Visit Nexus to get an overview of Nexus' solutions, read customer cases, access the latest news, and more.

PKI software tokens (or soft tokens) can be used when you need a convenient method that is easy to rollout, but does not necessarily have the highest security level. Typical use cases include authentication at VPN access point and web services or for digital signature of emails and documents. 

Software tokens are often used in combination with other methods. For example, a smart card might be required for Windows logon, but the security level of a software token is enough for VPN access.  

Software tokens are delivered as PKCS#12 files or published in to Windows certificate store. A software token is used together with a password for authentication, signing and encryption.  


  • Two-factor authentication by using PKCS#12 file and password
  • Easy withdrawal by revoking certificates


  • Certificate is available on the device
  • Used for multiple use cases