Skip to main content

Recently Updated Pages

SCIM Network examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the Network object. List al...

Updated 1 year ago by pgarcia@soffid.com

SCIM DomainValue examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the DomainValue object. The ...

Updated 1 year ago by pgarcia@soffid.com

SCIM VaultFolder examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the VaultFolder object List...

Updated 1 year ago by pgarcia@soffid.com

SCIM System examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the Systems object (Agents)....

Updated 1 year ago by pgarcia@soffid.com

SCIM CustomObject examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the CustomObjects object Li...

Updated 1 year ago by pgarcia@soffid.com

SCIM ProcessInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the ProcessInstances object....

Updated 1 year ago by pgarcia@soffid.com

SCIM TaskInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the TaskInstances object. L...

Updated 1 year ago by pgarcia@soffid.com

Operation

SCIM Textual Index

Updated 1 year ago by pgarcia@soffid.com

Textual Index

SCIM Textual Index

Updated 1 year ago by pgarcia@soffid.com

How to add to ESSO a second factor of authentication?

ESSO

Introduction Soffid allows you to add a second factor of authentication by configuring a paramet...

Updated 1 year ago by pgarcia@soffid.com

Add applications

Configuration wizard IGA

Description The wizard allows you to add Applications or Information Systems to Soffid as well. ...

Updated 1 year ago by pgarcia@soffid.com

Create identities (manually, CSV file or authoritative source)

Configuration wizard IGA

Description You need to register the identities to manage and protect them. This wizard allows y...

Updated 1 year ago by pgarcia@soffid.com

Cross-Origin Resource Sharing (CORS)

SCIM

By default, for security reasons, the SCIM interface is published for any server application, but...

Updated 1 year ago by Gabriel Buades

Introduction to Role mining

What is Role mining? Role mining is a process of analyzing user permissions and activities withi...

Updated 2 years ago by pgarcia@soffid.com

Role mining

Soffid 3 Reference guide Tools

Updated 2 years ago by pgarcia@soffid.com

How to install Role mining in Soffid

Installation Download Please download the Soffid Role mining add-on. You could download it at ...

Updated 2 years ago by pgarcia@soffid.com

SAML Example

Federation SAML

Service Provider

Updated 2 years ago by pgarcia@soffid.com

Radius Example

Federation Radius

Service Provider

Updated 2 years ago by pgarcia@soffid.com

SCIM Federation Members examples

SCIM SCIM for Federation

Operations This page shows the functions that can be performed for the Federation Member object....

Updated 2 years ago by pgarcia@soffid.com

Radius (Remote Authentication Dial-In User Service)

Federation Radius

Introduction The Radius protocol (Remote Authentication Dial-In User Service) is a networking ...

Updated 2 years ago by pgarcia@soffid.com