{"id":3857,"date":"2022-11-10T10:14:31","date_gmt":"2022-11-10T07:14:31","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=3857"},"modified":"2025-08-02T02:18:06","modified_gmt":"2025-08-01T23:18:06","slug":"office-365-mfa-hardware-token","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/","title":{"rendered":"Office 365 MFA Hardware Token"},"content":{"rendered":"\n<p>In this article we show how to add a Microsoft Office 365 MFA hardware token Protectimus Slim and Protectimus Flex to your Office 365. You don&#8217;t need a premium license to connect these hardware OATH tokens to Office 365 accounts. <\/p>\n\n\n\n<p>With over <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/expandedramblings.com\/index.php\/microsoft-office-statistics-facts\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">31 million users<\/a> worldwide Microsoft Office 365 is unsurprisingly a bestseller among the productivity software subscription suits on the market. Its compatibility with the major operating systems (both mobile and desktop), the choice of available apps and the familiarity of the brand make Office 365 an obvious choice for a lot of businesses worldwide, from small companies to huge enterprises.<\/p>\n\n\n\n<p>These very reasons and the popularity among businesses make it rather a big target for all kinds of greedy criminals. Being an online platform, with tons of sensitive corporate data stored in the cloud, Office 365 is a low hanging fruit for those hackers. Microsoft understands the vulnerability and supports Multi-Factor Authentication (MFA).<\/p>\n\n\n\n<p>The only bulletproof way of fully protecting your info on a cloud server is Office 365 2 factor authentication with a hardware token. In this article, we will give you the detailed instructions on setting up protection with <strong>hardware multi-factor authentication token for Office 365<\/strong> that can be connected<strong> without a premium license<\/strong>. <\/p>\n\n\n\n<p>For this task you will need a programmable hardware TOTP token <a href=\"https:\/\/www.protectimus.com\/token\/slim\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Protectimus Slim NFC<\/a> or <a href=\"https:\/\/www.protectimus.com\/token\/flex\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Protectimus Flex<\/a> that connects to any website like a 2FA authentication app. So we are also going to address the questions one might have on Protectimus Slim NFC and Protectimus Flex hardware OTP tokens.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"https:\/\/www.protectimus.com\/token\/slim\/\" style=\"color:#ffffff;background-color:#269400\" target=\"_blank\" rel=\"noreferrer noopener\">Buy hardware token for Office 365<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Office 365 MFA hardware token: Protectimus Slim or Flex<\/strong><\/h2>\n\n\n\n<p>Azure AD offers a few standard ways to sign in using 2-factor authentication:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You are offered a <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">mobile app<\/a> to generate time-based one-time passwords;<\/li>\n\n\n\n<li>The system can send you a text with a one-time passcode;<\/li>\n\n\n\n<li>You can choose a phone-call to authorize the sign in;<\/li>\n\n\n\n<li>And finally, the most bulletproof way &#8211; you can have OTP generated by <strong>Microsoft Office 365 MFA hardware token<\/strong>, now, Microsoft itself does not provide a hardware device, but third-party tools Protectimus Slim and Protectimus Flex are supported.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.protectimus.com\/flex\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"630\" data-id=\"7517\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front.jpg\" alt=\"Programmable TOTP token Protectimus Flex - front side\" class=\"wp-image-7517\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front.jpg 630w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front-610x610.jpg 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2021\/08\/protectimus-flex-front-184x184.jpg 184w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/a><figcaption class=\"wp-element-caption\">Protectimus Flex<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.protectimus.com\/slim-mini\/index.php\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"700\" data-id=\"6421\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini.jpg\" alt=\"Programmable TOTP token Protectimus Slim NFC\" class=\"wp-image-6421\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini.jpg 700w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini-610x610.jpg 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/Protectimus-Slim-NFC-mini-184x184.jpg 184w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><figcaption class=\"wp-element-caption\">Protectimus Slim<\/figcaption><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>A programmable hardware token is essentially a more protected and trustworthy substitution for a mobile 2FA app. Protectimus Slim NFC and Protectimus Flex tokens are the most popular security tokens that work with Office 365. The tools have no Internet connection, so there is absolutely no way your OTP passwords could be intercepted. Protectimus Slim and Protectimus Flex are reprogrammable, this means one device can be reassigned to a different resource over and over again. The programming goes via <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Near-field_communication\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">NFC<\/a> (Near-field communication) which provides even greater defence. <\/p>\n\n\n\n<p>Protectimus Flex differs from Protectimus Slim Microsoft Office 365 MFA hardware token only in design. Protectimus Flex looks like a key fob, while Protectimus Slim looks like a plastic card of a mini or a banking size card format.<\/p>\n\n\n\n<p>To protect your data with the Protectimus OATH hardware token for Office 365 MFA you need to own an Office 365 subscription with 2-factor authentication on and an NFC Android phone. A premium Azure license is not required.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to add hardware token to Office 365 MFA<\/strong><\/h2>\n\n\n\n<p>Setting up hardware 2-factor authentication token for Office 365 is easy and straightforward enough, the steps below summarise the process very precisely.