• Current Version 2.21
  • Size 254K


<b>NOTE: This app requires installation of the server-side component, which is available on ESET’s website. For more information, please see, or contact your network administrator.</b>

Brand new and improved <b>ESET Secure Authentication</b> is an easy-to-install and easy to deploy mobile-based two-factor authentication solution <b>for businesses</b>. It uses <b>one-time password (2FA OTP) authentication</b> to secure access to company’s VPN and a range of supported applications such as <i>Exchange, SharePoint, Dynamics CRM, Custom Apps, and others</i>.

<b>What’s New in ESET Secure Authentication</b>

• Improved Installer

• Compatibility with Exchange 2013 and Exchange Control Panel

• Extended range with secure access to business critical apps (Microsoft SharePoint & Dynamics CRM)

• User Interface Refresh

• Remote Desktop Web Access Integration

• Increased flexibility with Authentication API and SDK

<b>The two-factor, one-time password (2FA OTP) system</b> is a combination of two security factors – <b>“something that the user knows”</b>, e.g. a password – with <b>“something that the user has,”</b> a mobile phone to generate the one-time password for access.

Rely on ESET – a company with over 25 years of experience in enabling businesses and consumers to enjoy safer technology.

Recent changes:

• Minor bug fixes and optimizations

Content rating: Everyone


Emue Enterprise Authenticator

by Trustpay Global Ltd for EMUE LTD / /
  • Current Version 1.1.3
  • Size 291K


Available for securing corporate networks and VPNs, the Authenticator is a mobile security token for 2 Factor Authentication (2FA).

The Enterprise Authenticator supports the following functions:

One-time-passcode (OTP)

Mutual Authentication Challenge-Response

Your organisation must use the Emue Authentication Server in order for you to be able to use this application to log in to your corporate network or VPN.

Recent changes:

Optimized for the latest Android operation systems.

Added support for FastPASS automatic login.

Content rating: Everyone


Free WiFi Spot

by Rsp974
  • Current Version beta
  • Size 401K


This application is a free wifi manager, it allows you to automatically authenticate on the public Wi-Fi networks (hotspots).

Imagine, you come to work quietly. You plug your phone, and you're connected to the hotspot of your internet service provider without having to enter! And yes, the phone activates the WiFi and identifies itself ☺

♥ In addition, it periodically checks the status of the internet connection to the hotspot in order to automatically re-authentication (if necessary).

(Other keywords: ssid, wifi, wi-fi, wifi manager, open wifi, free wifi, wifi login, auto login, auto-login, fon)

Recent changes:

• bugs fix & optimizations

/!\ Known issues:

-If bug after update please restart your phone.

-Hidden hotspots are likely to be poorly supported: prefer to use a secure network with a complex password.

Content rating: Everyone


ActivID Token

by HID Global / /
  • Current Version 4.1.1
  • Size 2M


HID Global’s ActivID® Token provides proven, strong authentication for remote employees accessing corporate IT systems and consumers logging on to online services, without the need to distribute hardware tokens.

A user wishing to access a protected resource, such as a VPN or internet banking site, uses the ActivID® Token app to generate a One Time Password. The app can be PIN protected.

The ActivID® Token is part of a broad portfolio of hardware and software based One Time Password tokens from HID Global.

The ActivID® Token works with the HID ActivID® Appliance, 4TRESS AAA Server for Remote Access 6.7.2 and above and 4TRESS Authentication Server 7.0.3 and above.

Recent changes:

Bug fix (crash issue)

Content rating: Everyone



by Ready Technology (UK) Limited / /
  • Current Version 1.0.2
  • Size 50K


HOTP soft token for two-factor authentication. Can be used with the dynalogin server and SimpleID for Single-Sign-On to OpenID web sites.

Recent changes:

More verbose errors.

Content rating: Everyone



by Swivel Secure Ltd / /
  • Current Version 1.6
  • Size 205K


*** This application is for use with Swivel Secure's PINsafe Authentication Platform it is compatible with both pre and post PINsafe Version 3.8 ***

This mobile app is for use with Swivel Secure's Authentication Platform.

