Ozbert is correct.

When companies buy authenticators, they're essentially buying key spaces, say, in batches of 20,000.

While the underlying hardware and algorithms might be identical, the codes are logically discrete.