What is Token Authentication?

Token authentication is a form of “two-factor authentication”, meaning users must supply two unique factors when logging in. The first factor is something the user knows, like a password or PIN. The second factor is provided by an authenticator, a hardware or software “token” with a code that changes randomly, usually every sixty seconds. Token authentication is used by individuals and organizations to increase security for devices and networks.

 

Benefits of Token Authentication

As companies open their networks to a wide variety of remote users such as mobile employees, customers, partners, resellers and suppliers, they risk the exposure of highly valuable, proprietary and sensitive information. Token authentication helps  protect sensitive information while providing the following benefits:

Enhanced Security on Multiple Platforms

Token authentication offers protection across remote access servers, VPNs, web portals, enterprise networks, and cloud-based applications.

Flexible Access Options

Tokens can be either a physical piece of hardware such as a key fob, or software delivered as an application on a mobile device. This allows users the flexibility to choose the authentication option that works best for them.

Reduced Risk

Even if a user’s password is compromised, the authentication code from the hardware or software token is still required for access (and vice versa), helping to significantly reduce the risk of unauthorized users gaining entry to a network.


Examples of Token Authentication

Key Fobs

The key fob style authenticator has a small screen that displays a code that is generated randomly and changes in intervals. The user will enter this code in addition to a password they have created to obtain access to electronic resources.

Single Sign On

Single Sign-On technology stores the authentication token so that a user is only required to validate their credentials one time, instead of each time they try to access a different resource.

Smart Cards

Smart cards can be used as security tokens and are usually seen in two different forms: Contact - such as credit cards with electronic chips, and Contactless - such as an employee badge.

Topics

Discover content based on your areas of interest

  • Business Operations

    Streamline your processes and run your business more efficiently

  • Cloud

    Improve productivity by relying on the security of the cloud with the performance capabilities and solutions you need

  • Collaboration & Communication

    Stay connected in and out of the office, virtually anytime, anywhere, to get work done faster and easier than ever

  • Cybersecurity

    Protect your business from cyber criminals, data breaches, natural disasters, and more

  • Internet of Things (IoT)

    Connect and monitor assets from virtually anywhere for maximum productivity

  • Marketing

    Get the word out about your products and services by using the latest hardware, software, and other technology

  • Mobile Technology

    Streamline collaboration, communication, and management to mobilize people, processes, and assets

  • Network & Connectivity

    Experience greater bandwidth, security, intelligence, simplicity, scalability, and flexibility in an integrated single network platform