Enroll users with Token2 HOTP

Help users activate and use a Token2 HOTP hardware token as a second factor of authentication (MFA) with UserLock.

Published October 7, 2025

Overview

Token2 HOTP is a hardware token that generates HMAC-based One-Time Passwords (HOTP) for MFA.

Unlike time-based tokens (TOTP), HOTP codes are generated sequentially — making them ideal when system clocks are not perfectly synchronized.

UserLock manages Token2 HOTP configuration entirely on the server side, ensuring a simple setup with no client configuration required.

When users authenticate, they simply touch their Token2 device. The token automatically enters the authentication code, preventing typing errors.

Note

🚩 Before following this guide:
We recommend reading How to implement MFA for general recommendations, communication tips, and preparation steps to ensure a smooth rollout.

Requirements

To use Token2 HOTP with UserLock:

  • A Token2 device supporting HOTP (for example, Token2 T2F2-ALU).

  • The device must be plugged into a USB port on the user’s computer during logon.

  • The first MFA enrollment must be performed through a direct local session (not via RDP).

  • Once configured, the Token2 can be used for RDP, IIS, SaaS, or VPN sessions.

Important

Enrollment from a remote session (RDP, IIS, or VPN) is not supported.

Note

💡For a detailed list of compatible Token2 devices, see Token2’s official compatibility list

Step 1. Enable MFA for the user

Before enrolling, make sure that MFA is enabled for the user account in UserLock.

Note

Step 2. Enroll the Token2 HOTP

  1. Plug the Token2 HOTP device into the computer’s USB port.
    (Do not connect via RDP for this step.)

  2. Log in to the Windows session.

  3. When prompted by the UserLock Desktop Agent, select USB Token as the MFA method.

  4. The agent automatically detects the Token2 device:

    and programs it using the MFA secret. The process runs securely in the background — the secret is never displayed.

  5. Once linked, the Token2 status updates to Success in the dialog box.

  6. The cursor appears in the authentication code field — simply touch the Token2 device.
    The token automatically enters a 6-digit code, validating the MFA setup.

✅️ Enrollment is now complete. Future logins can occur through RDP or other remote sessions.

Step 3. Authenticate

For subsequent logins:

  1. Plug the Token2 HOTP into a USB port.

  2. Log in to Windows (local or RDP session).

  3. When prompted for MFA, touch the Token2 button:

    The token enters the 6-digit code automatically, and authentication completes.

Advanced Use and Troubleshooting

Token2 HOTP with RDP

  • Enrollment must be done locally (not via RDP).

  • After enrollment, users can log in remotely using their Token2 HOTP device.

If the Token2 Device Is Lost or Unavailable

Administrators or users can:

  • Use a backup MFA method (e.g. Authenticator App or Recovery Codes), if configured.

  • Use the optional Ask for Help feature to notify an administrator.
    The admin can then:

    • Reset the MFA key

    • Temporarily disable MFA

    • Assist in activating a replacement token (e.g. YubiKey)

Switching from TOTP to HOTP

If a user previously used a TOTP method:

  1. Reset the user’s MFA key.

  2. Reconfigure MFA using Token2 HOTP as described in this page.

When to Use HOTP Instead of TOTP

Choose HOTP when:

  • Your UserLock server runs on a virtual machine with irregular clock synchronization (e.g. Hyper-V environments).

  • You want to avoid time-based synchronization errors that may occur with TOTP.

Limitations

Limitation

Description

Enrollment restricted to local sessions

Cannot enroll Token2 HOTP via RDP, IIS, SaaS, or VPN.

Virtual machine support

Supported on VirtualBox (configuration and authentication).
Configuration not supported on Hyper-V, but authentication works.

HOTP desynchronization

May occur after multiple offline logins. By default, a 6-code offset is allowed. Adjust via the Max HOTP code count advanced settings parameter.