Skip to main content

Recently Updated Pages

My requests

Soffid 3 Reference guide Self service portal

Description Soffid provides a complete workflow engine that allows you to incorporate business p...

Connecting Radius client

Federation Connecting Service Providers

Introduction The Radius protocol (Remote Authentication Dial-In User Service) is a networking pr...

Connecting Tacacs+

Federation Connecting Service Providers

Introduction TACACS (Terminal Access Controller Access Control System) is a security protocol th...

Connecting CAS client

Federation Connecting Service Providers

Introduction The CAS protocol is a simple and powerful ticket-based protocol. It involves one or...

Openid-connect Dynamic Register

Federation Connecting Service Providers

Introduction Openid-connect allows a service provider registers dynamically other service provid...

Connecting your custom applications

Federation Connecting Service Providers

Introduction SAML 2.0 is a complex and not easy to implement standard. There are some libraries ...

Connecting Soffid console

Federation Connecting Service Providers

Introduction Soffid console has a built-in SAML client, so it can act as a service provider in t...

Connecting a SAML service

Federation Connecting Service Providers

Introduction To connect a SAML service provider, the service provider must offer you its SAML me...

Connecting an OpenID Connect service

Federation Connecting Service Providers

Introduction There are three basic OpenID flows, depending whether the service name must be auth...

Radius architecture

Federation Radius

Introduction Access Reject: The user is unconditionally denied access to all requested net...

Introduction to Identity Federation

Federation

What is Identity Federation? A federated identity in information technology is the means of link...

Step 2. Configure network discovery

PAM Implementation guide

The second step will be to configure the network with the proper parameter to allow you to run ...

Step 1. Create network

PAM Implementation guide

The first step of the PAM implementation will be to create the network we want to scan to disco...

Step 8.2. PAM Policies

PAM Implementation guide Step 8. Behavior analysis

Step-by-step 1. To create a new PAM Policy, you must access the PAM Rules page in the following...

Step 8.3. Assign PAM policy

PAM Implementation guide Step 8. Behavior analysis

Assign PAM policy 1. To assign the PAM policy to a Password Vault folder, you must access the P...

Step 7.2. Define XACML policy set to use a workflow

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To define policies, you must access the XACML Policy Management page in the foll...

Step 6.4. Enable Task

PAM Implementation guide Step 6. Passwords rotation

To rotate the password it will be necessary to enable the task Expire untrusted passwords. The...

Step 6.2. Create Password policy

PAM Implementation guide Step 6. Passwords rotation

How to define a new password policy for the previous user type created. Step-by-step 1. First...

Step 5.3. Publish on Password vault

PAM Implementation guide Step 5. Account management

When critical accounts are detected, the best way to keep them safe is to place them on the Pas...

Step 5.2. Change account type

PAM Implementation guide Step 5. Account management

The Change account type step shows how to change the type from unmanaged to shared or privilege...