Two-factor Authentication - Product Proliferation

Product Proliferation

Many TF-A products require users to deploy client software to make TFA systems work. Some vendors have created separate installation packages for network login, Web access credentials and VPN connection credentials. For such products, there may be four or five different software packages to push down to the client PC in order to make use of the token or smart card. This translates to four or five packages on which version control has to be performed, and four or five packages to check for conflicts with business applications. If access can be operated using web pages, it is possible to limit the overheads outlined above to a single application. With other TF-A solutions, such as virtual tokens and some hardware token products, no software must be installed by end users.

Read more about this topic:  Two-factor Authentication

Famous quotes containing the word product:

    The writer’s language is to some degree the product of his own action; he is both the historian and the agent of his own language.
    Paul De Man (1919–1983)