About 77,300 results
Open links in new tab
  1. What is a Security Token? - GeeksforGeeks

    Jul 23, 2025 · A security token is a physical or wireless device that provides multi-factor authentication (MFA) for users to prove their identity in a login process. It is typically used as a …

  2. Security token - Wikipedia

    The simplest security tokens do not need any connection to a computer. The tokens have a physical display; the authenticating user simply enters the displayed number to log in.

  3. What Is a Security Token (or Authentication Token) and How …

    Sep 14, 2024 · A security token is a physical device that users must possess to access a system. Authentication data must flow between both the user and the system to validate identities and …

  4. What is a Security Token? | Definition from TechTarget

    Jun 30, 2023 · A security token is a physical or wireless device that provides two-factor authentication (2FA) for users to prove their identity in a login process. It is typically used as a …

  5. What Is a Security Token?

    Security tokens typically operate in two ways. First, when a user is dealing with a software-based token, they are issued a unique digital code to submit as proof of their identity. This is usually …

  6. Two-factor authentication - Explain that Stuff

    Sep 10, 2022 · An easy-to-understand introduction to how tokens can secure computer systems, covering the basics of two-factor authentication and one-time passwords.

  7. What Is a Token? - Computer Hope

    Sep 7, 2025 · The definition of a token in computing, covering uses in networks, programming, and security devices, with explanations and related informational links.

  8. Ultimate Guide to Token-based Authentication | Ping Identity

    Dec 23, 2024 · Learn about token-based authentication, how it works, its benefits, and key protocols to enhance security with token authentication for web and APIs.

  9. What exactly is a Token in Computers? | Huntress

    Sep 12, 2025 · What is a Token in Computers? A token serves as a substitute for more sensitive information, making computer systems both more secure and efficient. Instead of constantly …

  10. Token-based Authentication: Everything You Need to Know

    Jun 25, 2025 · A token can be computer-generated or hardware based. A valid token allows a user to retain access to an online service or web application until the token expires. This offers …