Access Tokens: Importance, Distinction from Hardware Tokens, and Authentication Types

  Describe an access token and why are they important? How is it different from a hardware token? Explain what types of authentications are used for either type of token.