FAQ
Default solution folder, feel free to edit or delete it.
1. You open the website for Soft-Token creation, or an admin prepares to manually assign a token. 2. Then, the user who already has the token application ...
Mon, 14 Dec, 2020 at 4:54 AM
The link during the download of the seed file is highly secure. The site
for provisioning is internal, and the seed file is encrypted before it
is sent ...
Tue, 4 Nov, 2014 at 10:07 AM
If a phone or notebook is lost, the administrator can deactivate the
token easily, and assign a temporary token to that user. The seed file
will not be ...
Tue, 4 Nov, 2014 at 10:08 AM
Mi-Token works with any VPN, and is supported by all smartphone
platforms, as well as phones with Java . Because we are highly
customizable, we have bee...
Tue, 4 Nov, 2014 at 10:08 AM
Please refer to the attachment.
Tue, 4 Nov, 2014 at 10:10 AM
The size of Mi-Token Installation package version (4.3.8.8_Build 7796) is roughly 100MB zipped.
Fri, 8 Jan, 2016 at 7:11 AM
You can use PAM-RADIUS to authenticate against Mi-Token with almost every kind of UNIX (or UNIX-like operating system) in common use.
Tue, 4 Nov, 2014 at 10:14 AM
Question: Mi-Token has its own ADAM/LDS as a directory instance to
store all token related information. Does Mi-Token allow to use the
existing enterpri...
Tue, 4 Nov, 2014 at 10:15 AM
Question: Can Mi-Token be installed on shared servers with other
applications? What should be considered when using Mi-Token on shared
servers?
...
Tue, 4 Nov, 2014 at 10:16 AM
Question: Does Mi-Token work on both VM and traditional standalone server hardware?
Answer: Yes.
Question: Is there a document to size the ser...
Tue, 4 Nov, 2014 at 10:16 AM