The Swivel Secure mobile app allows the safe delivery of security strings directly from a Swivel server. Enabling users to authenticate even during prolonged lack of network coverage. The app enables users to authenticate without requring mobile phone signal.

For more information about PINsafe go to

Recent changes:


-You can now "Get Server Settings" and provision the device using a URL from a text message, a QR-Code or an NFC token

-It is possible for the server to allow users to navigate through the security strings backwards as well as forwards

-Several UI/UX improvements


-Added a "Get Server Settings" screen where users can use a 10-digit code they have been given to download the server settings

-Added server configurable ability to automatically extract otc prompting user for PIN

Content rating: Everyone

Free Authenticator

by Blizzard Entertainment, Inc. / /
  • Current Version 1.1.3
  • Size 811K


Do you play Blizzard Entertainment games like World of Warcraft or StarCraft II: Wings of Liberty? Protect your account with Blizzard's official Mobile Authenticator app for your Android device. The Mobile Authenticator is an optional tool that offers an additional layer of security to help prevent unauthorized account access. Each time you log in to a account, you’ll use the Mobile Authenticator to generate a unique, one-time use password to use in addition to your regular password. Log in with both and you can rest easy knowing that the account is more secure against unauthorized access.

Airtime or Wi-Fi connection required for use. For more information on how to add the Mobile Authenticator to your account, visit

* Simple and easy to use – just load the app to display the digital code on your Android device.

* Convenient – Take your Android device wherever you play World of Warcraft, StarCraft II: Wings of Liberty, and future games knowing that the account is secure.

* Note: Mobile Authenticator is not compatible with online play for “classic” games, including StarCraft, Diablo II, and Warcraft III.

Languages Supported:

* English

* Français

* Deutsch

* Español (Latinoamérica)

* Español (Europa)

* Português

* Italiano

* Polski

* Русский

* 한국어 (Korean)

* 繁體中文 (Traditional Chinese)

* 简体中文 (Simplified Chinese)

©2014 Blizzard Entertainment, Inc. All rights reserved. World of Warcraft, StarCraft, and Blizzard Entertainment are trademarks or registered trademarks of Blizzard Entertainment, Inc., in the U.S., and/or other countries. Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions.

Recent changes:

UI improvements

Widget has been updated. Once an authenticator widget has been created, press the refresh icon to get an authenticator code. This change was made to reduce battery consumption.

Content rating: Everyone



by WISeKey / /
  • Current Version 3.1.1
  • Size 278K


WISeKey OTP provides a secure and convenient means for organizations to offer one-time password authentication on mobile phones, desktops, and embedded devices such as tokens.

WISeKey OTP’s simple activation process means system administrators can quickly deploy a secure solution across their organization.

WISeKey OTP can offer access to a variety of application and networks that demand the strong authentication offered by event and time-based one-time passwords, and even offers challenge response and signature OTP authentication.

WISeKey OTP requires installation of an enterprise server. Please contact WISeKey for further information.

Content rating: Everyone


Intesa M-Token

by Asseco SEE / /
  • Current Version 1.0.1
  • Size 643K


Intesa M-Token is an authentication method for the Internet Banking service called I-B@nk, offered by Intesa Sanpaolo Bank Romania S.A. to his customers. Intesa Sanpaolo Bank Romania is the first bank in Romania to offer this kind of authentication method to his customers as an alternative to the commonly used digipass device. It combines the commodity and familiarity of using your personal I-Phone with the high level of security offered by the digipass authentication.

The Intesa M-Token offers functions such as One Time Password (OTP) for authentication in the I-B@nk and Message Authentication Codes (MAC) for authorizing transactions in maximum security conditions.

The application is available in three languages: English, Italian and Romanian.

Recent changes:

Improved user interface and renamed menus for more intuitive use

Content rating: Everyone


Garena Authenticator

by Garena Online / /
  • Current Version 1.1.0
  • Size 2M


Garena Authenticator works with 2-step authentication for your Garena Account, providing an additional layer of security when managing account details and playing games.

