A method and a system for access authentication. A shared services
resource includes a second factor authentication module. At least one
network resource each include a first factor authentication module. A
trusted computing base communicates with the shared services and the at
least one network resource through a pipe. An assertion may be obtained
on a trusted computing base for accessing at least one network resource.
At least one of the at least one network resource may be accessed with
the trusted computing base when the assertion has been obtained by the
trusted computing base and is valid.