Activate a Token

Before you can authenticate with AuthPoint, you must activate your token. A token is something that contains information that is used to identify you and associate you with a device.

You can use two types of tokens to authenticate with AuthPoint:

  • Software tokens
  • Hardware tokens

When you activate a token, AuthPoint sends you an email message to let you know that a token was activated for your user account. If you receive this email message and you did not activate a token, notify your AuthPoint administrator.

Activate a Software Token

You activate a software token on a device that is used for authentication, such as a mobile phone. This device is then used to gain access to protected resources that require multi-factor authentication.

The AuthPoint app must be installed on your mobile device before you activate a mobile token.

There are two ways to activate a token on your mobile device. You can use the link in the Activation email that is sent to you or you can log in to the IdP portal and activate your token from there. You might choose to activate your token from the IdP portal if you do not receive the Activation email or if MFA is required for your email account.

The activation email is valid for seven days. After that, you cannot use the activation link and QR code in the email for activation. To activate your token, you must ask your AuthPoint administrator to resend the token activation email or activate your token from the IdP portal. The activation link in the IdP portal does not expire.

Tokens are specific to the device they are activated on. If you want to use multiple devices for authentication, you must activate a separate token on each device you plan to use.

Activate a Hardware Token

A hardware token is a physical device with a built-in token that you activate. If your AuthPoint administrator does not activate your hardware token for you, you can log in to the IdP portal and activate your token from there.

See Also

About the AuthPoint Mobile App

About Authentication

Migrate Your Token

Authentication Without Your Mobile Device

Third-Party Software Tokens

Token Management