ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual

The request-response architecture is capable of self-service initialization by end-users, dramatically reducing implementation and maintenance costs. Here is an example of how WiKID works.

1.The user launches the WiKID token software, enter the PIN that has been given to them (something they know) and then press “continue” to receive the OTP from the WiKID authentication server:

Figure D-1

2.A one-time passcode (something they have) is generated for this user.

Figure D-2

Two Factor Authentication

D-3

v1.0, September 2009

Page 461
Image 461
NETGEAR UTM25EW-100NAS, UTM25-100NAS, UTM10EW-100NAS manual Figure D-1