Security Tokens

These are small key-chain devices, which are about the size of an automobile wireless remote. Some manufacturers of these products also offer software based tokens, thus eliminating the key-chain device. They have a small LCD display that shows a long number every 30 seconds.

Like the Google® two-step verification process, the user must first enter their password. The second step is to enter the number currently displayed on the token. The number changes periodically (usually every 30-60 seconds). If everything matches up, the user may access the resources.

Large corporations most commonly use tokens for VPN access. The negative to this system is that it will only work for a single issuing site and the device can be lost. When a device is lost, it is useless to anyone who finds it, but the user has the inconvenience of waiting for a replacement.

Until the user gets the hang of timing their login with the device, it can also prove frustrating when the time window ends right after entering the long number, but before the server receives the message.

Home | Live CD Listing | Password Worksheet | Third Party Ratings | Purchase | Errata | Contact | News | Legal

Copyright © 2011, Sustainable Alternatives, LLC | Ligonier, PA 15658 | 724-238-9560 | All Rights Reserved.