Skip to main content

PAM Implementation guide

PAM Implementation guide

General instructions

Introduction The purpose of this document is to provide the instructions to implement PAM using ...

Step 1. Create network

The first step of the PAM implementation will be to create a the network we want to scan to dis...

Step 2. Configure network discovery

The second step will be to configure the network with the proper parameter to allow you to run ...

Step 3. Launch network discovery

Then, the third step will be to launch the network discovery process. That is the process in ch...

Step 4. Register additional resources (Optional)

Step 5. Account management

The account management step shows you how to manage the accounts to change the type, how to locat...

Step 6. Passwords rotation

The passwords rotation reduces the vulnerability to password-based attacks. Soffid allows you to ...

Step 7. Just in time privileges

Step 8. Behavior analysis