About 65,900,000 results
Open links in new tab
  1. What is a phone as a token? [The five main types] - Incognia

    Phone-as-token is a type of authentication method in which a mobile phone is used as a token to assert a user’s identity.

  2. What is Phone-as-a-Token Authentication? - HYPR Corp

    Phone-as-a-Token Authentication includes methods of asserting one's identity using their mobile device rather than a dedicated hardware token.

  3. How Soft Token Authentication Can Maintain Strong Security

    Today’s hard tokens are better than they were. Instead of copying random numbers off the side of an RSA device, modern hard tokens like YubiKeys hook directly into the USB port of your …

  4. Ultimate Guide to Token-based Authentication | Ping Identity

    Dec 23, 2024 · Soft tokens, also referred to as disconnected tokens, are software generated through devices in the user’s possession, such as mobile devices. OTPs can be used to …

  5. Authentication Tokens: How They Work and Why They’re Secure?

    May 22, 2025 · Instead of relying on a password to verify someone’s identity, a system issues an authentication token after the user logs in for the first time. This token acts as proof of identity …

  6. The Complete Guide to Authentication and Authorization Tokens: …

    Feb 18, 2025 · Understand different token types, from bearer tokens to PATs, along with their implementation strategies and security considerations. Perfect for developers, architects, and …

  7. What is Token Authentication and How It Works

    Mar 25, 2025 · The token is then used to authorize requests to various services without needing to authenticate the user repeatedly. This method simplifies token-based authentication by …

  8. Wultra’s Guide to Code-Based vs. Codeless Mobile Tokens

    Mobile tokens, also called mobile authenticators, software tokens, or soft tokens, are mobile apps for iOS and Android that supplement two-factor authentication (2FA) for various online …

  9. Token-Based Authentication: Types, Importance & Best Practices

    Feb 18, 2025 · Token-based authentication can be defined as a security model where tokens are passed from the client to the server and vice versa and where a client can be a website that a …

  10. Token-Based Authentication: The Most Secure Method for Mobile

    Learn what token-based authentication is, how it works, and why it is the most secure way to authenticate users on a mobile app. Find out how to implement it and what benefits it offers.