Sorry, no definitions found. Check out and contribute to the discussion of this word!


Sorry, no etymologies found.


  • Chess would like to see wider adoption of token-based authentication schemes such as PayPal's Security Key.

    Keeping your bank account safe from trojan attacks

  • The most unusual response to the business card conundrum may be token-based business cards.

    Business Cards 2.0

  • Regulators, meanwhile, continue to put the pressure on financial institutions to adopt two-factor though not necessarily token-based authentication.

    Handicapping Hacker Plays

  • Along with their benefits, all economic systems have pathologies, but maybe there's an alternative that would work as well as a token-based economic system with fewer of the disadvantages.

    Is Inflation Fun?

  • L2TP users cannot use a RADIUS server in passthrough mode plus a token-based system (a token is a separate authentication device).

    Using RADIUS in Passthrough Mode

  • For a token-based system like AXENT Defender, the RADIUS server prompts the client with the text in attribute 18 for the token password, which is also passed by this attribute.

    RADIUS Dictionary File Attributes

  • If your SharePoint Server 2010 solution will use SAML token-based authentication, you should plan to create a custom claims provider that will implement custom search, name resolution, and list features.

    Site Home

  • Here is the snippet of the article pertaining to this topic: By default, when you use SAML token-based authentication, all queries entered in the text box are automatically displayed as if they had been resolved, regardless of whether they are valid users or groups.

    Site Home

  • Unlike other SSO and authentication products, SecureAuth is known world-wide for its all-in-one Identity Enforcement Platform, SecureAuth IEP that delivers the industry's first integrated 2-Factor Authentication, SSO, and IdM for less than the cost of a token-based solution.

  • All network communication within Mike is encrypted using either key or token-based authentication and all outbound network access from a Mike build is transparently proxied and validated.

    Releases feed from RealWire


Log in or sign up to get involved in the conversation. It's quick and easy.