What is Token Authentication?

Token authentication is a form of “two-factor authentication”, meaning users must supply two unique factors when logging in. The first factor is something the user knows, like a password or PIN. The second factor is provided by an authenticator, a hardware or software “token” with a code that changes randomly, usually every sixty seconds. Token authentication is used by individuals and organizations to increase security for devices and networks.

 

Examples of Token Authentication

Key Fobs

The key fob style authenticator has a small screen that displays a code that is generated randomly and changes in intervals. The user will enter this code in addition to a password they have created to obtain access to electronic resources.

Single Sign On

Single Sign-On technology stores the authentication token so that a user is only required to validate their credentials one time, instead of each time they try to access a different resource.

Smart Cards

Smart cards can be used as security tokens and are usually seen in two different forms: Contact - such as credit cards with electronic chips, and Contactless - such as an employee badge.

Topics

Discover content based on your areas of interest

  • Business Operations

    Streamline your processes and run your business more efficiently

  • Cloud

    Improve productivity by relying on the security of the cloud with the performance capabilities and solutions you need

  • Collaboration & Communication

    Stay connected in and out of the office, virtually anytime, anywhere, to get work done faster and easier than ever

  • Cybersecurity

    Protect your business from cyber criminals, data breaches, natural disasters, and more

  • Internet of Things (IoT)

    Connect and monitor assets from virtually anywhere for maximum productivity

  • Marketing

    Get the word out about your products and services by using the latest hardware, software, and other technology

  • Mobile Technology

    Streamline collaboration, communication, and management to mobilize people, processes, and assets

  • Network & Connectivity

    Experience greater bandwidth, security, intelligence, simplicity, scalability, and flexibility in an integrated single network platform