Garena Authenticator will generate authentication codes directly on your Android Phone without the need for a network connection.

Features include:

- Support for automatic account linking by scanning QR code

- Support for time-based authentication code generation

- Support for multiple accounts linking on the same device

To use your Garena Authenticator, you will need to have 2-step authentication enabled on your Garena Account and then link your Garena Account to your Garena Authenticator.

Recent changes:

Garena Authenticator Version 1.1.0

1. Added support for multiple accounts linking

2. Added account management

3. Enabled copying and pasting of authentication codes

4. Improved user interface

Content rating: Everyone


EZMCOMv4 Token

by EZMCOM / /
  • Current Version 4.0
  • Size 599K


The EZMCOM Soft Token allows organizations to provide their users a convenient and secure one-time password authenticator for a broad range of applications that requires strong authentication. The EZMCOM Mobile Soft Token eliminates the need for Android customers to carry a dedicated device when authenticating to online applications and networks. EZMCOM Soft Token application is build with open security standards and supports the OATH (Initiative for Open Authentication) standard for generating one-time passwords. The application provides both event and time based one-time passwords for organizations to choose their strong authentication needs and requirements. It also provides the Challenge Response and Signature OTP as to the OCRA specification from OATH.

The EZMCOM Mobile Soft Token has a simple and secure activation process allowing administrators to quickly deploy Soft Tokens across their organization.


EZMCOM Soft Tokens require the purchase of the EzIdentity Authentication platform from EZMCOM. In addition, customers are required to purchase a license pack for Soft Tokens. This Android application (EZMCOM) is provided for installation convenience. Users should contact their IT administrators for further instructions on activation and use.




Android OS 2.3 or later


EZMCOM Web site

Content rating: Everyone



by meyetech / /
  • Current Version 3.1.0
  • Size 2M


Features include:

Android and OPhone compatible.

Unlimited video on cellular and wifi.

Support MultiChannel video encoder.

Support for authentication.

Support for Pan, Tilt, & Zoom control.

Direct stream connection, No video going through 3rd party servers.

Yon can capture the pictures when watching and save them on

the SDCard.


We have a pro version support 4 view and have no ad.

The URL is

Recent changes:

Support the Android 5.0

Content rating: Everyone

Blogs about Authentication

  • (ISC)2 Blog: Authentication, Voice of the Information Security Professional A blog posting from Eset outlining some basic tips for reducing the risks associated with social networking/social media/Web 2.0 activities. Posted by Rob Slade on 15 November 2009 at 03:10 AM in Authentication, Confidentiality,

  • Authentication | Plataforma Tecnologia Blog, .br Now both database and token authentication work through HTTP with no extra work and the This allow us to easily require authentication for third party rack application without a

  • Authentication (User) Blog | Symantec Connect Community, About Authentication (User) Blog. User Authentication solutions provide two-factor authentication, public key infrastructure (PKI) services, and risk-based authentication to protect interactions between consumers, business partners, and employees

  • The Received Blog, With Deliverability tools and services from Return Path, more of your email can reach the inboxβ€”which means more responses. Subscribe to the blog feed: Subscribe: Email or RSS. Category Archives: authentication. Page 1 of 2 Prev | Next

  • strong authentication | Blog, Posts with strong authentication on A blog about Identity & Access Management

  • HOW TO:Forms Based Authentication (FBA) on SharePoint 2010, By default, this will use Windows Authentication. Since we haven't setup FBA yet, we need to setup the Web Authentication on Share Point 2010? If you have any information then please send me. My email id is gauravgoyal_5@. blog

  • The Trojan Horse: Sneaking Past Your City Walls, About the Blog. Blog Authors. Product Messages. The Trojan Horse: Sneaking Past Your City under: Authentication Trends, Data Security, General Information

  • Authentication | MailChimp Email Marketing Blog, Here's the post from the official Gmail Blog. There's another catch β€” your emails to the recipient have to be authenticated (SPF or DKIM) Word-to-the-wise reports that AOL will begin checking for DKIM Authentication sometime in 2009, as discussed in a recent ESPC call

