ABSTRACT

Contents Overview of Authentication Factors .........................................................................................154 Types of Tokens and How Th ey Work .....................................................................................157 Token Management .................................................................................................................159 Conclusion ...............................................................................................................................160 References ................................................................................................................................160

Authentication is an important part of any system or application security. It is the basis for any access control that is needed over information that is in the system or authorization for any transactions that could be carried out. To provide stronger authentication, tokens are increasingly being used to add an additional dimension or factor of authentication and to reduce the risk of an attacker impersonating a user.