Recently Updated Pages
Using iReport
Steps Once you have installed the Reporting add-on you must follow the following steps: 1. Down...
Reports definitions
Description At the report definitions tab you can add new reports to Soffid Console, and manage ...
Introduction to Reporting
What is Reporting? It is the process responsible for collecting data and presenting it in a read...
SCIM OTP devices Workflows examples
Workflow Examples Workflow 1 1. Create Email OTP device Request GET http://<your-domain>/soff...
Introduction to OTP
What is OTP? A one time password (OTP) is a password that is valid for only one login session or...
Password recovery questions
Description Soffid allows to end-user configure the questions and answers in Soffid console to r...
Obligations
Description XACML defines obligations as actions that have to be returned to the PEP with the ...
Configure Default questions
Description Soffid allows to the administrator user, o the user with the proper roles, to config...
Users OTP devices
Description Soffid allows you to manage the OTP devices for each user. That option will be avail...
Introduction
A business logic addon should follow the conventions and guidelines used to develop Soffid IAM. ...
Soffid upgrades
Soffid upgrades are managed using the same mechanisms as addon upgrades. Data upgrade The data ...
Addon upgrades
Soffid addons should be able to manage data schema changes. Soffid gives addons a standard proced...
Policy set reference
Description The policy set reference is used to reference a policy set element. The reference is...
Policy reference
Description The policy reference is used to reference a policy element. The reference is made by...
Example Web PEP
Web Policy Enforcement Point Use case example We want to define a policy to restrict access to ...
Conditions
Description Condition represents a Boolean expression that refines the applicability of the ru...
Variables
Description Variables are the elements to define functions that may be used througthout the po...
Example Role centric PEP
Role centric Enforcement Point Use case example We want to define a policy to restrict access t...
Example Dynamic role PEP
Dynamic role Enforcement Point Use case example We want to define a policy to restrict access t...
Using dynamic models
To use dynamic models XmlDataSource tag must be replaced by datamodel. The datamodel tag has the ...