Two-factor authentication solution that converts any USB drive into a security token for your computer and allows you to access Windows securely. Works also with RFID, OTP, U2F tokens by replacing the Windows login password.

A fully functional 15-day trial

Download now     Purchase

Your Computer security benefits:

  • Replaces weak password-based login with a hardware Security Key: USB flash drive, Google Authenticator OTP, FIDO U2F or industrial RFID access cards.
  • Or adds two-factor authentication: Your Key + PIN code, or Key + Windows password;
  • Uses a long and powerful Windows password, without the need to memorize it;
  • Login with an electronic Key is fully automatic and fast!
  • Authorize elevated operations in User Account Control request with a key as an easy click!
  • The computer is password-protected, but you don’t need to enter it manually each time you log in, unlock/resume or authorize changes;
  • Use a single key to log into your home, laptop and office computer;
  • Have a few different devices for login into a single PC;
  • Windows login is protected even in Safe Mode or Remote Desktop;

Employ a variety of authentication methods:

  • Any regular USB flash drive or SD card;
  • PKCS#11 security dongles like SafeNet iKey, eToken, Feitian token, etc;
  • FIDO U2F security keys
  • Google Authenticator or YubiKey  – OATH One-Time Password codes;
  • Smartphone with Rohos push authenticator or Bluetooth ID;
  • RFID access cards like MiFare 1K, Desfire, EM-Marine, Indala, HIDProx, smartcards;
  • Compatible with Windows Hello devices

Rohos uses NIST-approved data-security principles and encryption: the password is not stored on the authentication key in open form. USB key copy protection prevents the creation of key copies without authorization. All data on the key is encrypted with AES-256 bit key length.

Authentication experience vs security:

Today many services offer strong two-factor authentication to protect your password-based access with additional electronic devices. While Rohos also provides you with complete usability in both, console or remote access cases:

  1. Use hardware security Key for console access and One Time Password generators like Google Auth/YubiKey/OATH for remote desktop access.
  2. An unlimited number of authentication methods can be configured for a single user account;
  3. Emergency Logon Q/A  helps to log in to Windows if you’ve lost your key or forgotten the PIN code;
  4. For 2FA you can set a short PIN code to protect your key against “social engineers” around you. After 3 wrong PIN code attempts the Key gets locked for login;
  5. PIN Pad window has numeric buttons, keyboard entry and auto-focused field.
  6. Unprotected user accounts may be hidden from the Windows Logon screen.

If you work in an absolutely trusted environment, then you can use single-factor authentication mode that allows replacing your password with a digital Key.

Order your copy now

Secure Active Directory authentication

Rohos Logon Key can also be used in your Windows enterprise network to secure authentication and save your budget:

  • Install a domain-wide second-factor authentication requirement;
  • Protect workstations and remote desktop;
  • Second-factor variety: OATH OTP, Security keys, different models and brands, regular flash drives, RFID industry cards;
  • Use any of One Time Password generators: Google Authenticator, SMS, by Email or physical OTP token;
  • Offline workstations support, custom 2FA notices, automated 2FA enrollment by scripting and more…
  • Cost-effective licensing: per workstation, one-time payment, free minor updates;

Lean more about AD installation >


Including the latest Windows Server OS.

Secure 2FA login for:

  • Any Windows computer;
  • Active Directory workstations;
  • Windows Remote Desktop Learn more…
  • Mac computer;

All product features>

The list of supported authentication devices>

For Mac computers
For Windows networks

Our customers:
Consumers, Finance, Industry,
Education and Governments;

Download brochure:
Rohos Logon Key.pdf

Rohos for AD network.pdf