Part of a two-factor authentication system to prove a user is who he us supposed to be. A token is a hardware or software device that is used in conjunction with a password login. For example, a key device that must be physically attached to a USB port before an individual is allowed to type in his password to access the network system.
A hardware device that generates a one-time password to authenticate its owner; also sometimes applied to software programs that generate one-time passwords.
A device that is used to authenticate a user, typically in addition to a username and password. It is usually a credit card-sized device that displays a pseudo random number that changes every few minutes.
A security device about the size of a credit card, a token is used to generate a network ID code. Typically, a user enters a password into the device and then is granted a randomly generated access code that can be used to log onto a network.
Security industry jargon for hardware or physical objects used for securing data or identity. Unlike software security solutions, smart cards are a "hardware token".
In the Sun Ray system, a token must be presented by the user. It is required by the Authentication Manager to consider allowing a user to access the system. It consists of a type and an ID. If the user inserted a smart card, the smart card's type and ID are used as the token. If the user is not using a smart card, the enterprise appliance's built-in type (pseudo) and ID (the unit's Ethernet address) are supplied as the token.
Whenever you log in to UNIX via an AFS account, AFS checks the password you supply to make sure that you are who you claim. If you are, AFS grants you a token and thereby authenticates you as a valid AFS user. Reference Link (http://www.slac.stanford.edu/BFROOT/www/doc/workbook/unix/unix.html#afs_and_nfs)
A physical token some gadget you must own to gain access to for example data. Typical physical tokens today are for example credit cards and smart cards. A smart card is small computer in tamper resistant packaging that may be used to enter really long keys into cryptographic algorithms if you have the equipment.
A credit card size or key FAB sized authentication device that a user carries. It usually displays numbers that change over time and synchronizes with an authentication server on the network, and it may also use a challenge/response scheme with the server. Tokens are based on something you know (a password or PIN) and something you have (an authenticator - the token).
a brief name for a hardware device that is either predefined by Merge or added by the system administrator
a device that contains or manipulates cryptographic keys that need to be protected from attackers
a handheld device that has a built-in challenge response scheme that authenticates with an enterprise server
a hand-held hardware device that generates a one-time password to authenticate its owner
a hardware or software device that performs cryptographic functions and optionally stores public-key certificates, cryptographic keys, and data defined by the application using the cryptographic services
a name for a device definition, which provides access to a hardware device or another resource that is not automatically available to DOS and Windows sessions
an authentication too, a device utilized to send and receive challenges and responses during the user authentication process
an object the user carries to authenticate his or her identity
a personal cryptographic device which we can easily carry around with us
a physical device capable of storing a secret value, and processing that secret value with a cryptographic function in accordance with a challenge-response protocol
a physical device, such as an ATM card, smart card, or other device that contains information used in the authentication process
a portable device that creates one-time passwords used when users log on to Web applications such as online banking
a security device in the possession of an authorized user
a small and lightweight personal authentication device that offers everything needed to securely access your email account
A possession that shows the identity of its owner such as a smart card, a 2D bar-code on a physical support or a contactless card.
A set of data that is granted after a user authenticates to AFS. A token is used by the Cache Manager when requesting services from AFS servers. A token has an associated lifetime and expires after a set period of time. If your token expires, you no longer have authenticated access to AFS. The standard token lifetime is 25 hours.
a set of data that indicates that a user has been authenticated and is authorized to request files and services on the system. Tokens are granted after a user authenticates to AFS. A token is used by the Cache Manager when requesting services from AFS servers. A token has an associated lifetime and expires after a set period of time.
In authentication, a device used to send and receive challenges and responses during the user authentication process. Tokens may be small, hand-held devices similar to pocket calculators or credit cards.
(1) (n.) A piece of data that is passed around within the software.(2) (n.) A data packet that is in the form of a GSS-API gss_buffer_t structure. Tokens are produced by GSS-API functions for transfer to peer application Tokens are of two types. Context-level tokens contain information that is used to establish or manage a security context. For example, gss_init_sec_context() bundles a context initiator's credential handle, the target machine's name, and flags for various requested services into a token to be sent to the context acceptor. Message tokens (also called per-message tokens or message-level tokens) contain information that is generated by a GSS-API function from message s to be sent to a peer application. For example, gss_get_mic() produces an identifying cryptographic tag for a particular message and stores the tag in a token to be sent to a peer with the message. Technically, a token is considered separate from a message, which is why gss_wrap() is said to produce an output_message and not an output_token.
A chunk of information associated with the account, such as a password or passphrase, which the applicant must provide to prove his identity.
A hardware or software device that is associated with a slot in a PKCS #11 module. It provides cryptographic services and optionally stores certificates and keys.
A collection of data that the AFS server processes accept as evidence that the possessor has successfully proved his or her identity to the cell's AFS authentication service. AFS assigns the identity anonymous to users who do not have a token.
See definition for: cryptographic token
When you login to a machine in AFS you must be issued a "token" in order to become an authenticated AFS user. This token is issued to you automatically at login when you enter your password. Every token has an expiration date associated with it; on CTC machines, tokens are set to expire after 100 hours. To see what tokens you have, enter the command "tokens"
A password necessary to use the ERAS system.
A password that can be used only once, typically generated as needed by a hardware device. Tokens are considered secure because even if one is revealed, it cannot be misused because it is no longer valid after its first use.
Physical device that contains information specific to the user
Also called a security token or an authentication token. Something a person has that evidences validity, or identity. It is usually a hardware device that resembles a hand-held calculator, since it often has some sort of display and perhaps a keypad for entering numbers. Tokens achieve the goal of "two-factor authentication," considered a strong standard of security when validating who a user is, because accessing a network that uses tokens requires two factors: something the person knows (a password) and something the person has (the token).
In the Windows NT architecture, a token is a system object (type name "Token") representing the subject in access control operations, i.e. the active part (the passive part being the object being accessed). Token objects are usually built by the logon service to represent the security information known about an authenticated user, but they are essentially free-form and can include any combination and number of the possible elements.