{"id":2064,"date":"2021-11-01T15:58:51","date_gmt":"2021-11-01T22:58:51","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2064"},"modified":"2023-11-07T16:31:02","modified_gmt":"2023-11-07T21:31:02","slug":"managing-tokens-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","title":{"rendered":"Verwaltung von Hardware-Authentifizierungs-Tokens in der Cloud"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>So einfach Soft-Tokens auch zu verwenden sind, manchmal sind Hardware-Tokens f\u00fcr sicherheitssensible Organisationen der beste Weg, um Benutzer zu authentifizieren. Erfahren Sie, welche Faktoren Unternehmen bei der Entscheidung zwischen Hardware und Software ber\u00fccksichtigen sollten und wie Administratoren SecurID-Hardtokens \u00fcber die Cloud konfigurieren, zuweisen und verwalten k\u00f6nnen.<\/p>","protected":false},"author":2,"featured_media":2065,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-2064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing Hardware Authentication Tokens in the Cloud - RSA<\/title>\n<meta name=\"description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta property=\"og:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-01T22:58:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:31:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta name=\"twitter:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Managing Hardware Authentication Tokens in the Cloud\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"articleSection\":[\"Products and Solutions\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"name\":\"Managing Hardware Authentication Tokens in the Cloud - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"description\":\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Hardware Authentication Tokens in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Verwaltung von Hardware-Authentifizierungstoken in der Cloud - RSA","description":"So einfach Soft-Tokens auch zu verwenden sind, manchmal sind Hardware-Tokens f\u00fcr sicherheitssensible Organisationen der beste Weg, um Benutzer zu authentifizieren. Erfahren Sie, welche Faktoren Unternehmen bei der Entscheidung zwischen Hardware und Software ber\u00fccksichtigen sollten und wie Administratoren SecurID-Hardtokens \u00fcber die Cloud konfigurieren, zuweisen und verwalten k\u00f6nnen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_locale":"de_DE","og_type":"article","og_title":"Managing Hardware Authentication Tokens in the Cloud","og_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","og_url":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_site_name":"RSA","article_published_time":"2021-11-01T22:58:51+00:00","article_modified_time":"2023-11-07T21:31:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Managing Hardware Authentication Tokens in the Cloud","twitter_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Managing Hardware Authentication Tokens in the Cloud","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","articleSection":["Products and Solutions"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","url":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","name":"Verwaltung von Hardware-Authentifizierungstoken in der Cloud - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","description":"So einfach Soft-Tokens auch zu verwenden sind, manchmal sind Hardware-Tokens f\u00fcr sicherheitssensible Organisationen der beste Weg, um Benutzer zu authentifizieren. Erfahren Sie, welche Faktoren Unternehmen bei der Entscheidung zwischen Hardware und Software ber\u00fccksichtigen sollten und wie Administratoren SecurID-Hardtokens \u00fcber die Cloud konfigurieren, zuweisen und verwalten k\u00f6nnen.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Managing Hardware Authentication Tokens in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"L\u00f6sungen f\u00fcr Cybersecurity und digitales Risikomanagement","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":3,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":27155,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2064\/revisions\/27155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media\/2065"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}