3. 1. 1 hardware token DKEY TPASS
Based on time synchronization, a 6-digit random password is generated every 60 seconds without installing software on the user's computer. More than 90% of Fortune 500 companies adopt hardware token scheme.
Features:
(1) Small and beautiful appearance, long display design.
(2) Support the oath agreement
(3) Zero footprint authentication, one-time password authentication and verification do not need to install client software.
(4) Improved low-cost password management solution
(5)36-month life cycle
3. 1.2 SMS password DKEY SmsID
DKEY SmsID SMS password will send a randomly generated one-time password to the mobile phone.
Features:
(1) You don't need to carry any authentication terminal.
(2) High security: using HAMC SHA- 1 256-bit algorithm to ensure that the SMS password cannot be cracked.
(3) Ningdun SMS password is the most integrated scheme with various application systems in China.
(4) Seamless integration with SSL VPN.
(5) Widely used in securities and futures, fund insurance and other industries. Realize the one-time password protection function of application system integration and realize the interoperability between business system and authentication server.
3.2. 1 Radius authentication
At present, almost all mainstream network devices support RADIUS authentication protocol, because DKEY TMS (Token Management System) has built-in RADIUS server.
Module, devices supporting RADIUS authentication protocol can integrate DKEY one-time password authentication by configuring third-party authentication without secondary authentication.
Development.
DKEY one-time password (hardware token, SMS password) devices are seamlessly compatible with Juniper, Array, Cisco, SonicWall, F5,
VPN such as BlueCoat, wireless access equipment, etc.
3. 2. 2 DKEY API secondary development interface
By providing the development interface for the application system, the application system integrates one-time password authentication, and can freely define the login interface, which requires the enterprise to have the secondary development authority for the business system. DKEY APIs interface type C/C++, JAVA,. NET, WebService 3.2.3 DKEY Agents integrated agent software.
By installing the corresponding DKEY agent on the server side of the application system, it can interoperate with the authentication server to achieve the goal of fast and seamless integration of one-time password protection. DKEY proxy name function for IIS integration DKEY Web proxy is based on Web application published on IIS (based on. Net development) dkey Web agent for Apache web server integration based on the web application published on Apatch (based on java and php development) dkey Windows Agents integration Windows XP/2003/Vista/7/2008 &; R2 boot authentication DKEY PAM Agent for Linux/UNIX Integration Linux/Saloris/AIX boot authentication DKEY TMS is the management part of DKEY strong authentication scheme, which is used to verify authentication requests and centrally manage enterprise network authentication policies. It can support multiple one-time password authorization codes at the same time, including hardware tokens and SMS passwords.
Technical features:
(1)DKEY TMS can easily interoperate with local or Internet applications, remote access, VPN, etc.
(2)DKEY TMS can be seamlessly integrated with more than 0/00 network devices around the world without installing any proxy software.
(3)DKEY TMS can be deployed across platforms, including virtual machines, such as VMWare, supporting clustering and load balancing functions, and seamlessly integrating with local LDAP, such as Active Directory, Web-based background management and highly available token management software, so that it can adapt to networks of any size.