To log in to her network, Jill uses a token and a four-digit PIN.
Which authentication measure best describes this?
Two-factor authentication
Because Jill uses something she had(a token) and something she knows(the PIN),
this is considered two-factor authentication.
Two factors are used for authentication here.
Sem comentários:
Enviar um comentário