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Download <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.protectimus.totpburner.nfc&amp;hl=en_US\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Protectimus TOTP Burner<\/a> application on an NFC-enabled Android phone.<\/li>\n\n\n\n<li>Browse to <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/account.activedirectory.windowsazure.com\/Proofup.aspx\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">this registration page<\/a> and sign in with your Microsoft corporate login.<\/li>\n\n\n\n<li>Go to the Office 365 account settings page at <a href=\"https:\/\/myaccount.microsoft.com\/?ref=MeControl\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/myaccount.microsoft.com\/?ref=MeControl<\/a><\/li>\n\n\n\n<li>Navigate to the <strong>Security Info<\/strong> tab.<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"437\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-1-1024x437.png\" alt=\"Office 365 hardware OTP token setup - step 1\" class=\"wp-image-8140\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-1-1024x437.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-1-300x128.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-1-768x328.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-1-1536x656.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-1-610x260.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-1.png 1844w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n<ol start=\"5\">\n<li>Click <strong>Add sign-in method<\/strong>.<\/li>\n<\/ol>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"338\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-2-1024x338.png\" alt=\"Office 365 MFA Hardware Token Setup - step 2\" class=\"wp-image-8141\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-2-1024x338.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-2-300x99.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-2-768x253.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-2-610x201.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-2.png 1267w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n<ol start=\"6\">\n<li>Select <strong>Authenticator app<\/strong> from the drop-down list and click <strong>Add<\/strong>.<\/li>\n<\/ol>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"371\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3-1024x371.png\" alt=\"OATH token for Office 365 - step 3\" class=\"wp-image-8142\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3-1024x371.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3-300x109.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3-768x278.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3-1536x556.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3-610x221.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3-578x208.png 578w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-3.png 1844w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n<ol start=\"7\">\n<li>Click on the line <strong>I want to use a different authenticator app<\/strong>.<\/li>\n<\/ol>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"341\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-4-1024x341.png\" alt=\"Office 365 2FA hardware tokens setup - step 4\" class=\"wp-image-8143\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-4-1024x341.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-4-300x100.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-4-768x256.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-4-1536x512.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-4-610x203.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-4.png 1845w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n<ol start=\"8\">\n<li>Open the Protectimus TOTP Burner application on your phone, make sure the NFC is enabled, and click&nbsp;<strong>Next<\/strong>.<\/li>\n<\/ol>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"352\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-5-1024x352.png\" alt=\"Office 365 two-factor authentication with hardware OTP token - step 5\" class=\"wp-image-8144\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-5-1024x352.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-5-300x103.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-5-768x264.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-5-1536x529.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-5-610x210.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-5.png 1845w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n<ol start=\"9\">\n<li>Now you see the QR code with the secret key. You need to scan this QR code using the Protectimus TOTP Burner app and add it into the hardware token Protectimus Slim or Protectimus Flex via NFC.<\/li>\n<\/ol>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"386\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-6-1024x386.png\" alt=\"How to add hardware 2-factor authentication token to Office 365 - step 6\" class=\"wp-image-8145\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-6-1024x386.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-6-300x113.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-6-768x290.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-6-1536x579.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-6-610x230.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-6.png 1843w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n<ol start=\"10\">\n<li>Launch the Protectimus TOTP Burner app and tap <strong>Burn the seed<\/strong> button. Then tap <strong>Scan the QR code<\/strong> and scan it. Once the QR is successfully scanned, turn on your hardware token Protectimus Flex or Protectimus Slim and bring it to the phone. Hold the OTP token as close to the phone as possible within the range of your phone&#8217;s NFC antenna and click <strong>Continue<\/strong> to proceed.