Announcements

SecurID® Community Blog

Subscribe to the official SecurID Community blog for information about new product features, industry insights, best practices and more.

Myth 4: Dispelling The Myths around Software Tokens

RSALinkTeam1
Employee
Employee
1 0 443

Provisioning of software authenticators is very difficult.  Myth shattered!

 

Actually, it's really simple and here's why:  RSA provisions software tokens one of two ways:  Through file based provisioning or dynamic seed provisioning, which is a method that does not transmit any confidential information over and network and security binds a token to the device.

 

Sounding a bit "techie?" Let's slow it down into 1, 2, 3 easy steps.

 

  • One download the software authenticator app.
  • Two, the server generates a URL, which is sent securely through the web to you, the user.
  • Three, you click on the URL and hey presto, the server and SecurID software app generates a tokencode.  Easy . . . when you know how.