ENABLING HARD and SOFT TOKENS - Secure Authentication

ENABLING HARD and SOFT TOKENS - Secure Authentication

ENABLING HARD AND SOFT TOKENS - Secure Authentication Tokens are required when accessing the Cash Manger Tab. The Cash Management services include: ACH, Wires, Bill Pay and RDC. Hard Tokens: A hard token, sometimes called an "authentication token," is a hardware security device that is used to authorize a user. We still offer the option for a hard token if you prefer. For our existing Cash Management customers: Please be advised that your current hard tokens will no longer work in the new system. We will be happy to disperse updated versions of hard tokens, or walk you through the steps to initiate the soft token. Soft Tokens: A soft token is a software version of a hard token, which is a security device used to give authorized users access to secure sites or computer systems. We now offer this software through an application called VIP Access. It is easy to download through your application store on your mobile device, or on your PC. Just follow these simple steps to receive your soft token: 1. Download the VIP Access application 2. Choose your device (mobile: IOS or Android / PC: Mac or Windows) 3. Click on Run At that point you will receive a Credential ID starting with SYMC followed by 8 numbers. When prompted in our Online Banking system, input your new Credential ID and token code (Note: The token security codes are good for 30 seconds and then a new one will generate.) Once you’ve registered your token in the Online Banking System with the Credential ID, you will only be prompted for your security token code whenever you log into the Cash Manager system. .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us