About 362,000 results
Open links in new tab
  1. Security token - Wikipedia

    Tokens in this category automatically transmit the authentication information to the client computer once a physical connection is made, eliminating the need for the user to manually enter the authentication …

  2. What Is a Security Token (or Authentication Token) and How Does …

    Sep 14, 2024 · A security token is a physical device that users must possess to access a system. Authentication data must flow between both the user and the system to validate identities and access.

  3. What Is a Hardware Token? Comparing Authentication Methods

    May 15, 2025 · A hardware token is a physical device used to verify a user’s identity during login. It serves as the second factor in multi-factor authentication (MFA), alongside a password.

  4. What is a Hard Token? Hardware Security Tokens Vs Soft Tokens

    This type of authentication system represents a hybrid between hard and soft tokens, given that the user must use a physical device and a third-party authentication app.

  5. Multi-Factor Authentication MFA Tokens & Passcodes | Duo Security

    Security tokens are physical tools or devices that a user carries to authenticate their identity online for secure login. These devices generate a unique passcode for users to enter to gain access to …

  6. How does authentication using physical tokens work?

    Dec 19, 2025 · Physical token authentication is a method of verifying a user's identity by requiring them to present a physical device (the token) that generates or stores a unique code or credential.

  7. How does the Token-Based Authentication work - GeeksforGeeks

    Mar 13, 2023 · Physical token: A Physical token use a tangible device to store the information of a user. Here, the secret key is a physical device that can be used to prove the user's identity. Two elements …

  8. What is a Security Token? | Definition from TechTarget

    Jun 30, 2023 · A security token is a physical or wireless device that provides two-factor authentication (2FA) for users to prove their identity in a login process. It is typically used as a form of identification …

  9. What is token-based authentication? - Cloudflare

    While physical token authentication verifies identity during the login process, web tokens are issued as the result of a successful login. They keep the logged-in session active.

  10. Token-based Authentication: Enhance Security Effortlessly

    Because the server side doesn’t need to maintain the state of a user, token-based authentication is often referred to as stateless authentication. Each token is unique to a user’s session and is protected by …