Recently Updated Pages
Step 4.1. Add database (Optional)
The fourth step, to add a database, is an optional step. You only need to configure when there ...
Condition for Adaptive authentication
Introduction Adaptive authentication is designed to improve the security of online accounts by a...
Issue Actions
Actions Issues query action Download CSV file Allows you to download a CSV file with the...
My issues
Description Soffid provides a tool to manage all issues and allows you to perform the operations...
WS-Fed Architecture
Introduction WS-Federation (Web Services Federation) is an Identity Federation specification Si...
PAM Policies
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that...
Issues
Definition Soffid provides a tool to manage all issues and allows you to perform the operations ...
WS-Fed Example
Steps Attribute definition First of all, will be mandatory to create two new attributes Use...
WS-Fed
WS-Federation (Web Services Federation) is an Identity Federation specification WS-Federation ...
Connecting Office 365
Introduction You can use an Identity Provider defined into Soffid to connect to Office 365. You ...
TACACS+ architecture
Introduction
How to install Federation in Soffid?
Installation Download Please download the Soffid Federation add-on. You could download it at t...
How to enable Kerberos authentication
Step-by-step To enable the kerberos authentication method, the identity provider must have a key...
Server certificate management
There are two options for certificate management 1. The easiest, fast and cheap one: Do not cr...
TACACS+ (The Terminal Access Controller Access-Control System Plus)
TACACS+ is a security protocol that provides centralized validation of users who are attemptin...
TACACS+ Example
Service Provider Information Systems When a Tacacs Service Provider is created, Soffid create...
Accounts
Description An account is the way an user is presented on a target system. There can be user ac...
Example Password Vault PEP
Password Vault Policy Enforcement Point Use case example 1 We want to define a policy to restri...
Expressions
Description The Expression signifies that an element that extends the ExpressionType and is a ...
Policy
Description A Policy represents a single access control policy, expressed through a set of Rul...