Skip to main content

Recently Updated Pages

SCIM DomainValue examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the DomainValue object. The ...

SCIM VaultFolder examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the VaultFolder object List...

SCIM System examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the Systems object (Agents)....

SCIM CustomObject examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the CustomObjects object Li...

SCIM ProcessInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the ProcessInstances object....

SCIM TaskInstance examples

SCIM SCIM full examples

Operations This page shows the operations that can be performed for the TaskInstances object. L...

Operation

SCIM Textual Index

Textual Index

SCIM Textual Index

How to add to ESSO a second factor of authentication?

ESSO

Introduction Soffid allows you to add a second factor of authentication by configuring a paramet...

Add applications

Configuration wizard IGA

Description The wizard allows you to add Applications or Information Systems to Soffid as well. ...

Create identities (manually, CSV file or authoritative source)

Configuration wizard IGA

Description You need to register the identities to manage and protect them. This wizard allows y...

Cross-Origin Resource Sharing (CORS)

SCIM

By default, for security reasons, the SCIM interface is published for any server application, but...

Updated 2 years ago by Gabriel Buades

Introduction to Role mining

What is Role mining? Role mining is a process of analyzing user permissions and activities withi...

Role mining

Soffid 3 reference guide Tools

How to install Role mining in Soffid

Installation Download Please download the Soffid Role mining add-on. You could download it at ...

SAML Example

Federation SAML

Service Provider

Radius Example

Federation Radius

Service Provider

SCIM Federation Members examples

SCIM SCIM for Federation

Operations This page shows the functions that can be performed for the Federation Member object....

Radius (Remote Authentication Dial-In User Service)

Federation Radius

Introduction The Radius protocol (Remote Authentication Dial-In User Service) is a networking ...

SCIM Connector

Connectors SCIM Connector

Introduction Description SCIM connector can manage every target system with a published API tha...