Date
1 - 5 of 5
VPN and tokens
Barbara Anne Bolin <barbaraanne1@...>
Hello List Friends,
My company is being directed by the government entity for which we have a long term contract to use VPN with tokens. With my last employer, we used a VPN SoftId solution. SoftId uses VPN without a token by displaying a graphical set of numbers on the computer screen. A coworker then wrote a macro/script to cut and paste the graphic into the Pass code. Then the verification was performed with no problems. My company in their infinite wisdom will not even investigate this solution. Before I raise this to a legal level, can any of you provide any information? I cannot imagine the government requiring a solution that is not able to be 508 Compliant. If you have any experience with using VPN, in an environment that uses tokens, will you please contact me off list at BarbaraAnne1@...? Always, Barbara Anne
|
|
Dave...
Yes, I use this all the time for work. SoftToken is a program that generates
toggle quoted messageShow quoted text
a token based on two factors: 1. It is running on the computer it is expecting to find (such as my laptop), and 2. I input a 4-digit pin to create the token. Then I copy the token, shut down SoftToken and paste into the VPN password field. Simple and elegant. Your company should have no issues, as it's just as secure as one of those token cards. Here's the Help/About screen from my copy: About SofToken II SofToken II (Version 2.1.1) Product Info: SofToken Info: File Version: 2.1.1 Serial Num: xxxxxx Copyright © 2002 Secure Computing API Version: 2.1 Secure Computing Corporation Type: DES Silver Mode: Asynchronous Phone: (Main) 1.800.692.5625 (Sales) 1.800.379.4944 (Support) 1.800.700.8328 (Intl. Support) 1.651.628.1500 Fax: 1.408.918.6101 Email: support@... sales@... Web: http://www.securecomputing.com OK Dave Carlson Written with grammatical care, punctuation, and capitalization because I empathize with readers of my mail. From my Dell Latitude 630 in the general vicinity of my Audio Recording and Mixing Studios, San Francisco Bay Area.
----- Original Message -----
From: "Barbara Anne Bolin" <barbaraanne1@...> To: "'The Jaws for Windows support list.'" <jfw@...> Sent: Tuesday, July 19, 2011 17:41 Subject: VPN and tokens Hello List Friends, My company is being directed by the government entity for which we have a long term contract to use VPN with tokens. With my last employer, we used a VPN SoftId solution. SoftId uses VPN without a token by displaying a graphical set of numbers on the computer screen. A coworker then wrote a macro/script to cut and paste the graphic into the Pass code. Then the verification was performed with no problems. My company in their infinite wisdom will not even investigate this solution. Before I raise this to a legal level, can any of you provide any information? I cannot imagine the government requiring a solution that is not able to be 508 Compliant. If you have any experience with using VPN, in an environment that uses tokens, will you please contact me off list at BarbaraAnne1@...? Always, Barbara Anne _______________________________________________ Jfw mailing list Jfw@... http://lists.the-jdh.com/mailman/listinfo/jfw_lists.the-jdh.com
|
|
Bissett, Tom <tom.bissett@...>
Hi Barbara Anne, We use RSASecurIDToken a software solution to the little device everyone else uses. It is industry standered security.
toggle quoted messageShow quoted text
Once the software is installed on your machine you simply launch the application, put in a four digit pin and hit enter. The token is generated for you and you simply cut and paste into the appropriate field and you are good to go. Regards Tom Bisset
-----Original Message-----
From: jfw-bounces@... [mailto:jfw-bounces@...] On Behalf Of Barbara Anne Bolin Sent: July 19, 2011 8:41 PM To: 'The Jaws for Windows support list.' Subject: VPN and tokens Hello List Friends, My company is being directed by the government entity for which we have a long term contract to use VPN with tokens. With my last employer, we used a VPN SoftId solution. SoftId uses VPN without a token by displaying a graphical set of numbers on the computer screen. A coworker then wrote a macro/script to cut and paste the graphic into the Pass code. Then the verification was performed with no problems. My company in their infinite wisdom will not even investigate this solution. Before I raise this to a legal level, can any of you provide any information? I cannot imagine the government requiring a solution that is not able to be 508 Compliant. If you have any experience with using VPN, in an environment that uses tokens, will you please contact me off list at BarbaraAnne1@...? Always, Barbara Anne _______________________________________________ Jfw mailing list Jfw@... http://lists.the-jdh.com/mailman/listinfo/jfw_lists.the-jdh.com
|
|
Barbara Anne Bolin <barbaraanne1@...>
Thanks for this additional fuel for my fire!
toggle quoted messageShow quoted text
When I can say I know X number of people who use this method successfully, it may add more punch. Always, Barbara Anne
-----Original Message-----
From: jfw-bounces@... [mailto:jfw-bounces@...] On Behalf Of Bissett, Tom Sent: July 20, 2011 8:54 AM To: 'The Jaws for Windows support list.' Subject: RE: VPN and tokens Hi Barbara Anne, We use RSASecurIDToken a software solution to the little device everyone else uses. It is industry standered security. Once the software is installed on your machine you simply launch the application, put in a four digit pin and hit enter. The token is generated for you and you simply cut and paste into the appropriate field and you are good to go. Regards Tom Bisset -----Original Message----- From: jfw-bounces@... [mailto:jfw-bounces@...] On Behalf Of Barbara Anne Bolin Sent: July 19, 2011 8:41 PM To: 'The Jaws for Windows support list.' Subject: VPN and tokens Hello List Friends, My company is being directed by the government entity for which we have a long term contract to use VPN with tokens. With my last employer, we used a VPN SoftId solution. SoftId uses VPN without a token by displaying a graphical set of numbers on the computer screen. A coworker then wrote a macro/script to cut and paste the graphic into the Pass code. Then the verification was performed with no problems. My company in their infinite wisdom will not even investigate this solution. Before I raise this to a legal level, can any of you provide any information? I cannot imagine the government requiring a solution that is not able to be 508 Compliant. If you have any experience with using VPN, in an environment that uses tokens, will you please contact me off list at BarbaraAnne1@...? Always, Barbara Anne _______________________________________________ Jfw mailing list Jfw@... http://lists.the-jdh.com/mailman/listinfo/jfw_lists.the-jdh.com _______________________________________________ Jfw mailing list Jfw@... http://lists.the-jdh.com/mailman/listinfo/jfw_lists.the-jdh.com
|
|
julie <memphis.magnolia@...>
What does a token do, give input for a security code of some sort?
|
|