1
  • multifactor token

    Multifactor tokens are security tokens that use more than one category of credential to confirm user authentication. The standard categories of authentication credentials are knowledge factors things that the user knows) inherence factors (things that the user is) and possession factors (things...

    Margaret Rouse3,160 pointsBadges:
  • single-factor token

    A single-factor token is a small hardware device that produces one confirming credential for user authentication; the devices may be used in conjunction with other types of credentials for multifactor authentication.

    Margaret Rouse3,160 pointsBadges:
  • soft token

    A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.

    Margaret Rouse3,160 pointsBadges:
  • possession factor

    The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.

    Margaret Rouse3,160 pointsBadges:
  • Survey finds users re-evaluating two-factor authentication options

    In the wake of the RSA SecurID breach, a vendor survey finds a reduced level of confidence in the security provided by tokens.

    searchsecurity21,410 pointsBadges:
  • security token (authentication token)

    A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.

    ITKE352,580 pointsBadges:
  • RSA responds to SecurID attack, plans security token replacement

    Following a retooling of its manufacturing and supply chain management processes, RSA plans to replace security tokens for high risk customers.

    searchsecurity21,410 pointsBadges:
  • Two-factor authentication and tokens

    An introduction to tokens including how they work, their pros and cons, and the best circumstances in which to use them.

    searchsecurity21,410 pointsBadges:
  • Security tokens, the OASIS approach to Web services security

    One approach to Web services security is to focus on authorization and authentication with the OASIS security standards and the security assertion markup language (SAML).

    James Denman1,185 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following