Recently Updated Pages
How to install Soffid Authenticator?
Installation Download & Install Depending on your device, you can download & install Soffid Aut...
My requests
Description Soffid provides a complete workflow engine that allows you to incorporate business p...
Process Search
Description A process is a series of actions, connected by transitions. An action could be eithe...
Network discovery
Operation
Operation The Lucene index information is stored in files arranged in a folder structure. This f...
My OTP devices
Description My OTP devices are part of a Soffid Self-service portal that allows end-users to acc...
My Profile
Description My Profile is a part of a Soffid Self-service portal that allows to end-users config...
Connecting Radius client
Introduction The Radius protocol (Remote Authentication Dial-In User Service) is a networking pr...
Connecting Tacacs+
Introduction TACACS (Terminal Access Controller Access Control System) is a security protocol th...
Connecting CAS client
Introduction The CAS protocol is a simple and powerful ticket-based protocol. It involves one or...
Openid-connect Dynamic Register
Introduction Openid-connect allows a service provider registers dynamically other service provid...
Connecting your custom applications
Introduction SAML 2.0 is a complex and not easy to implement standard. There are some libraries ...
Connecting Soffid console
Introduction Soffid console has a built-in SAML client, so it can act as a service provider in t...
Connecting a SAML service
Introduction To connect a SAML service provider, the service provider must offer you its SAML me...
Connecting an OpenID Connect service
Introduction There are three basic OpenID flows, depending whether the service name must be auth...
Radius architecture
Introduction Access Reject: The user is unconditionally denied access to all requested net...
Introduction to Identity Federation
What is Identity Federation? A federated identity in information technology is the means of link...
⏰ Getting started
What is Soffid Authenticator? Soffid provides an application to be used with Soffid Identity Pro...
Step 2. Configure network discovery
The second step will be to configure the network with the proper parameter to allow you to run ...
Step 1. Create network
The first step of the PAM implementation will be to create the network we want to scan to disco...