Reaching Others University at Buffalo - The State University of New York
Skip to Content

Scenarios for Choosing Software or Hardware Token for Admin VPN

Use examples of real situations to help choose between a software and a hardware token.

Scenario 1: A Single Faculty/Staff on a Single UB-Owned Computer in a Single Location

If the faculty/staff member is working on a single UB-owned computer in a single work location, then a software token is most appropriate.

Scenario 2: A Single Faculty/Staff on Multiple UB-Owned Computers in Multiple Locations (one user only)

If the faculty/staff member is working on multiple computers in multiple locations but is the only faculty/staff member using those computers, then a software token is most appropriate. Note: The staff issuing the token need to be notified at the time that the token will be used on multiple computers.

Scenario 3: Multiple Faculty/Staff on a Single UB-Owned Computer in a Single Location

If multiple faculty/staff members are working on a single UB-owned computer in a single work location, then multiple software tokens are required.

Scenario 4: A Single Faculty/Staff on Multiple UB-Owned Computers in Multiple Locations

If the faculty/staff member is working on multiple UB-owned computers in multiple locations, then a hardware token is preferable.

Scenario 5: Faculty/Staff on a Non-UB-Owned Computer

If the faculty/staff member is working on a non-UB-owned computer, then a hardware token is required.

Did This Page Answer Your Question?

(Required)
 
Email, UBITName or phone number
(Required)
Enter the letters or numbers you see below in the space provided. Click "Get a new challenge" if they are not readable.