Two-factor authentication is a security process in which the user provides two means of identification where one is a card and the other is a security code. These improve security and reduce the risk of unauthorized access. Forti Token Two-factor Authentication enables access for Networks and Security devices. Only authorized individuals can access organization’s information. Forti Token One Time Password (OTP) security devices or mobile applications eliminate the need for an external authentication server.
Features of Forti Tokens Authentication
ü Extremely secure, strong authentication which uses OTP tokens.
ü Zero client footprints easily administer tokens for remote users.
ü Tokens are flexibly managed for network operations and security requirements.
ü It can be used for authentication to multiple online systems.
ü Highly secure seed delivery options allow you to manage.
It provides an integrated authentication server which eliminates the need for the external server typically required when implementing two-factor solutions. The short-lived, time-based token adds strong authentication to secure remote Virtual Private Network (VPN) IPSEC access, SSL VPN access, Wi-Fi Captive Portal network logon and FortiGate Administrator login.
One Time Password Token for Authentication
Passwords can be used by anyone but One-time password (OTP) token offers enhanced security for both remote and on-premise users. It ensures that only authorized individuals can access information. This can basically reduce online frauds.
FortiToken is a one-time password generator which users use to login the system. It generates a six-digit token that the user enters in addition to username and password at logon as an extra factor of security.
To add a new user, the FortiToken must first be added to the FortiGate unit and get verified by the FortiGuard system. Now FortiGate and FortiToken time must be synchronized. Then the FortiToken can be applied to the user account. It can be tested by the user logging in and being prompted for the FortiToken generated code.
A security token is used as part of a system to prove one’s identity. There are many types of hardware and software based tokens like dongles, key fobs, authentication tokens, USB tokens and cryptographic tokens.
Token authentication solutions all require a client and server component. The client component is the Security Token and the server component is the Authentication Server. The two components share secret keys that are related to each other and use it independently to perform cryptographic operations. Enterprises need strong authentication solutions that are flexible enough to secure online resources across a wide spectrum of environments.
Fortinet token types