Recently Updated Pages
Connecting your custom applications
Introduction SAML 2.0 is a complex and not easy to implement standard. There are some libraries ...
Connecting Soffid console
Introduction Soffid console has a built-in SAML client, so it can act as a service provider in t...
Connecting a SAML service
Introduction To connect a SAML service provider, the service provider must offer you its SAML me...
Connecting an OpenID Connect service
Introduction There are three basic OpenID flows, depending whether the service name must be auth...
Radius architecture
Introduction Access Reject: The user is unconditionally denied access to all requested net...
Introduction to Identity Federation
What is Identity Federation? A federated identity in information technology is the means of link...
Step 2. Configure network discovery
The second step will be to configure the network with the proper parameter to allow you to run ...
Step 1. Create network
The first step of the PAM implementation will be to create the network we want to scan to disco...
Step 8.2. PAM Policies
Step-by-step 1. To create a new PAM Policy, you must access the PAM Rules page in the following...
Step 8.3. Assign PAM policy
Assign PAM policy 1. To assign the PAM policy to a Password Vault folder, you must access the P...
Step 7.2. Define XACML policy set to use a workflow
Step-by-step 1. To define policies, you must access the XACML Policy Management page in the foll...
Step 6.4. Enable Task
To rotate the password it will be necessary to enable the task Expire untrusted passwords. The...
Step 6.2. Create Password policy
How to define a new password policy for the previous user type created. Step-by-step 1. First...
Step 5.3. Publish on Password vault
When critical accounts are detected, the best way to keep them safe is to place them on the Pas...
Step 5.2. Change account type
The Change account type step shows how to change the type from unmanaged to shared or privilege...
Step 6.3. Assign password policy
You must assign a proper password policy to the critical accounts to keep them safe. Step-by-s...
Step 6.1. Create User type
How to create a new User type. That will be mandatory to create a new Password policy. Step-b...
Step 5.4. Assign the password
To be able to use an account, it is necessary to assign a password, this can be the current pas...
Step 5.1. Account management
The account management step shows you how to manage the accounts to change the type, how to lo...
Step 4.3. Reconcile (Optional)
To request the accounts you must launch the reconciliation process. The main purpose of reconci...