iTnews
  • Home
  • Features
  • Technology
  • Security

Review: eToken

By Julian Ashbourn on Mar 1, 2006 12:00AM
Review: eToken

The use of a token offers interesting possibilities for user authentication and single sign-on to multiple applications. For example, various credentials can be stored on a token and released to applications and services as required. The user may then simply remember a single password for the token which, in turn, will take care of the detailed requirements for each application.

The use of a token offers interesting possibilities for user authentication and single sign-on to multiple applications. For example, various credentials can be stored on a token and released to applications and services as required. The user may then simply remember a single password for the token which, in turn, will take care of the detailed requirements for each application.

This approach also facilities the use of a Public Key Infrastructure (PKI) and secure access to a VPN to support remote users securely.

Aladdin supports all these ideas and more, including a special token to display a one time password for those who like this approach. The popular form factor for Aladdin tokens is the familiar USB token, although smartcards are also available.

Furthermore, proximity technology can be combined with either a USB token or smartcard for those who wish to integrate physical access control.

Getting back to standard USB tokens, if they are used on a daily basis, they must be able to withstand the rough and tumble of corporate life. The Aladdin USB tokens have always proved themselves up to this challenge, with a robust construction that can withstand the rigours of normal use quite happily.

We are pleased the eToken Pro USB token continues this tradition. Aladdin’s Token Management System software provides all the tools you need to manage tokens within the enterprise, including issuance, revocation and password management, and integrates seamlessly into a Microsoft environment, making good use of the Active Directory and other components as appropriate.

It provides a coherent management point which most system admins will find intuitive and straightforward. OS support includes Windows 98/98SE/ME/ NT 4 and later versions, while installation is straightforward and clear documentation is provided in PDF format.

At first glance, there seems little that is particularly radical or revolutionary about eToken, which is probably its main strength. Aladdin knows about tokens and how they might best be used to support the establishment of a secure IT environment. It has considerable experience in this area, and the current product embodies this wealth of experience in a tried and tested manner.

This may be exactly what many are looking for in their pursuit of enhanced user authentication to their networks and applications. If you are attracted to the token approach, take a look at what Aladdin can offer.

For: Simplicity of approach and proven technology.
Against: Very little in context.
Verdict: A well-proven set of tools for implementing token based access control in typical corporate environments.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
2006etokensecuritysignonsingle

Partner Content

Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Julian Ashbourn
Mar 1 2006
12:00AM
0 Comments

Related Articles

  • Poor patching creates easy zero-day vulnerability reuse
  • Atlassian patches Jira server plugin to fix vulnerability
  • Monash University opens public bug bounty
  • Sophisticated ZuoRAT attack targets home workers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

PayTo rollout kicks off

PayTo rollout kicks off

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

TPG Telecom puts fresh targets on IT simplification

TPG Telecom puts fresh targets on IT simplification

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.