Recently Updated Pages
PAM Policies
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that...
1. Generate JKS files
In this case I use self-signed certificates, these certificates are valid for a laboratory enviro...
RDP Gateway Docker Compose Installation
Introduction Soffid allows you to deploy a new docker container with the RDP gateway. The config...
SSH Gateway Docker Compose Installation
Introduction Soffid allows you to deploy a new docker container with the ssh gateway. The config...
RDP Gateway Connection
Introduction We can establish a connection to the target system using the RDP remote access prot...
SSH Gateway Connection
Introduction We can establish a connection to the target system using the SSH remote access prot...
Datos del proyecto
Requisitos del sistema - Sistema operativo Ubuntu-Linux 24.04 - 32 GB RAM - 300 GB Disco - 6 ...
Roles
Description Soffid allows you to create roles to specify permissions that can be assigned to a u...
Information systems
Description Information systems are the systems that Soffid will protect granting and revoking r...
Soffid parameters
Definition Soffid allows you to customize the configuration of some attributes of the Console, S...
How to use Password Manager?
Actions Add vault to Password Manager The first thing you have to do is to Add the vault to the...
How to Configure Password Manager?
Step-by-Step 1. To use the Soffid Password Manager, you have to Add your Vault to the Password M...
Windows Administrator access
How to access? For domain member hosts, ESSO will remove all existing local accounts except for ...
Agents
Description Soffid agents are the tool that allows the connection between the Soffid console and...
How to install Soffid LDAP?
Installation Prerequisites To install Soffid LDAP, you must install Docker. Despite Docker desk...
Process Search
Description A process is a series of actions, connected by transitions. An action could be eithe...
Accounts
Description An account is the way an user is presented on a target system. There can be user ac...
Hosts
Description The host screen lets the administrator manage a static IP address assigned to any ho...
Network discovery
Description The Network discovery tool will be in charge to scan the networks to find the hosts ...
Installing IAM Console
Guide to install IAM Console using Docker. There is a public docker image at docker hub: https:...