  • Authentication " Tevora Blog, Two-Factor Authentication Using Your Cell Phone. Friday, 29 October 2010 by Jesse Salmon Use of the cell phone as an authentication method is not only a convenient method of

  • Equifax Blog - Secrets and Authentication, Five to ten years ago, little known facts about our lives were widely used for authentication before we were permitted access to sensitive information. Quite often the question was, "What was your mother's maiden name?" This was a "shared secret

  • Windows Digest authentication, Exploring the intricacies of authentication mechanisms that are available on Windows operating systems - Windows Digest

  • Email Authentication – Are you in the game?, Email Authentication – Are you in the game? by Adam Covati on April Email authentication is an attempt to prove that the person in the from address is who

  • Email Authentication and Authorization | Pinpointe - Business, DKIM is an email authentication' method that organizations and ESPs like Pinpointe use to verify to the recipient that the email is coming from a valid email server, and We cover an explanation of DKIM Email Authentication in our blog entry DKIM Email Authentication

  • IT Security " Authentication, Blog. Category. Authentication. Archive for the 'Authentication' Since users might not understand the finer details of authentication, encryption, and web app exploits, it's good to see a news

  • Authentication | LuxSci FYI, Home " FYI Blog. Posts Tagged authentication' LuxSci Outbound Email: 5 Sending Options Compared! Published: Friday, May 22nd, 2009. It used to be that to send an email, you had very few choices and even less control over what happened once the

  • AuthenticationWorld Blog, However, before we leap to discussing stronger forms of authentication, perform an enterprise risk ***ysis for all physical and logical assets. That's what this blog is going to discuss. I am going to use an old ***ogy of putting the cart before the horse and not getting anywhere until the

  • The Real Blogger Status: Blogger Provides Blog Access Using, Blogger Provides Blog Access Using Two Factor Authentication. Many bloggers are confused about how to protect their blogs, both from unauthorised administrative access, and unauthorised Blogger uses two factor authentication, to protect your blog

Forums about Authentication

  • Weblogs Forum - HTTP Authentication Woes, It is not as easy to make that path obvious when using the client's HTTP authentication dialog. With HTTP authentication, I can force the user to sign in before doing things that require being signed in, like posting to a forum or administration

  • Building a Forum with Dreamweaver – Part 2: Setting Up User, Setting Up User Authentication In the following sections of this tutorial, you will use ImpAKT to build a user authentication system for your forum. You need

  • About the Product Authentication + Security Summit (PASS), product- The Poduct Authentication and Security Summit aims to help devise security programs to help secure the supply chain. 3rd Tax Stamp Forum. About the Product Authentication + Security Summit (PASS) PASS is about developing a corporate culture which integrates product security and supply chain security

  • WW2 uniform, awards, armor, weapons history. War relics forum, WW2 military historians and collectors forum. History: 3 Reich and Soviet Red army uniforms, awards, weapons, armor and helmets. Battlefield archeology and historical recovery. World war pictures

  • Integrated Authentication Bug? - AspNetForum - forum, Integrated Authentication Bug? - AspNetForum - forum software Hi I've just download the free trial to evaluate the forum and noticed the same error - if you use the integrated authentication, when you log out of the host website you stay logged in the forum

  • Infrae: Silva Forum Released, with OpenID Authentication, Infrae is pleased to announce the first public release of Silva Forum, an extension for Silva 2.x that provides a classic discussion forum environment. It can be integrated with OpenID authentication and a CAPTCHA to prevent 'spambots' from

  • Rails on Edge: Rails Forum - Restful Authentication(Part 3 of 3), Rails Forum - Restful Authentication(Part 3 of 3) So here is part 3 Today we are going to put authentication on top of our application, using the

  • NetSarang - Kerberos authentication, Home > Support > Xmanager Forum. Xmanager Forum. Kerberos authentication. Last post: Wednesday, January 23, 2008 12:00 PM by Support, Kerberos authentication will be needed to gain a token for access to the OpenAFS file system. As the home directory for each account will be on the AFS file system,

