Skip to main content

PAM Implementation guide

PAM Implementation guide

General instructions

Introduction The purpose of this document is to provide the instructions to implement PAM using ...

Step 1. Create network

The first step of the PAM implementation will be to create the network we want to scan to disco...

Step 2. Configure network discovery

The second step will be to configure the network with the proper parameter to allow you to run ...

Step 3. Launch network discovery

Step 4. Register additional resources (Optional)

Step 5. Account management

The account management step shows you how to manage the accounts to change the type, how to locat...

Step 6. Passwords rotation

The passwords rotation reduces the vulnerability to password-based attacks. Soffid allows you to ...

Step 7. Just in time privileges

Step 8. Behavior analysis