Reaching Others University at Buffalo - The State University of New York
Skip to Content

Scenarios for Choosing Software or Hardware Token for Admin VPN

Use examples of real situations to help choose between a software and a hardware token.

Scenario 1: A Single Faculty/Staff on a Single UB-Owned Computer in a Single Location

If the faculty/staff member is working on a single UB-owned computer in a single work location, then a software token is most appropriate.

Scenario 2: A Single Faculty/Staff on Multiple UB-Owned Computers in Multiple Locations (one user only)

If the faculty/staff member is working on multiple computers in multiple locations but is the only faculty/staff member using those computers, then a software token is most appropriate. Note: The staff issuing the token need to be notified at the time that the token will be used on multiple computers.

Scenario 3: Multiple Faculty/Staff on a Single UB-Owned Computer in a Single Location

If multiple faculty/staff members are working on a single UB-owned computer in a single work location, then multiple software tokens are required.

Scenario 4: A Single Faculty/Staff on Multiple UB-Owned Computers in Multiple Locations

If the faculty/staff member is working on multiple UB-owned computers in multiple locations, then a hardware token is preferable.

Scenario 5: Faculty/Staff on a Non-UB-Owned Computer

If the faculty/staff member is working on a non-UB-owned computer, then a hardware token is required.

Did This Page Answer Your Question?

(Required)
 
Email, UBITName or phone number
(Required)
Enter both words below, separated by a space. If either word appears unclear, click 'Get a new challenge' to receive two new words.