{"id":2064,"date":"2021-11-01T15:58:51","date_gmt":"2021-11-01T22:58:51","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2064"},"modified":"2023-11-07T16:31:02","modified_gmt":"2023-11-07T21:31:02","slug":"managing-tokens-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/es\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","title":{"rendered":"Gesti\u00f3n de tokens de autenticaci\u00f3n de hardware en la nube"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Aunque los tokens de software son f\u00e1ciles de usar, a veces los tokens de hardware son la mejor forma de autenticar a los usuarios para las organizaciones sensibles a la seguridad. Descubra qu\u00e9 factores deben tener en cuenta las empresas a la hora de decidir entre hardware y software y las formas en que los administradores pueden configurar, asignar y gestionar los tokens f\u00edsicos de SecurID desde la nube.<\/p>","protected":false},"author":2,"featured_media":2065,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-2064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing Hardware Authentication Tokens in the Cloud - RSA<\/title>\n<meta name=\"description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/es\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta property=\"og:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/es\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-01T22:58:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:31:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta name=\"twitter:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Managing Hardware Authentication Tokens in the Cloud\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"articleSection\":[\"Products and Solutions\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"name\":\"Managing Hardware Authentication Tokens in the Cloud - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"description\":\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Hardware Authentication Tokens in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gesti\u00f3n de tokens de autenticaci\u00f3n de hardware en la nube - RSA","description":"Aunque los tokens de software son f\u00e1ciles de usar, a veces los tokens de hardware son la mejor forma de autenticar a los usuarios para las organizaciones sensibles a la seguridad. Descubra qu\u00e9 factores deben tener en cuenta las empresas a la hora de decidir entre hardware y software y las formas en que los administradores pueden configurar, asignar y gestionar los tokens f\u00edsicos de SecurID desde la nube.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/es\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_locale":"es_ES","og_type":"article","og_title":"Managing Hardware Authentication Tokens in the Cloud","og_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","og_url":"https:\/\/www.rsa.com\/es\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_site_name":"RSA","article_published_time":"2021-11-01T22:58:51+00:00","article_modified_time":"2023-11-07T21:31:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Managing Hardware Authentication Tokens in the Cloud","twitter_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Managing Hardware Authentication Tokens in the Cloud","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","articleSection":["Products and Solutions"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","url":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","name":"Gesti\u00f3n de tokens de autenticaci\u00f3n de hardware en la nube - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","description":"Aunque los tokens de software son f\u00e1ciles de usar, a veces los tokens de hardware son la mejor forma de autenticar a los usuarios para las organizaciones sensibles a la seguridad. Descubra qu\u00e9 factores deben tener en cuenta las empresas a la hora de decidir entre hardware y software y las formas en que los administradores pueden configurar, asignar y gestionar los tokens f\u00edsicos de SecurID desde la nube.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Managing Hardware Authentication Tokens in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Soluciones de ciberseguridad y gesti\u00f3n de riesgos digitales","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":3,"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":27155,"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/posts\/2064\/revisions\/27155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/media\/2065"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/es\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}