[WEBINAR] Bulletproof: How Today's Business Leaders Stay on Top

Identity Token

Definition - What does Identity Token mean?

An identity token is a portable piece of hardware that a user carries and uses to access a network. The token aids in proving the user's identity and authenticating that user for the use of a service.

An identity token is more often referred to as a security token or an authentication token.

Techopedia explains Identity Token

A security token can be made of a smart card that is part of a key fob and provides two-factor authentication. This means that there are two different security methods that the user is implementing to prove his or her identity. The first is a PIN that the user enters. This authorizes the use of the token, which will display a number, often called a one-time password. This allows the user to access the service. This number will change often, such as every few minutes, or even more often, to increase security. Tokens are safer to use than passwords, which provide only one layer of security, do not change very often, and are easily compromised. For example, someone could write down their password and leave it where someone else can find it and use it. People often also pick passwords that are easily guessed, such as the name of a household pet or a dictionary word, which can be cracked with software.

Tokens can be used to confirm identity to gain access to email, networks, intranets and extranets, desktops, Web servers and more.

One of the difficulties with security tokens is getting user buy-in to use them. Users do not want to carry around an additional device, especially since they may need to carry a number of tokens for each account they use. Another disadvantage of tokens is that they are small and easy to lose. This causes more work for the company, which has replace the devices.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.