Skip to main content

Recently Updated Pages

SCIM GroupUser examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the object that establishes ...

Updated 2 years ago by pgarcia@soffid.com

SCIM Host examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the host object. List all ...

Updated 2 years ago by pgarcia@soffid.com

SCIM MailDomain examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the MailDomain object. List...

Updated 2 years ago by pgarcia@soffid.com

SCIM MailList examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the MailList object. List a...

Updated 2 years ago by pgarcia@soffid.com

SCIM Network examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the Network object. List al...

Updated 2 years ago by pgarcia@soffid.com

SCIM DomainValue examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the DomainValue object. The ...

Updated 2 years ago by pgarcia@soffid.com

SCIM VaultFolder examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the VaultFolder object List...

Updated 2 years ago by pgarcia@soffid.com

SCIM System examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the Systems object (Agents)....

Updated 2 years ago by pgarcia@soffid.com

SCIM CustomObject examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the CustomObjects object Li...

Updated 2 years ago by pgarcia@soffid.com

SCIM ProcessInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the ProcessInstances object....

Updated 2 years ago by pgarcia@soffid.com

SCIM TaskInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the TaskInstances object. L...

Updated 2 years ago by pgarcia@soffid.com

Operation

SCIM Textual Index

Updated 2 years ago by pgarcia@soffid.com

Textual Index

SCIM Textual Index

Updated 2 years ago by pgarcia@soffid.com

How to add to ESSO a second factor of authentication?

ESSO

Introduction Soffid allows you to add a second factor of authentication by configuring a paramet...

Updated 2 years ago by pgarcia@soffid.com

Add applications

Configuration wizard IGA

Description The wizard allows you to add Applications or Information Systems to Soffid as well. ...

Updated 2 years ago by pgarcia@soffid.com

Create identities (manually, CSV file or authoritative source)

Configuration wizard IGA

Description You need to register the identities to manage and protect them. This wizard allows y...

Updated 2 years ago by pgarcia@soffid.com

Cross-Origin Resource Sharing (CORS)

SCIM

By default, for security reasons, the SCIM interface is published for any server application, but...

Updated 2 years ago by Gabriel Buades

Introduction to Role mining

What is Role mining? Role mining is a process of analyzing user permissions and activities withi...

Updated 2 years ago by pgarcia@soffid.com

Role mining

Soffid 3 Reference guide Tools

Updated 2 years ago by pgarcia@soffid.com

How to install Role mining in Soffid

Installation Download Please download the Soffid Role mining add-on. You could download it at ...

Updated 2 years ago by pgarcia@soffid.com