Call a Specialist Today! 866-981-2998
Free Shipping! Free Shipping!

RFID
 

2FA ONE provides broad support for embedded and USB connected RFID readers. Supported devices include embedded, USB, PC Express, and PCMCIA readers from: Dell, Feitian, HID (OMNIKEY), Panasonic, POSH, and more. Additionally, 2FA ONE supports over 40 forms of RFID technology in various devices, including: DESFire, HID iCLASS, Mifare, NFC, HID PROX, and more. Please check the 2FA ONE Client Administrator’s Guide, selected reader datasheet, or contact 2FA for the current hardware comparability list.

How RFID works with 2FA ONE

A RFID device contains a module that emits a unique identifier when presented to a RFID reader. RFID devices come in many different form factors and generally support two different frequencies, 125 kHz and 13.56 MHz. The majority of older implementations in the United States use 125 kHz technology while newer implementations use 13.56 MHz. 13.56 MHz technology is generally considered more secure due to mutual authentication between the device and reader and unique card identification numbers. RFID based authentication is considered less secure than contact smart cards or biometrics, but more secure than other forms of authentication. 2FA ONE manages the lifecycle of both 125 kHz and 13.56 MHz devices and the selection of PINs by users.

RFID uses and workflow

RFID devices are in broad use throughout the world for building access and are considered a preferred form of authentication by many organizations seeking to enhance or streamline authentication processes due to RFID’s ease of use and the multi-purpose capabilities. The common workflow for RFID device authentication requires the user to present their device to a connected reader (USB, embedded, PCMCIA, PC Express), 2FA ONE then identifies the user’s information (the user does not have to enter a username) and requests the user to enter their PIN associated with the device; the user then enters their PIN and 2FA ONE validates the two components. Once validated the user is permitted access to the operating system or application.