This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • Hard or Soft token to external Third Party Vendors?
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
RyanMcVey
RyanMcVey Beginner
Beginner
‎2018-01-24 10:13 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Hard or Soft token to external Third Party Vendors?

I have a question about your policy when sending tokens to Third Party Vendors? Do you send a hardware token to them or a software token? What is safer?

 

I am on the verge of needing more hardware tokens but have a number of available software tokens, should I send them or purchase more hardware tokens to send to external vendors?

 

Is the a correct answer to this?

Thanks.

Ryan

Labels (1)
Labels
  • Labels:
  • Authenticators

  • Tags:
  • *
  • Authenticator
  • Authenticators
  • Best Practice
  • Community Thread
  • Discussion
  • external vendors
  • Forum Thread
  • Hardware Token
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • Software Token
  • third party vendor
  • third_party_vendor_management_strategy
  • Token
  • Token Auth
  • Token Authentication
  • Token Authenticator
  • Token Authenticators
2 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
3 Replies
EricaChalfin
Employee (Retired) EricaChalfin Employee (Retired)
Employee (Retired)
‎2018-01-24 11:12 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Ryan McVey‌,

 

I've moved your question to the RSA SecurID Suite‌ space so it can be seen by others who use Authentication Manager and the SecurID tokens.

 

Whether you provision hardware or software tokens to your outside contractors is a decision that needs to be made based on your company's security policies.  That being said, I'd be curious what members of this community have to say.  There are arguments for opting for hardware tokens v software tokens and vice versa. 

 

For example, some people think hardware tokens are more secure, but our technical people say both options are  equally secure.  If you provide a software token to a contractor, when they no longer need to authenticate to your resources, you simply revoke it and then when needed, distribute that same token serial number  (with a new set of random numbers) to a new contractor.  Take a look at  Video Link : 27003   Easy peasy . . . and there is no need to worry about whether the hardware token mailed back to you.

 

OK RSA admins who are reading this, give us your feedback in the hardware versus software token debate!

 

Regards,

Erica

3 Likes
Share
Reply
PiersB
Trusted Contributor PiersB Trusted Contributor
Trusted Contributor
‎2018-01-24 12:13 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

You could also look into "OnDemand" tokens from Authentication Manager. The user enters their logon ID and a PIN. This causes the server to send a SecurID tokencode to the user via SMS. You would need to establish a relation with an SMS provider. AM has a generic HTTP plug-in architecture for SMS-provider integration.

 

OnDemand tokens can be used with any qualified partner agent as "Next Tokencode Required" is leveraged to prompt the end-user for the SMS code they received on the mobile device.

3 Likes
Share
Reply
SpencerMay
SpencerMay Beginner
Beginner
‎2018-01-25 01:40 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

One security benefit I see with using soft tokens is the ability to lock down the token to be used on one device using the binding id for that device. 

 

Also, if you have the Identity Router configured in your environment I could also see a possible use case for using push code authentication.

1 Like
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.