How security tokens work

how security tokens work