Electronic Team uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our cookie policy. Click here to learn more.

Security token remote access - 2024 guide

Olga Weis Olga Weis Jan 20, 2022

The challenge of remote access to USB tokens

There’s one issue that most users will report when it comes to implementing USB security tokens. That problem has to do with experiencing the full functionality of a device in scenarios where a physical connection isn’t an option.

Specific troubles can arise when users attempt to share access to a remote USB token via a network connection. For organizations relying on token-based authentification being shared amongst multiple users (like a bank token, for example), a dedicated 3rd-party tool that allows users to copy a device onto a remote computer is required.

Access security tokens remotely

Donglify uses advanced port virtualization technology to allow you to access security token remotely. With this software you will be able to have a remote access token and use it simultaneously between several machines.
Start your free trial today
7-day Trial • Cancel anytime.
4.5 Rank based on 198+ users
Read all reviews
Available on Windows 7/8/10/11, Server 2008 R2/2012/2016/2019/2022, Windows 10/11 on ARM, macOS 10.14+
Already a Donglify user? Sign In →

How to remotely access a USB security key with Donglify:

Create a personal account at the Donglify website.
 install Donglify
Download the USB token sharing software on all computers that will be involved in sharing the dongle. This includes the machine that is physically attached to the security key (the server) as well as all PCs that will access it remotely.
 sign in to your account
When installation is complete, launch the app on the server and log in with your account credentials. You will be presented with a new window. Click “Plus” in the window to display the USB security keys that are available to be cloned.
 USB dongles available for sharing
Select the device you wish to share by checking its radio button and clicking “Share”.
 Select the required USB dongle
Start Donglify on a remote machine and use the same account credentials to log in.
 Start Donglify on a client computer
Locate the required USB dongle in the software’s interface and click “Connect”. This establishes the connection with the security key which will be recognized and visible on the remote machine.
Once Donglify has been used to access a security token remotely, multiple remote computers can access the virtual copies simultaneously. Just launch the software and click “Connect” on the client computers to share the security key over your network.

Here are several methods to share USB security tokens using a software solution: There are two different ways that Donglify can be used:

The tool can be used to access any type of USB security dongle from a single remote computer. A multiconnect option is available that enables you to share a USB token over the network with multiple machines at the same time*.

After communication with the shared USB token is established, the device will be accessible through Device Manager just like it was physically connected to the machine. Donglify employs advanced encryption techniques to protect data transferred across the network, giving you peace of mind that your communication is secure.


FlexiHub is another software with features similar to those of Donglify. You can use it as remote access token software, but the tool does not offer the ability to establish multiple connections with the same device.

access security key

Follow these easy steps to use FlexiHub:

  1. Open a FlexiHub account that enables you to enjoy a free trial with which you can connect to remote USB devices.
  2. Download and install FlexiHub on all of the computers that will share the dongle remotely.
  3. Start FlexiHub on a remote machine and sign in with the same account name and password.
  4. Locate the shared dongle using the software interface on the remote machine and establish a connection.

USB Network Gate

USB Network Gate enables you to access a security token with one remote machine at a time. A nice feature of the software is the ability to see which machine is currently connected to a USB device. This can be very useful if you have forgotten to disconnect the dongle from another computer.

access a remote USB token

Here’s how to easily access a remote USB token using USB Network Gate:

  1. Download the software and install it on the ‘Server’ computer (the machine, to which the token is physically attached) as well as on the ‘Client’ PC that needs to get remote access to the security token.

  2. Start the app on the Server, find the device in the software interface, and click ‘Share’ next to it.

  3. Launch USB Network Gate on the Client computer, find the token in the Remote devices tab and click “Connect”.

  4. Once done, you’ll see the remote USB token in the Device Manager of your computer as if it were connected locally. And, most importantly, you don’t need to worry about the security of data transferred with USB Network Gate. The software uses the advanced traffic encryption, which reliably protects all user data transported over the network.


The security token is a small electronic device designed for secure two-factor authentication of users, generation and storage of encryption keys, electronic signature keys, digital certificates, and other sensitive data.
Security tokens are used as intellectual key carriers and means of electronic signature in PKI systems, in systems of legally significant electronic document management and in other information systems based on electronic signature technologies. Security keys allow performing cryptographic operations in such a way that private information never leaves the device. Thus, the possibility of compromising the key is excluded and the overall security of the information system is increased.
USB security tokens protect computing resources via two-factor authentication. This type of security requires that two conditions are met when enacting communication. A physical USB dongle needs to be available and the user needs to know the PIN required to access it. Using this kind of authentication offers increased security over that provided by simple password authorization.

USB dongles are comprised of a microcontroller as well as protected memory that is used to store user data. The security key protects software assets by requiring the program to connect to the dongle to unlock its full functionality. Dongle manufacturers for the most part support basic information technology security standards, making the devices easy to implement and integrate with other systems.
Start your free trial today
7-day Trial • Cancel anytime.
Already a Donglify user? Sign In →