Authentication As described in the blog “Exploring Hard Tokens”, the combination of a username/password for acces control has some “big” disadvantages. Passwords can be cracked, retrieved by social engineering, read from faulty systems, retrieved from unsecured internet access, etc. Yet authentication … Continue reading
↧