To access resources protected by the RSA SecurID system, users simply combine their secret Personal Identification Numbers (PIN’s) (something they alone know) with the token codes generated by their authenticators (something they have). The result is a unique, one-time-use passcode that is used to positively identify, or authenticate, the user. If the code is validated by the RSA SecurID system, the user is granted access to the protected resource. If it is not recognized, the user is denied access.
With RSA SecurID hardware authenticators, no interaction with the user desktop is required—that is, you don't have to install or maintain any software. Equally important, you are not required to program tokens. They are ready to use out of the box. In addition, RSA SecurID hardware authenticators are manufactured and sealed with an integral lifetime battery. No user maintenance or battery replacement is required. As a result, this authentication solution is as easy to deploy and administer as it is to use.