Recently Updated Pages
Detect duplicated user
Definition That step is used to define the proper rules to determine the potential conflicts bet...
Screen
Description This step is used to define the custom form that will be used by the users who have ...
How to install BPM Editor in Soffid
Installation Download Please download the Soffid BPM Editor add-on. You could download it at t...
Links to Soffid Resources
PPTs Soffid overview https://docs.google.com/presentation/d/11R5ELJckXC-AvTqHY32k85BUg1v3WL8Svj...
OpenID-Connect architecture
Introduction OpenID is based on the well known protocol. It is easier to implement and deploy, a...
SAML architecture
Introduction SAML is the most complete, secure, and mature solution to get identity federation. ...
My tasks
Description Displays the task in which the user is involved like a supervisor, manager, o person...
Utility classes
Crypt Crypt allows to encrypt text with different algorithms and verify the resulting hash. To ...
Account naming rules
Definition Account naming rules define how to generate account names to connect with final syste...
Plugins
Definition Soffid provides you additional functionality that allows installing addons and server...
SCIM OTP devices Workflows examples
SCIM OTP devices examples
⏰ Getting Started
My OTP devices
How to perform unsolicited login
Soffid Identity Provider supports unsolicited login (Idp initiated login) profile. In order to ...
SQL Integration flows - Update user
Update user Introduction Soffid provides a workflow to create, modify, and delete a user in the...
Product FAQ
1. How start with Soffid? To start with Soffid you only need to go to the Soffid download manage...
User backup restore
Description On the User backup configure & restore page, you could search, check and restore the...
CAS
Definition Cas protocol is rarely used. Screen overview Standard attributes Class: class ...
Radius
Definition Networking protocol that authorizes and authenticates users who access a remote netwo...