References
Listed below is all the known content in the system that links to this item.
PAM Policies
PAM Deployment
Configuration
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that...
Network discovery
PAM Deployment
Configuration
Description The Network discovery tool will be in charge to scan the networks to find the hosts ...
Users
Soffid 3 Reference guide
Resources Management
Description The user is the core object of the system. In Soffid, a user means an identity (usua...