When using two-factor authentication, each user is provided with a small, easy-to-use, single-button device for remote use.
These devices support strong authentication with one-time passwords, calculated from algorithms which are time and/or event-based.