About software tokens
PKI software tokens (or soft tokens) can be used when you need a convenient method that is easy to rollout, but does not necessarily have the highest security level. Typical use cases include authentication at VPN access point and web services or for digital signature of emails and documents.Â
Software tokens are often used in combination with other methods. For example, a smart card might be required for Windows logon, but the security level of a software token is enough for VPN access. Â
Software tokens are delivered as PKCS#12 files or published in to Windows certificate store. A software token is used together with a password for authentication, signing and encryption. Â
Security:
Two-factor authentication by using PKCS#12 file and password
Easy withdrawal by revoking certificates
Convenience:
Certificate is available on the device
Used for multiple use cases
Copyright 2024 Technology Nexus Secured Business Solutions AB. All rights reserved.
Contact Nexus | https://www.nexusgroup.com | Disclaimer | Terms & Conditions