Recently Updated Pages
Configure PAM session servers
Definition Soffid provides the functionality that allows you to configure the Jump servers. That...
PAM Jump Server Upgrade
Upgrade To upgrade PAM you will need to run two scripts, one for the store and the other for th...
PAM videos
How works on-screen Keyboard
Introduction
Why PAM? Privileged Account Management (from this point forward: PAM), allows you to manage acco...
Quick overview
Introduction Once the Jump servers have been installed, following the steps defined on the PAM J...
Step 8.3. Assign PAM policy
Assign PAM policy 1. To assign the PAM policy to a Password Vault folder, you must access the P...
Step 8.2. PAM Policies
Step-by-step 1. To create a new PAM Policy, you must access the PAM Rules page in the following...
Step 8.1. PAM Rules
Step-by-step 1. To create a new PAM Rule, you must access the PAM Rules page in the following p...
Step 8. Behavior analysis
Introduction Using PAM you can configure policies and rules in the Soffid console to detect acti...
Step 7.3. Configure XACML PEP
Step-by-step 1. To configure the XACML PEP You must access the "XACML PEP configuration" page i...
Step 7.2. Define XACML policy set to use a workflow
Step-by-step 1. To define policies, you must access the XACML Policy Management page in the foll...
Step 7.1. Define an approval workflow
Step-by-step 1. To define and configure an approval workflow, you can use the Soffid BPM editor....
Step 7. Just in time privileges
Introduction Once the discovery process has been run, the critical accounts have been detected a...
Step 6.4. Enable Task
To rotate the password it will be necessary to enable the task Expire untrusted passwords. The...
Step 6.3. Assign password policy
You must assign a proper password policy to the critical accounts to keep them safe. Step-by-s...
Step 6.2. Create Password policy
How to define a new password policy for the previous user type created. Step-by-step 1. First...
Step 6.1. Create User type
How to create a new User type. That will be mandatory to create a new Password policy. Step-b...
Step 6. Passwords rotation
Introduction The password rotation reduces the vulnerability to password-based attacks. Soffid a...
Step 5.4. Assign the password
To be able to use an account, it is necessary to assign a password, this can be the current pas...
Step 5.3. Publish on Password vault
When critical accounts are detected, the best way to keep them safe is to place them on the Pas...