Policy Enforcement Point (PEP)
Description
The PEP, Policy enforcement point, is a component of policy-based management, where enforce the policies. It is the component that serves as the gatekeeper to access a digital resource. The PEP gives the PDP, Policy Decision Point, the job of deciding whether or not to authorize the user based on the description of the user's attributes.
XACML PEP configuration
Soffid allows you to configure different policies enforcement points, each of then can use a different policy set.
- Web Policy Enforcement Point
- Role centric Policy Enforcement Point
- Dynamic role Policy Enforcement Point
- External Policy Enforcement Point ( https://iam-sync-lab.soffidnetlab:1760//XACML/pep )
- Password vault Policy Enforcement Point ( https://iam-sync-lab.soffidnetlab:1760//XACML/vault )
Screen
Custom attributes
Custom attributes for each PEP:
- Enable XACML Policy Enforcement Point: select the Yes option to enable the PEP.
- Policy Set Id: policy set identifier.
- Policy Set Version: version of the policy set to enforce.
- Trace requests: select the Yes option to enable the trace.
Policies enforcement points
Web Policy Enforcement Point
The policy will be enforced when the user open a new Soffid page.
Subjects
Resources
Actions
Environments
Role centric Policy Enforcement Point
The policy will be enforced when the user login into Soffid. It will calculate the user authorizations as of the permissions that the user has assigned.
Subjects
Resources
Actions
Environments
Dynamic role Policy Enforcement Point
The policy will be enforced when the user performs an action to evaluate if the user has or not authorization.
You can use that PEP to split the permissions, for instance, a support group can update the permission of a specific group of user, and another support group can update the permissions of another group of users.
Subjects
Resources
Actions
Environments
Actions
Resources
Environments
- soffid object
- method
External Policy Enforcement Point ( https://iam-sync-lab.soffidnetlab:1760//XACML/pep )
PEP of general purpose. Calling the web service, the clients can made validations.
Subjects
Resources
Actions
Environments
Attributes
token
method
resource
Password vault Policy Enforcement Point ( https://iam-sync-lab.soffidnetlab:1760//XACML/vault )
The policy will be enforced when the password vault is used.
Subjects
Actions
method
Resources
- token
- account
- system
- folder
Actions
- GET
- POST
Resources
Environments
Operations
getpost
Attributes
token
accoi