You will have a small token kind of thing that displays a five digit number. It looks like a small pager. This number keeps changing. When connecting to sensitive networks, you will be asked for your ID and this token number.
2006-08-09 01:07:37
·
answer #1
·
answered by Indian_Male 4
·
0⤊
1⤋
2
2016-08-23 15:17:11
·
answer #2
·
answered by ? 3
·
0⤊
0⤋
For the best answers, search on this site https://shorturl.im/avBPa
Firtsly, I have to make it clear there is no connection in any way to the token. It is a purely standalone device. The other answer I have seen is nonesense! Sorry! The 6 digit code that you see on the token is generated using an algorithm that is exists in all tokens. The token also contains a clock and has a unique seed number. The current time and the unique seed are processed using the algorithm and produce the token code you see on the token. This is normally done 1 per minute. In this way a unique code is generated that appears to be random. The server (Ace server), that is online and conected to whatever system you are logging on to, also knows the time and it also knows the unique seed number of your token. So it uses the same algorithm to calculate the code that you should see on your token. If they match then you are authenticated. I guess the next question you are asking is what happenes if the time is wrong on the token (or the server). Well this can happen and for that reason the server normally allows a 3 minute window. So it will calculate and accept passcodes based on the current time and a minute either way. If the code is more than 2 minutes out and less than 10 then the server will recognise this code also but will ask for the next code as well to confirm you really have the token and didn't just read it by chance on someone elses token. If the time is slightly wrong then the server sets a time offset for the token and remembers that it is x minutes out. It then knows to expect this and has effectively synchronised the token. There's loads more to it so if you think of any questions I'll be happy to answer them. Hope this helps!
2016-04-07 02:25:42
·
answer #3
·
answered by Keyo 4
·
0⤊
0⤋
RAS (Remote Access Server): This is a server that is dedicated to handling users that are not on a LAN but need remote access to it. The remote access server allows users to gain access to files and print services on the LAN (other servers) from a remote location (such as out in the field).
RAS (RSA) Secure ID is a two-factor user authentication system that provides greater security than weak, static passwords. It combines something the user knows (i.e., a secret PIN or passcode) with something the user possesses: an ever-changing code generated by a hardware token (i.e., a unique RAS Secure ID token that generates a one-time password every 60 seconds: ),
Two-factor authentication from any vendor is pricey but a good way to keep networked data from getting to the wrong hands.
2006-08-09 06:56:01
·
answer #4
·
answered by gospieler 7
·
2⤊
0⤋
Ras Token
2016-10-21 00:26:57
·
answer #5
·
answered by ? 4
·
0⤊
0⤋
This Site Might Help You.
RE:
what is RAS Secure ID?
2015-08-18 16:44:58
·
answer #6
·
answered by ? 1
·
0⤊
0⤋
Remote Access Server Secure ID.
This is something that identifies you to the server to which you want to connect.
It is used for connecting via a VPN (virtual private network).
2006-08-09 00:25:44
·
answer #7
·
answered by Victoria 6
·
0⤊
0⤋
they use a radio transmitter that sends a constant signal to a company in austraulia. that company uses the net to change passwords in sinc with the token. in about 5 years it will be out of sinc and you will need to have it re-calibrated then. but by that time you will probally be on the I RAZ 4 system. it is much easier. it is like a usb thumb drive but it holds all of your security codes and you just plug it in and then you have 2 passwprds to get into your pc.
2016-03-19 07:16:42
·
answer #8
·
answered by Anonymous
·
0⤊
0⤋
There is a product from RSA (Rivest-Shamir-Adelman, a security company) called SecurID, which is a token generating numbers that change once a minute for the purposes of two-factor authentication, usually for virtual private networking.
2006-08-09 03:22:23
·
answer #9
·
answered by lacrosseref 2
·
0⤊
2⤋