Skip to main content

PAM Implementation guide

PAM Implementation guide

General instructions

Introduction The purpose of this document is to provide the instructions to implement PAM using ...

Step 1. Create network

  The first step of the PAM implementation will be to create a the network we want to scan to di...

Step 2. Configure network discovery

  The second step will be to configure the network with the proper parameter to allow you to run...

Step 3. Launch network discovery

  Then, the third step will be to launch the network discovery process. That is the process in c...

Step 4. Register additional resources (Optional)

Step 5. Account management

The account management step shows you how to manage the accounts to change the type, how to locat...

Step 6. Passwords rotation

The passwords rotation reduces the vulnerability to password-based attacks. Soffid allows you to ...

Step 7. Just in time privileges

Step 8. Behavior analysis