Recently Updated Pages
Group Type
Description Companies are organized in different business units, departments or workgroups. In S...
SCIM OTP devices Workflows examples
SCIM OTP devices examples
⏰ Getting Started
My OTP devices
How to perform unsolicited login
Soffid Identity Provider supports unsolicited login (Idp initiated login) profile. In order to ...
SQL Integration flows - Update user
Update user Introduction Soffid provides a workflow to create, modify, and delete a user in the...
Product FAQ
1. How start with Soffid? To start with Soffid you only need to go to the Soffid download manage...
⏰ Getting started
Introduction Soffid provides a collection of add-ons that can be installed to add functionalitie...
User backup restore
Description On the User backup configure & restore page, you could search, check and restore the...
CAS
Definition Cas protocol is rarely used. Screen overview Standard attributes Class: class ...
Radius
Definition Networking protocol that authorizes and authenticates users who access a remote netwo...
CAS Example
Service Provider
OpenID-Connect example
Identity Provider Service Provider
CAS architecture
Introduction The CAS is a Single Sign On protocol for the web. This protocol allows users to acc...
Profiles
Description A profile is a protocol or subset of protocols implemented by the Identity Provider....
CAS (Central Authentication Service)
Introduction The CAS protocol is a simple and powerful ticket-based protocol. It involves one ...
XACML Rule combining algorithm
Definition The rule-combining algorithm defines a procedure for arriving at an authorization d...
Active Directory back channel configuration
Introduction In order to configure the Active Directory back-channel, you must use the eris comm...
How to configure the Office 365 agent?
Office 365 integration Prerequisites You need to install the last version of JSON Rest Connec...