Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: discostu

“the token model”

What’s that? Did you see the other post about the two-factor method?


49 posted on 06/09/2021 10:34:08 AM PDT by cymbeline
[ Post Reply | Private Reply | To 47 | View Replies ]


To: cymbeline

2 factor generally runs through the token model. So what happens is you go through a login that probably doesn’t even use your password, or if it does that’s only half the login, and then you get a token. That token is only useful on that computer and for a limited amount of time. It’s very secure BUT the setup time to get it going is rough, and on the user side it’s not terribly intuitive, and often involves user having to install apps on their phone, then you get a bunch of extra headaches when you have to switch phones. But it’s the wave of the future because it greatly limits the use, storage and transmission of passwords.


50 posted on 06/09/2021 10:38:34 AM PDT by discostu (Like a dog being shown a card trick )
[ Post Reply | Private Reply | To 49 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson