Skip to main content

Recently Updated Pages

Deployment procedure

PAM Deployment

Introduction PAM is the process that determines who has access to what types of information as i...

Updated 1 year ago by pgarcia@soffid.com

RDP Gateway Connection

PAM Install & config RDP gateway

Introduction We can establish a connection to the target system using the RDP remote access prot...

Updated 1 year ago by pgarcia@soffid.com

RDP Gateway Installation

PAM Install & config RDP gateway

RDP gateway Soffid allows you to deploy a new docker container with the RDP gateway. The configu...

Updated 1 year ago by pgarcia@soffid.com

SSH Gateway Connection

PAM Install & config SSH gateway

Introduction We can establish a connection to the target system using the SSH remote access prot...

Updated 1 year ago by pgarcia@soffid.com

SSH Gateway Installation

PAM Install & config SSH gateway

Introduction Soffid allows you to deploy a new docker container with the ssh gateway. The config...

Updated 1 year ago by pgarcia@soffid.com

Configure PAM session servers

PAM Install & config

Definition Soffid provides the functionality that allows you to configure the Jump servers. That...

Updated 1 year ago by pgarcia@soffid.com

PAM Jump Server Upgrade

PAM Install & config

Upgrade  To upgrade PAM you will need to run two scripts, one for the store and the other for th...

Updated 1 year ago by pgarcia@soffid.com

PAM videos

PAM Getting started

How works on-screen Keyboard

Updated 1 year ago by pgarcia@soffid.com

Introduction

PAM Getting started

Why PAM? Privileged Account Management (from this point forward: PAM), allows you to manage acco...

Updated 1 year ago by pgarcia@soffid.com

Quick overview

PAM Getting started

Introduction Once the Jump servers have been installed, following the steps defined on the PAM J...

Updated 1 year ago by pgarcia@soffid.com

Step 8.1. PAM Rules

PAM Implementation guide Step 8. Behavior analysis

Step-by-step 1. To create a new PAM Rule, you must access the PAM Rules page in the following p...

Updated 1 year ago by pgarcia@soffid.com

Step 8. Behavior analysis

PAM Implementation guide Step 8. Behavior analysis

Introduction Using PAM you can configure policies and rules in the Soffid console to detect acti...

Updated 1 year ago by pgarcia@soffid.com

Step 7.3. Configure XACML PEP

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To configure the XACML PEP  You must access the "XACML PEP configuration" page i...

Updated 1 year ago by pgarcia@soffid.com

Step 7.1. Define an approval workflow

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To define and configure an approval workflow, you can use the Soffid BPM editor....

Updated 1 year ago by pgarcia@soffid.com

Step 7. Just in time privileges

PAM Implementation guide Step 7. Just in time privileges

Introduction Once the discovery process has been run, the critical accounts have been detected a...

Updated 1 year ago by pgarcia@soffid.com

General instructions

PAM Implementation guide

Introduction The purpose of this document is to provide the instructions to implement PAM using ...

Updated 1 year ago by pgarcia@soffid.com

💻System Monitoring

PAM Monitoring

Launcher Soffid allows you to check the status of the launcher by browsing an URL: Request htt...

Updated 1 year ago by pgarcia@soffid.com

Sessions

PAM Monitoring

Updated 1 year ago by pgarcia@soffid.com

Access logs

PAM Monitoring

Updated 1 year ago by pgarcia@soffid.com

Privileged accounts dashboard

PAM Monitoring

Description Soffid provides a monitoring functionality to consult all the information about the ...

Updated 1 year ago by pgarcia@soffid.com