<\/li>\n<\/ol>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/how-to-burn-the-seed-to-protectimus-slim-nfc-en1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"429\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/how-to-burn-the-seed-to-protectimus-slim-nfc-en1.png\" alt=\"How to program Protectimus Slim NFC\" class=\"wp-image-6058\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/how-to-burn-the-seed-to-protectimus-slim-nfc-en1.png 770w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/how-to-burn-the-seed-to-protectimus-slim-nfc-en1-300x167.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/how-to-burn-the-seed-to-protectimus-slim-nfc-en1-768x428.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/how-to-burn-the-seed-to-protectimus-slim-nfc-en1-610x340.png 610w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n<ol start=\"11\">\n<li>Once the secret key is successfully programmed into your hardware token for Office 365 all there&#8217;s left to do is complete the token registration. Go back to the setup page on your desktop, click <strong>Next <\/strong>and enter the OTP code your Office 365 multi-factor authentication token has generated. Then click <strong>Next<\/strong> again.<\/li>\n<\/ol>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"355\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-7-1024x355.png\" alt=\"Office 365 MFA hardware tokens setup - step 7\" class=\"wp-image-8148\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-7-1024x355.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-7-300x104.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-7-768x266.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-7-1536x532.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-7-610x211.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/how-to-add-oath-hardware-token-to-office-365-step-7.png 1841w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p>That\u2019s it, now you can log into your Office account the most protected way possible. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Common questions<\/strong> about Office 365 MFA hardware token <\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\"><strong class=\"schema-faq-question\"><strong>1. Why office 365 two factor authentication token is better than other types of MFA (app, SMS or phone call)?<\/strong><\/strong> <p class=\"schema-faq-answer\">Protectimus Slim NFC and Protectimus Flex are truly an impenetrable protection for your data. The mechanism is contactless, the one-time keys are generated by the device itself, there\u2019s no need for a network connection of any kind and the built-in battery allows for years and years of work. These things make it in essence impossible to overtake the passwords, implant the token with any kind of malware code and, as a result, compromise your security, or steal the sensitive information you keep in your Office 365 apps. Besides, if you happen to lose the hardware token you are far more likely to notice its absence before any harm is done, as opposed to an infected app, which can do all kinds of damage without you noticing it before it\u2019s too late.<\/p> <\/div> <div class=\"schema-faq-section\"><strong class=\"schema-faq-question\"><strong>2. Can I order a hardware TOTP token with my company logo?<\/strong><\/strong> <p class=\"schema-faq-answer\">Absolutely. You can have branded tokens in you order 1000 tokens and more.<\/p> <\/div> <div class=\"schema-faq-section\"><strong class=\"schema-faq-question\"><strong>3. Do Protectimus Slim NFC and Protectimus Flex support multiple secret keys (seeds)?<\/strong><\/strong> <p class=\"schema-faq-answer\">Protectimus Slim NFC and Protectimus Flex support only one secret key (seed), so if you have multiple accounts for which you need MFA you will need different tokens. But these tokens are programmable, thus if you stop using an account you can reprogram the token to be used with another account that needs extra protection.<\/p> <\/div> <\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read more:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/hardware-token-azure-mfa\/\">Hardware Tokens for Azure MFA<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/customer-stories-dxc-technology-2fa\/\" title=\"\">Protectimus Customer Stories: 2FA for DXC Technology<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/customer-stories-advcash-2fa\/\" title=\"\">Protectimus Customer Stories: 2FA for Advcash<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/customer-stories-sicim-2fa\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Protectimus Customer Stories: 2FA for SICIM<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/hardware-or-software-token-which-one-to-choose\/\">Hardware or Software Token \u2013 Which One to Choose?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/why-universities-choose-hardware-tokens\/\">Why US, Canadian, and EU Universities Choose Programmable Hardware OTP Tokens<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/program-protectimus-slim-nfc\/\">How to Program Protectimus Slim NFC Token<\/a><\/li>\n<\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>In this article we show how to add a Microsoft Office 365 MFA hardware token Protectimus Slim and Protectimus Flex to your Office 365. You don&#8217;t need a premium license to connect these hardware OATH tokens to Office 365 accounts. With over 31 million users worldwide Microsoft Office 365 is unsurprisingly a bestseller among the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":5023,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,329],"tags":[476,1290,335,421,139,99],"class_list":["post-3857","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-setup-guides","tag-office-365-en","tag-protectimus-flex-en","tag-protectimus-slim-nfc-en","tag-setup-guides","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=3857"}],"version-history":[{"count":44,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3857\/revisions"}],"predecessor-version":[{"id":9089,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3857\/revisions\/9089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/5023"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=3857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=3857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=3857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}