About security tokens. How to access security keys remotely


Contents:

  1. The challenge of remote access to USB tokens
  2. Access security tokens remotely
  3. Types of security tokens
  4. FAQ

The challenge of remote access
to USB tokens


Probably the most common problem you may face working with USB security keys is the inability to forward them to a virtual environment. By default, most virtual machines do not provide access to the functionality and contents of devices attached to the host machine. So, you’ll need to find a way to duplicate your device to share it between your guests and host OSes.

Certain difficulties may also appear if you try to provide access to the same USB token for multiple users over the network. If there’s token based authentication in your company and you need to share, let’s say, a bank token among several team members, you’re most likely to need a dedicated third-party tool to help you copy the device to remote computers.

Access security tokens remotely


Here are several methods to share USB security tokens using a software solution.

Donglify


Donglify uses advanced port virtualization technology to allow you to share a security key. By virtually emulating the USB security token, the tool lets you share it with any network-attached computer.

There are two different ways that Donglify can be used.

  • The tool can be used to access any type of USB security key from a single remote computer.
  • A multiconnect option is available that enables you to share a USB token over the network with multiple machines at the same time. Currently this feature can be used with SafeNet eToken 5110, HASP HL Pro, CodeMeter CmStick, Sentinel HL Pro, and Sentinel UltraPro dongles.

Use this simple procedure to remotely access a USB security key with Donglify.

Share secyrity token
Try Donglify now
30-day free trial
  1. Create a personal account at the Donglify website.

  2. Download the USB token sharing software on all computers that will be involved in sharing the dongle. This includes the machine that is physically attached to the security key (the server) as well as all PCs that will access it remotely.

  3. When installation is complete, launch the app on the server and log in with your account credentials. You will be presented with a new window. Click “Plus” in the window to display the USB security keys that are available to be cloned.

  4. Select the device you wish to share by checking its radio button and clicking “Share”.

  5. Start Donglify on a remote machine and use the same account credentials to log in.

  6. Locate the required USB dongle in the software’s interface and click “Connect”. This establishes the connection with the security key which will be recognized and visible on the remote machine.

Once Donglify has been used to share a security token, multiple remote computers can access the virtual copies simultaneously. Just launch the software and click “Connect” on the client computers to share the security key over your network.

After communication with the shared USB token is established, the device will be accessible through Device Manager just like it was physically connected to the machine. Donglify employs advanced encryption techniques to protect data transferred across the network, giving you peace of mind that your communication is secure.

Flexihub


Flexihub is another software with features similar to those of Donglify. You can use it to share a security key remotely, but the tool does not offer the ability to establish multiple connections with the same device.

Access security key
Try Flexihub now
7-day free trial

Follow these easy steps to use FlexiHub:

  1. Open a FlexiHub account that enables you to enjoy a free trial with which you can connect to remote USB devices.

  2. Download and install FlexiHub on all of the computers that will share the dongle remotely.

  3. Start FlexiHub on a remote machine and sign in with the same account name and password.

  4. Locate the shared dongle using the software interface on the remote machine and establish a connection.

USB Network Gate


USB Network Gate enables you to share a security token with one remote machine at a time. A nice feature of the software is the ability to see which machine is currently connected to a USB device. This can be very useful if you have forgotten to disconnect the dongle from another computer.

access a remote USB token
Try USB Network Gate now
14-day free trial

Here’s how to easily access a remote USB token using USB Network Gate:

  1. Download the software and install it on the ‘Server’ computer (the machine, to which the token is physically attached) as well as on the ‘Client’ PC that needs to get remote access to the security token.

  2. Start the app on the Server, find the device in the software interface, and click ‘Share’ next to it.

  3. Launch USB Network Gate on the Client computer, find the token in the Remote devices tab and click “Connect”.

Once done, you’ll see the remote USB token in the Device Manager of your computer as if it were connected locally. And, most importantly, you don’t need to worry about the security of data transferred with USB Network Gate. The software uses the advanced traffic encryption, which reliably protects all user data transported over the network.

Types of security tokens


The main functionality of all security tokens is basically the same. Every token provides some kind of authentication code that allows users to access a particular service like an online bank account, etc. However, security keys may differ in the means they use for generating those authentication codes.

Static password tokens

The simplest type of security tokens is static password tokens which store the secret code inside the device and release it any time the user asks for it. It seems clear that you won’t get a high level of security with the keys of this sort.

Time-synchronized tokens

As their name indicates, time-synchronized tokens generate a password based on the time. The timer they contain is synchronized with another timer, working on the authentication server-side. This allows changing passwords generated by the tokens at a set time interval, for example, every 3 minutes.

Asynchronous tokens

The mission of asynchronous tokens is to generate passwords that are unpredictable to guess, even if all the previously generated passwords are known. Those passwords change every time they are generated.

FAQ

The security token is a small electronic device designed for secure two-factor authentication of users, generation and storage of encryption keys, electronic signature keys, digital certificates, and other sensitive data.
Security tokens are used as intellectual key carriers and means of electronic signature in PKI systems, in systems of legally significant electronic document management and in other information systems based on electronic signature technologies. Security keys allow performing cryptographic operations in such a way that private information never leaves the device. Thus, the possibility of compromising the key is excluded and the overall security of the information system is increased.
USB security tokens protect computing resources via two-factor authentication. This type of security requires that two conditions are met when enacting communication. A physical USB dongle needs to be available and the user needs to know the PIN required to access it. Using this kind of authentication offers increased security over that provided by simple password authorization.

USB dongles are comprised of a microcontroller as well as protected memory that is used to store user data. The security key protects software assets by requiring the program to connect to the dongle to unlock its full functionality. Dongle manufacturers for the most part support basic information technology security standards, making the devices easy to implement and integrate with other systems.

USB Network Gate

Requirements for Windows (32-bit and 64-bit): XP/Vista/7/8/10, Windows Server 2003/2008/2012/2016/2019
Also available on macOS, Linux OS and Android , 6.08MB size
Version 8.2.2087 (9th Jan, 2020) Release notes
Category: Network Software