Skip to main content

Recently Updated Pages

SCIM CustomObject examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the CustomObjects object Li...

Updated 1 year ago by pgarcia@soffid.com

SCIM ProcessInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the ProcessInstances object....

Updated 1 year ago by pgarcia@soffid.com

SCIM TaskInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the TaskInstances object. L...

Updated 1 year ago by pgarcia@soffid.com

Operation

SCIM Textual Index

Updated 1 year ago by pgarcia@soffid.com

Textual Index

SCIM Textual Index

Updated 1 year ago by pgarcia@soffid.com

How to add to ESSO a second factor of authentication?

ESSO

Introduction Soffid allows you to add a second factor of authentication by configuring a paramet...

Updated 1 year ago by pgarcia@soffid.com

Add applications

Configuration wizard IGA

Description The wizard allows you to add Applications or Information Systems to Soffid as well. ...

Updated 1 year ago by pgarcia@soffid.com

Create identities (manually, CSV file or authoritative source)

Configuration wizard IGA

Description You need to register the identities to manage and protect them. This wizard allows y...

Updated 1 year ago by pgarcia@soffid.com

Cross-Origin Resource Sharing (CORS)

SCIM

By default, for security reasons, the SCIM interface is published for any server application, but...

Updated 1 year ago by Gabriel Buades

Introduction to Role mining

What is Role mining? Role mining is a process of analyzing user permissions and activities withi...

Updated 1 year ago by pgarcia@soffid.com

Role mining

Soffid 3 Reference guide Tools

Updated 1 year ago by pgarcia@soffid.com

How to install Role mining in Soffid

Installation Download Please download the Soffid Role mining add-on. You could download it at ...

Updated 1 year ago by pgarcia@soffid.com

SAML Example

Federation SAML

Service Provider

Updated 1 year ago by pgarcia@soffid.com

Radius Example

Federation Radius

Service Provider

Updated 1 year ago by pgarcia@soffid.com

SCIM Federation Members examples

SCIM SCIM for Federation

Operations This page shows the functions that can be performed for the Federation Member object....

Updated 1 year ago by pgarcia@soffid.com

Radius (Remote Authentication Dial-In User Service)

Federation Radius

Introduction The Radius protocol (Remote Authentication Dial-In User Service) is a networking ...

Updated 1 year ago by pgarcia@soffid.com

SCIM Connector

Connectors SCIM Connector

Introduction Description SCIM connector can manage every target system with a published API tha...

Updated 1 year ago by pgarcia@soffid.com

How web single sign-on works

Web Single Sign-on for legacy apps

Web Single Sign On acts introducing credentials to the underlying web application on behalf of th...

Updated 1 year ago by pgarcia@soffid.com

⏰ Getting Started

SCIM SCIM for Federation

Introduction Soffid allows you to combine two of the most powerful addons you can use into Soffi...

Updated 1 year ago by pgarcia@soffid.com

⏰ Getting Started

SCIM SCIM for OTP devices

Introduction Soffid allows you to combine two of the most powerful addons you can use into Soffi...

Updated 1 year ago by pgarcia@soffid.com