Skip to main content

Recently Updated Pages

Step 6.1. Create User type

PAM Implementation guide Step 6. Passwords rotation

How to create a new  User type. That will be mandatory to create a new Password policy. Step-b...

Step 5.4. Assign the password

PAM Implementation guide Step 5. Account management

To be able to use an account, it is necessary to assign a password, this can be the current pas...

Step 5.1. Account management

PAM Implementation guide Step 5. Account management

  The account management step shows you how to manage the accounts to change the type, how to lo...

Step 4.3. Reconcile (Optional)

PAM Implementation guide Step 4. Register additional resources (...

To request the accounts you must launch the reconciliation process. The main purpose of reconci...

Step 4.2. Create an agent (Optional)

PAM Implementation guide Step 4. Register additional resources (...

That step will be an optional step, and it will be mandatory only when the SQL Server agent or ...

Step 3.3. Entry point

PAM Implementation guide Step 3. Launch network discovery

  Soffid allows you to manually create entry points to connect to information systems. Step-by-...

Step 3.2. Account repositories

PAM Implementation guide Step 3. Launch network discovery

  Once the network discovery process is complete, Soffid will have detected the devices connecte...

Create tasks

Each time an extensible object is created or modified, a new synchronization task should be creat...

Updated 2 years ago by Gabriel Buades

Register extensible object

Create a service that extends ApplicationBootService In the methods syncServerBoot and consoleBo...

Updated 2 years ago by Gabriel Buades

Create extensible object

Create a Java Class that extends com.soffid.iam.sync.intf.ExtensibleObject Add a constructor tha...

Updated 2 years ago by Gabriel Buades

Introduction

The process to create custom object is composed of ... steps: Implement a class that implement...

Updated 2 years ago by Gabriel Buades

Operation

SCIM Textual Index

Textual Index

SCIM Textual Index

How to add to ESSO a second factor of authentication?

ESSO

Introduction Soffid allows you to add a second factor of authentication by configuring a paramet...

Add applications

Configuration wizard IGA

Description The wizard allows you to add Applications or Information Systems to Soffid as well. ...

Create identities (manually, CSV file or authoritative source)

Configuration wizard IGA

Description You need to register the identities to manage and protect them. This wizard allows y...

Cross-Origin Resource Sharing (CORS)

SCIM

By default, for security reasons, the SCIM interface is published for any server application, but...

Updated 2 years ago by Gabriel Buades

Introduction to Role mining

What is Role mining? Role mining is a process of analyzing user permissions and activities withi...

Role mining

Soffid 3 reference guide Tools

How to install Role mining in Soffid

Installation Download Please download the Soffid Role mining add-on. You could download it at ...