Before a user can use a hardware token to authenticate, you must distribute the token to the user.
Before you begin
Assign a hardware token to a user.
Do one of the following:
If users are located within close proximity, instruct the users to physically collect the tokens.
If your organization is large and geographically dispersed, distribute tokens by mail.