Skip to main content

Recently Updated Pages

SCIM GroupUser examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the object that establishes ...

SCIM Host examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the host object. List all ...

SCIM MailDomain examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the MailDomain object. List...

SCIM MailList examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the MailList object. List a...

SCIM Network examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the Network object. List al...

SCIM DomainValue examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the DomainValue object. The ...

SCIM VaultFolder examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the VaultFolder object List...

SCIM System examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the Systems object (Agents)....

SCIM CustomObject examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the CustomObjects object Li...

SCIM ProcessInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the ProcessInstances object....

SCIM TaskInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the TaskInstances object. L...

Operation

SCIM Textual Index

Textual Index

SCIM Textual Index

How to add to ESSO a second factor of authentication?

ESSO

Introduction Soffid allows you to add a second factor of authentication by configuring a paramet...

Add applications

Configuration wizard IGA

Description The wizard allows you to add Applications or Information Systems to Soffid as well. ...

Create identities (manually, CSV file or authoritative source)

Configuration wizard IGA

Description You need to register the identities to manage and protect them. This wizard allows y...

Cross-Origin Resource Sharing (CORS)

SCIM

By default, for security reasons, the SCIM interface is published for any server application, but...

Updated 2 years ago by Gabriel Buades

Introduction to Role mining

What is Role mining? Role mining is a process of analyzing user permissions and activities withi...

Role mining

Soffid 3 Reference guide Tools

How to install Role mining in Soffid

Installation Download Please download the Soffid Role mining add-on. You could download it at ...