that would optimally meet your needs and requirements.
Our application was written in Java, so it is a cross-platform application.

Send Us A Message

If you have more questions, please use the form below or contact us in another way convenient for you. All  contact details are available on the Contact Us page. As a rule, we respond within one business day.

    Send Us A Message

    If you have more questions, please use the form below or contact us in another way convenient for you. All  contact details are available on the Contact Us page. As a rule, we respond within one business day.

      This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.