Planning Token Authentication

To configure tokens for a particular vendor, you must perform a series of procedures. Use the following list to ensure you perform all the required procedures:


Authentication Container Object

The Authentication Container object contains the Authentication Device objects (tokens or smart cards) from a single vendor and manages the common configuration tasks for these objects. All Authentication Device objects must be contained within an Authentication Container object. Therefore, you must create at least one Authentication Container object for each vendor you support. You may create multiple Authentication Container objects if you would like to store the Authentication Device objects from a vendor in more than one location in eDirectory. This object consists of the following pages:


Authentication Device Object

The Authentication Device object contains information about a single token or other device. When you import or initialize a token, an Authentication Device object is created. This object contains the following pages:


Protecting Device Data in NDS or eDirectory

The authentication device data stored in NDS or eDirectory is critical to system security. This data should be carefully protected and access to it should be restricted to authentication servers and administrators who require access.

Sensitive information stored on authentication device objects is encrypted automatically; however, additional measures should be taken to protect this data. We recommend the following:



  Previous Page: Setting Up Remote Connections Restrictions  Next Page: Managing Token Authentication