Recently Updated Pages
¿Qué es BPM?
Business Process Management es una disciplina de ejecución de metodología de gestión para mejorar...
Introduction to BPM Editor
What is BPM? Business Process Management is a discipline for executing of management methodology...
Target
Description Defines to which access requests a policy or rule applies. In XACML all the attribut...
Policy set
Description A PolicySet is a container that can hold other Policies or PolicySets, as well as ...
Policy
Description A Policy represents a single access control policy, expressed through a set of Rul...
Introduction to XACML
What is XACML? XACML "eXtensible Access Control Markup Language" is an open standard XML based l...
Expressions
Description The Expression signifies that an element that extends the ExpressionType and is a ...
Rules
Description A rule is the most elementary unit of policy. It may exist in isolation only withi...
XACML Rule combining algorithm
Definition The rule-combining algorithm defines a procedure for arriving at an authorization d...
Policy Decision Point (PDP)
Definition The PDP, Policy Decision Point, is in charge of evaluating the defined rules. The Pol...
Policy Enforcement Point (PEP)
Description The PEP, Policy enforcement point, is a component of policy-based management, where...
Event Sample scripts
On grant permission Update a user attribute when assigning a specific permission if (grant.role...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Docke...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Kuber...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Docke...
Introduction to Custom scripts
What is a Custom script? The Administration Addon provides the capacity to launch custom scripts...
Step 6.5. Password Rotation using Windows Connector
Password Rotation using Windows Connector When you are configuring password rotation using WIndo...
Windows Connector
Introduction Description This connector implements the LDAPS protocol and it is used to connect...
Authentication
Definition Soffid could use different kinds of external authentication sources. These mechanisms...
Create adaptive authentication rules
Description Adaptive authentication rules are a set of security policies and mechanisms that adj...