Migrated to https://github.com/hashbang/book
Security tokens are small hardware devices one uses to prove physical access to a computer system in addition to traditional text credentials like a username or a password. The larger an organization gets, the higher the potential of a smartphone or a computer might be accessed by an unauthorized third party.
While adding the requirement of having to physically insert or touch a device to a username and password may seem simple, it is something one can not do remotely. This makes it a highly effective and simple way to greatly limit damage and data theft from remote attackers.
If you don't yet have a device, learn about your options in Devices.
If you have not yet set up your device see Setup.
If you want to learn how to use your device, explore relevant Use Cases.
Common questions are covered in Frequently Asked Questions.
For anything else please contact lance@lrvick.net or file an issue.