A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides
Authorization

5 Examples of a Token

 , updated on
A token is an object that represents a right or entitlement. They are often used to secure digital resources. The following are illustrative examples of a token.

Casino Token

Chips that are used in lieu of currency at casinos. They are usually unique to each casino and have security features such as markings and electronic tags. Casino tokens are designed and produced with unique color, art, look and feel, weighting and materials that are based on closely held trade secrets.

Railway Token

A physical object such as a staff, tablet or key was historically used by railways in Britain and elsewhere as an authorization for a train to use a section of track for single track railways. This made collisions impossible as long as procedures were followed. As early as the 1920s, electronic tokens began to replace physical railway tokens.

Security Token

Tokens are a fundamental building block of information security. In this context, they are often generated by cryptographic hash functions and exchanged by secure processes that use encryption. Security tokens may be designed to change on a regular basis. For example, a smart card may generate new tokens every few seconds or minutes.

Session Token

A common type of security token that is used to prove you own a session on a website or software service. This allows users to prove who they are with each request without having to reenter a password repeatedly.

Access Token

Tokens in one form or another are often used in authorization processes to validate that a request for resources is permitted by a security policy. When this occurs on a system to system basis, the token is often called an access token. For example, an access token may be required for a system to call an API.
Overview: Tokens
Type
Definition
An digital or physical object that represents a right or entitlement.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Authentication vs Authorization

A few examples of the difference between authentication and authorization.

Organizational Unit

An overview of organizational units (OUs).

Root Access

A complete guide to root access.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map