Recently Updated Pages
SCIM OTP devices examples
Operations This page shows the operations that can be performed for the OTP devices object. Lis...
1. Global functions
Global functions can be used in an action element: debug text: string Sends a ...
How to install Soffid Authenticator?
Installation Download & Install Depending on your device, you can download & install Soffid Aut...
Operation
Operation The Lucene index information is stored in files arranged in a folder structure. This f...
My Profile
Description My Profile is a part of a Soffid Self-service portal that allows to end-users config...
Network discovery
My requests
Description Soffid provides a complete workflow engine that allows you to incorporate business p...
Connecting Radius client
Introduction The Radius protocol (Remote Authentication Dial-In User Service) is a networking pr...
Connecting Tacacs+
Introduction TACACS (Terminal Access Controller Access Control System) is a security protocol th...
Connecting CAS client
Introduction The CAS protocol is a simple and powerful ticket-based protocol. It involves one or...
Openid-connect Dynamic Register
Introduction Openid-connect allows a service provider registers dynamically other service provid...
Connecting your custom applications
Introduction SAML 2.0 is a complex and not easy to implement standard. There are some libraries ...
Connecting Soffid console
Introduction Soffid console has a built-in SAML client, so it can act as a service provider in t...
Connecting a SAML service
Introduction To connect a SAML service provider, the service provider must offer you its SAML me...
Connecting an OpenID Connect service
Introduction There are three basic OpenID flows, depending whether the service name must be auth...
Radius architecture
Introduction Access Reject: The user is unconditionally denied access to all requested net...
Introduction to Identity Federation
What is Identity Federation? A federated identity in information technology is the means of link...
Step 2. Configure network discovery
The second step will be to configure the network with the proper parameter to allow you to run ...
Step 1. Create network
The first step of the PAM implementation will be to create the network we want to scan to disco...
Step 8.2. PAM Policies
Step-by-step 1. To create a new PAM Policy, you must access the PAM Rules page in the following...