Home
Contents
CLOSE
AuthLite Interactive Documentation
FEATURES: What can AuthLite Do? TOKEN TYPES: What "Factors" are supported? INSTALL: How and where to install AuthLite? CONFIGURE AuthLite for your needs CHOOSE USERS: Choose 2-factor Users ENFORCE 2-factor Logons ADMINISTER AuthLite Tokens LDAP logon support/enforcement VPN and RADIUS Configuration How to Log In Event Logging
CLOSE
NOTE: There is a newer version of this article available in the AuthLite 2.5 Documentation. Click here to view it.

AuthLite does not use a service that calls phones.  If you want to use your smart phone as a token, AuthLite supports all standard OATH token applications.