Token Card Support

Token cards can be software or hardware devices. The hardware devices are usually about the size of a credit card and contain a numeric keypad. When a user wants to authenticate, the user keys in a secret PIN, and a token string password is generated. The user enters his or her username and token string password when prompted by the NAS. From there, the process of communication is the same as described earlier with the external database server being a token card server that determines whether the username and token string password are valid.

The protocol used to communicate between CSACS and the token card server is usually a ...

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.