Suitability to Task
Each authentication device provides a tradeoff between ease of use, administrative complexity and
level of security. The following graph visually represents where these devices fit in the administrative
complexity versus level of security spectrum.
Three factor (Biometric,
Token and PIN)
Hardware Token (Smartcard,
USB) with PKI
TPM
Hardware Token (Smartcard
USB) with Stored PIN
Two factor (Biometric and
Strong Password)
Strong Password
Biometric (Enterprise)
Biometrics (Local)
Weak Password
Simple
Complex
Administrative Complexity
8