Definitions

Sorry, no definitions found. Check out and contribute to the discussion of this word!

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word token-based.

Examples

  • Chess would like to see wider adoption of token-based authentication schemes such as PayPal's Security Key.

    Keeping your bank account safe from trojan attacks 2009

  • The most unusual response to the business card conundrum may be token-based business cards.

    Business Cards 2.0 2010

  • Regulators, meanwhile, continue to put the pressure on financial institutions to adopt two-factor though not necessarily token-based authentication.

    Handicapping Hacker Plays FindProfit C. Max Magee 2006

  • Along with their benefits, all economic systems have pathologies, but maybe there's an alternative that would work as well as a token-based economic system with fewer of the disadvantages.

    Is Inflation Fun? 2005

  • L2TP users cannot use a RADIUS server in passthrough mode plus a token-based system (a token is a separate authentication device).

    Using RADIUS in Passthrough Mode 2001

  • For a token-based system like AXENT Defender, the RADIUS server prompts the client with the text in attribute 18 for the token password, which is also passed by this attribute.

    RADIUS Dictionary File Attributes 2001

  • Here is the snippet of the article pertaining to this topic: By default, when you use SAML token-based authentication, all queries entered in the text box are automatically displayed as if they had been resolved, regardless of whether they are valid users or groups.

    Site Home Ali Mazaheri 2011

  • Unlike other SSO and authentication products, SecureAuth is known world-wide for its all-in-one Identity Enforcement Platform, SecureAuth IEP that delivers the industry's first integrated 2-Factor Authentication, SSO, and IdM for less than the cost of a token-based solution.

    unknown title 2011

  • If your SharePoint Server 2010 solution will use SAML token-based authentication, you should plan to create a custom claims provider that will implement custom search, name resolution, and list features.

    Site Home Ali Mazaheri 2011

  • All network communication within Mike is encrypted using either key or token-based authentication and all outbound network access from a Mike build is transparently proxied and validated.

    Releases feed from RealWire 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.