MAC Address Authentication
- Sydney Matinga
- Dec 12, 2025
- 1 min read
Updated: 3 days ago
Terms of Reference
Refer to the post, Terms of Use Agreement Xerqon Technologies, WIX Blog 2025, for early, legal due diligence.
MAC Address Device Protection

MAC address protection is the future of IT Security. VPN - both thick client software, and hardware - would do well to be almost password free except for the device MAC address. General security software as an exclusively thick client will bolster network intrusion prevention. Hardware would synchronise with a computer hardware authentication API.
MAC addresses are embedded in a IP addresses, found in full format Microsoft Terminal Services, with other values. They include: local machine (MAC), remote machine (MAC), date-timestamp, and more.
Those three components alone represent great opportunity for protecting data at the local, device level only. A login and password may be leaked and known to another party (telnet).
The security application would see the local device inclusion in the login (first password) as part of a database, composite key (foreign key), directly from the device database. The password would be in the form “PK (MAC), FK (One Time Password)”. The traditional, first factor password would only be the Primary Key, data entry component.
In the new example both components presented together in one instance are both 1st and 2nd factor. This works best if the 2st factor shares runtime as a software token on a second device. For optimum security, the database MAC should randomly vary in value periodically.
© Xerqon ABN 97661410108 2025
Comments