I have just started looking into token based authentication. I wasn't familiar with Entrust IdentityGuard previous to Brian's mention of it. Does anyone have any experience/wisdom to impart on me? Things to look for, traps to avoid and so forth Thanks! Mary Lynn -- Mary Lynn Kirby UNIX/Networking Sys Admin Blue Sky Studios