  • User authentication, This forum is for discussing how to use Moodle with various types of authentication and You're welcome to browse and/or contribute to the Authentication documentation and

  • Category:Authentication - Forum Nokia Wiki, Category:Authentication. From Forum Nokia Wiki. Pages in category " Retrieved from "http:///index.php/Category:Authentication"

  • Open Key vs. Shared Key - Wireless Networking | DSLReports Forums, Open Key vs. Shared Key - Wireless Networking | DSLReports Forums, broadband news, information and community Bottom line: Shared Authentication does not add any security, and may weaken your security. Don't bother with it. to forum Β· 2003-11-30 14:00:18

  • proxy authentication does not work - CSI - Forum - Community, Forum Thread: proxy authentication does not work. You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it. This thread was submitted in the following forum: CSI

  • MAC Authentication - Wireless-General-Discussions - Wireless, Archived from groups: alt.internet.wireless (More info?) Why, do you suppose, have they not implemented MAC authentification as the "Passkey" to enter private networks. Seems to me that Tom's Hardware > Forum > Wireless Networking > General Discussion > MAC Authentication

  • Tagged with authentication - Forum, Please read the following post before posting : http:///forum/discussion/240/before-posting-bugs-stff-svn Plugin for remote authentication over HTTP available. 3 comments Most recent by emaijala November 2010Contributed Plugins. Happy with the support?By donating, even a small

  • Nemesis: Preventing Web Authentication and Authorization, Forum. Why is this broken? Every web app rolls own authentication, session mgmt. system Forum. Nemesis: Stopping Auth Attacks. Must infer when a user is authenticated safely

  • Custom Forms Authentication cookie for Single Sign On, If you are trying to integrate the software into your own site, and are in the following situation: You are already using a Forms Authentication Cookie (Cookie A) for authentication (login) for your site (whether or not you have your own

Twitter about Authentication

  • FabioAmbiente: Mapping security services to authentication levels: Com este relatório, publicado pela ENISA, a organização resp...

  • perloop: #perl LWP proxy user authentication

  • bryanbolling: RT @PhilTranfa: Claims Tips 4: Learning About Claims-Based Authentication in SharePoint 2010

  • G_Ant: Just published: "A Taxonomy of #Authentication Methods, Update" #Gartner

  • orestisf: Lithuania Goes Live in Pilot 1 "Cross-Border Authentication Platform for Electronic Services" #eid #stork #gov20

  • MakePaymentsPay: Qn for PhilC: do we have authentication services fit for purpose of electronic payments. PhilC answer: banks must invest #paymentscouncil

  • jmlw1: Qn for PhilC: do we have authentication services fit for purpose of electronic payments. PhilC answer: banks must invest #paymentscouncil

  • ivardi: What's with Huffington Post denying access without authentication?

  • LouiseRobertson: LiveEnsure protecting Mobile transactions

  • xmobile_phones: Google Fixing Its Android Authentication Token Flaw To Plug User Login Credentials Leak via @techdingdotcom #85

  • delortae: Authentication Question? #DelortaeAgency Our Page - via HASHTAG_NET

  • murdead: Adsl link down, authentication error, connected. Adsl link down, authentication error, connected. :s

  • domster: User authentication working. Woot. Onwards! #ror

  • RonsardFerguson: promise rings #concorde plus size clothes love #bp streaming music plastic surgery authentication #leverage

  • TuongBusarow092: learn english #bookkeeper bracelets cataracs jewerly authentication hair brush human behavior niv bible

  • gadget_hotspot: Google Fixing Its Android Authentication Token Flaw To Plug User Login Credentials Leak via #46

  • ActivIdentityEU: New laws on data breaches come into force today <- don't wait 'til it's too late to implement strong authentication

  • bnravitej: @pramd7 @srikanth_p :). NAL is a secure military organisation. It requires authentication from the department on a few documents.

  • Channelnews: Industry Views; CRYPTOCard's Neil Hollister looks at the prospects for remote authentication technology in the cloud:

  • madduri: RT @camelialand: OSDD doing grid authentication and meta scheduling for Galaxy jobs #usegalaxy. Really interesting.