{"id":465,"date":"2017-01-29T04:16:03","date_gmt":"2017-01-29T04:16:03","guid":{"rendered":"https:\/\/blogs.scu.edu\/finis\/?p=465"},"modified":"2017-01-29T04:16:03","modified_gmt":"2017-01-29T04:16:03","slug":"soft-is-the-new-hard","status":"publish","type":"post","link":"https:\/\/blogs.scu.edu\/finis\/2017\/01\/29\/soft-is-the-new-hard\/","title":{"rendered":"Soft is the New Hard"},"content":{"rendered":"<p>The use of physical security tokens during two-factor authentication has been a fairly common practice in corporate America. It creates a more secure system. An annoyance of this process has been the need to carry the physical token. There are many form-factors, but resemble key fobs. If you forgot or lost the token, you would need to contact the IT administrator to login to your computer. \u00a0Imagine if you are about to present at a meeting, but unable to login. Awkward&#8230;<\/p>\n<p>Citi Bank is now rolling out a soft-token system for their clients. Instead of a key fob, users can download a Citi Bank app to generate login credentials. This has many advantages. One is less likely to lose an essential item like a mobile device than\u00a0a keychain. Most people have their phones with them constantly, so users have the power to login to their financial systems whenever they want. They will not have to wait to receive a physical token, which can take days if you work in a\u00a0geographically dispersed company. Finally, less paperwork! The process of getting physical tokens at a company takes signatures. Soft tokens have great advantages that Citi Bank&#8217;s clients will benefit from.<\/p>\n<p>Link:\u00a0https:\/\/www.finextra.com\/newsarticle\/30048\/citi-ditches-physical-tokens-for-app-based-login-to-corporate-platforms<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The use of physical security tokens during two-factor authentication has been a fairly common practice in corporate America. It creates a more secure system. An annoyance of this process has been the need to carry the physical token. There are many form-factors, but resemble key fobs. If you forgot or lost the token, you would &hellip; <a href=\"https:\/\/blogs.scu.edu\/finis\/2017\/01\/29\/soft-is-the-new-hard\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Soft is the New Hard<\/span><\/a><\/p>\n","protected":false},"author":1552,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-465","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"gutentor_comment":1,"qubely_featured_image_url":null,"qubely_author":{"display_name":"kasimshaikh","author_link":"https:\/\/blogs.scu.edu\/finis\/author\/kasimshaikh\/"},"qubely_comment":1,"qubely_category":"<a href=\"https:\/\/blogs.scu.edu\/finis\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","qubely_excerpt":"The use of physical security tokens during two-factor authentication has been a fairly common practice in corporate America. It creates a more secure system. An annoyance of this process has been the need to carry the physical token. There are many form-factors, but resemble key fobs. If you forgot or lost the token, you would&hellip;","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/users\/1552"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/comments?post=465"}],"version-history":[{"count":1,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/465\/revisions"}],"predecessor-version":[{"id":468,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/465\/revisions\/468"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/media?parent=465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/categories?post=465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/tags?post=465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}