Two factor authentication (2FA) for webapp
Two factor authentication are a great way to secure the network from insecure passwords. Hardware tokens like Yubikeys are the perfect way to give an alternative log in's. This can be set up as an alternative option in addition to existing methods. For example, a scenario where you may end up loosing your Yubikey, the primary method will still log you in.

-
David Ramones commented
Big 3 votes here for 2FA - we live in a world where this is now the standard.
-
Chris commented
Some generic MFA. I use "andOTP" android app for lots of other sites, for example. Thanks.
-
Anonymous commented
At least TOTP support would be great!
-
AJ commented
2FA for the webapp would be fantastic. The more security the better, considering the data fruux hosts can be sensitive.
-
Adminfruux (CEO / Founder, fruux) commented
U2F is not yet (natively) supported on Safari and iOS, so doesn't make sense (yet) to rely (solely) on it.
-
Marjan commented
I am with the applicant and prefer the method U2F instead of TOTP/HOTP. In general I really like to have MFA.
-
Chris commented
2FA please. Thx.
-
Seth commented
Yubikey would be my preferred 2FA token
-
David Kreindler commented
I think TOTP (RFC 6238) would be the way to go.
-
Kevin Coleman commented
Big vote for 2FA here.
-
permon commented
Another vote for 2FA ( Yubikey or otherwise). I wouldnt feel comfortable storing customer contacts in the cloud otherwise
-
Anonymous commented
Maybe rather then a specific product I'll ask for a generic 2Factor auth TOTP, so you can also use apps like https://fedorahosted.org/freeotp/ [opensource and free for Android/iOS]