Terms and definitions

activation letter

An activation letter is a letter (PDF) usually sent to the user by a trusted mail service.

Activation letters are often used to verify the physical address information supplied during registration, or in situations where an independent and secure digital communication channel has not yet been established.

Airlock 2FA activation letters contain a QR code for the enrollment of an Airlock 2FA app.

Airlock 2FA app

The Airlock 2FA app is our mobile application for authentication and transaction approval. It is available for Android and iOS and can be downloaded from the app stores.

enrollment, Airlock 2FA

Airlock 2FA enrollment is the process of activating an Airlock 2FA app and linking it to an IAM user account. Enrollment can be in the browser (e.g. migration of other 2nd factors to Airlock 2FA) or using an activation letter.

hardware token

A small device whose sole purpose is strong authentication or transaction confirmation.

mobile-only authentication

Another term for single device authentication used in conjunction with Airlock 2FA.

OAuth 2.0

OAuth 2.0 is a standard for access delegation. Clients can act on behalf of users by using bearer tokens for authentication during resource access.

Offline QR code

Offline QR code is a type of transaction approval in Airlock 2FA.

A QR code shown in the user's browser is scanned using the Airlock 2FA hardware token (or app) which then displays transaction information and a verification code. The user confirms the process by entering the verification code in the browser.

It allows transaction approval in situations without an internet connection of the smartphone.


The passcode method is the simplest authentication method provided in Airlock 2FA. The app displays a one-time code (OTP) that is valid for 30 seconds.

It allows authentication in situations without internet connection of the smartphone.

security gate process

The security gate process is the Airlock Gateway's request-processing component and policy enforcement point.

In combination with Airlock Anomaly Shield, the security gate process evaluates the anomaly information and may apply actions based on the evaluation result.