Netgear UTM5 Instrukcja Użytkownika Strona 465

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 484
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 464
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Two Factor Authentication D-3
v1.0, January 2010
The request-response architecture is capable of self-service initialization by end-users,
dramatically reducing implementation and maintenance costs. Here is an example of how WiKID
works.
1. The user launches the WiKID token software, enter the PIN that has been given to them
(something they know) and then press “continue” to receive the OTP from the WiKID
authentication server:
2. A one-time passcode (something they have) is generated for this user.
Figure D-1
Figure D-2
Przeglądanie stron 464
1 2 ... 460 461 462 463 464 465 466 467 468 469 470 ... 483 484

Komentarze do niniejszej Instrukcji

Brak uwag