The Airlock 2FA application offers a straightforward and secure two-factor authentication and transaction approval system utilizing your Android device.
- Intended exclusively for use with websites that have integrated the Airlock IAM solution.
- Access requires login credentials from the corresponding website or an activation letter from the service provider (e.g., bank or insurance).
- Functionality within the app might be subject to limitations imposed by the service provider. For any issues, it is advisable to contact the service provider's customer support directly.
The Airlock 2FA app encompasses the following functions:
- Login with One-Touch via push notifications
- Login with Passcode featuring time-based one-time codes
- Transaction approval with One-Touch through push notifications
- Transaction approval using QR codes
- Activation facilitated by QR codes
- Potential recovery via smartphone backup (if enabled by the service provider)
All audio data remains confined to the smartphone and isn't permanently stored (Refer to section 11 of the privacy policy). Users maintain the ability to block microphone access while still utilizing the application.
विहंगावलोकन
Airlock 2FA Ergon Informatik द्वारा विकसित श्रेणी सिस्टम उपयोगिताएँ में एक Freeware सॉफ्टवेयर है।
Airlock 2FA का नवीनतम संस्करण 1.3.2 है, जिसे 25-06-2024 को जारी किया गया था। इसे शुरू में 25-06-2024 को हमारे डेटाबेस में जोड़ा गया था।
Airlock 2FA निम्न आपरेटिंग सिस्टमों पर चलता है: Android.
Airlock 2FA अभी तक हमारे उपयोगकर्ताओं द्वारा रेट नहीं किया गया है।
13-12-2024 | Darty Sécurité 19.8 |
13-12-2024 | Microsoft Visio Professional 2016 - pt-br 16.0.10416.20007 |
13-12-2024 | Wi-Fi USB-адаптер MERCUSYS 1.0.0.2 |
13-12-2024 | Composants Cryptographiques CPS (x64) 5.1.7 |
13-12-2024 | PComm Lite Ver1.3 51.1052 |
अपडेटस्टार फ्रीवेयर के साथ।
12-12-2024 | TeamViewer patch available |
11-12-2024 | Adobe December 2024 Patch Day |
05-12-2024 | Best free torrent clients for 2025 |
03-12-2024 | AnyDesk 9 available |
28-11-2024 | Critical updates: Microsoft patches vulnerabilities |