Recently Updated Pages
ESSO Installation Linux
Introduction Here you can find the details about the ESSO installation. Installation sudo dpkg...
Account reservation
Description The Account Reservation Process type is used to configure the use of privileges acco...
Permission request
Description The Permission Request Process type is used to define business processes to request ...
Delegation Roles
Description The Delegation Roles Process type is used to allow the users to delegate temporary t...
Target
Description Defines to which access requests a policy or rule applies. In XACML all the attribut...
Policy set
Description A PolicySet is a container that can hold other Policies or PolicySets, as well as ...
Policy
Description A Policy represents a single access control policy, expressed through a set of Rul...
Introduction to XACML
What is XACML? XACML "eXtensible Access Control Markup Language" is an open standard XML based l...
Expressions
Description The Expression signifies that an element that extends the ExpressionType and is a ...
Rules
Description A rule is the most elementary unit of policy. It may exist in isolation only withi...
XACML Rule combining algorithm
Definition The rule-combining algorithm defines a procedure for arriving at an authorization d...
Policy Decision Point (PDP)
Definition The PDP, Policy Decision Point, is in charge of evaluating the defined rules. The Pol...
Policy Enforcement Point (PEP)
Description The PEP, Policy enforcement point, is a component of policy-based management, where...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Docke...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Kuber...
Step 6.5. Password Rotation using Windows Connector
Password Rotation using Windows Connector When you are configuring password rotation using WIndo...
Windows Connector
Introduction Description This connector implements the LDAPS protocol and it is used to connect...
Authentication
Definition Soffid could use different kinds of external authentication sources. These mechanisms...
Create adaptive authentication rules
Description Adaptive authentication rules are a set of security policies and mechanisms that adj...
Create MFA policies
Description This wizard will help you to configure multi-factor authentication in order to expan...