Skip to main content

Recently Updated Pages

Connecting CAS client

Federation Connecting Service Providers

Introduction The CAS protocol is a simple and powerful ticket-based protocol. It involves one or...

Updated 11 months ago by pgarcia@soffid.com

Openid-connect Dynamic Register

Federation Connecting Service Providers

Introduction Openid-connect allows a service provider registers dynamically other service provid...

Updated 11 months ago by pgarcia@soffid.com

Connecting your custom applications

Federation Connecting Service Providers

Introduction SAML 2.0 is a complex and not easy to implement standard. There are some libraries ...

Updated 11 months ago by pgarcia@soffid.com

Connecting Soffid console

Federation Connecting Service Providers

Introduction Soffid console has a built-in SAML client, so it can act as a service provider in t...

Updated 11 months ago by pgarcia@soffid.com

Connecting a SAML service

Federation Connecting Service Providers

Introduction To connect a SAML service provider, the service provider must offer you its SAML me...

Updated 11 months ago by pgarcia@soffid.com

Connecting an OpenID Connect service

Federation Connecting Service Providers

Introduction There are three basic OpenID flows, depending whether the service name must be auth...

Updated 11 months ago by pgarcia@soffid.com

Radius architecture

Federation Radius

Introduction Access Reject: The user is unconditionally denied access to all requested net...

Updated 11 months ago by pgarcia@soffid.com

Introduction to Identity Federation

Federation

What is Identity Federation? A federated identity in information technology is the means of link...

Updated 11 months ago by pgarcia@soffid.com

⏰ Getting started

Soffid Authenticator App

What is Soffid Authenticator? Soffid provides an application to be used with Soffid Identity Pro...

Updated 11 months ago by pgarcia@soffid.com

Step 2. Configure network discovery

PAM Implementation guide

The second step will be to configure the network with the proper parameter to allow you to run ...

Updated 11 months ago by pgarcia@soffid.com

Step 1. Create network

PAM Implementation guide

The first step of the PAM implementation will be to create the network we want to scan to disco...

Updated 11 months ago by pgarcia@soffid.com

Step 8.2. PAM Policies

PAM Implementation guide Step 8. Behavior analysis

Step-by-step 1. To create a new PAM Policy, you must access the PAM Rules page in the following...

Updated 11 months ago by pgarcia@soffid.com

Step 8.3. Assign PAM policy

PAM Implementation guide Step 8. Behavior analysis

Assign PAM policy 1. To assign the PAM policy to a Password Vault folder, you must access the P...

Updated 11 months ago by pgarcia@soffid.com

Step 7.2. Define XACML policy set to use a workflow

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To define policies, you must access the XACML Policy Management page in the foll...

Updated 11 months ago by pgarcia@soffid.com

Step 6.4. Enable Task

PAM Implementation guide Step 6. Passwords rotation

To rotate the password it will be necessary to enable the task Expire untrusted passwords. The...

Updated 11 months ago by pgarcia@soffid.com

Step 6.2. Create Password policy

PAM Implementation guide Step 6. Passwords rotation

How to define a new password policy for the previous user type created. Step-by-step 1. First...

Updated 11 months ago by pgarcia@soffid.com

Step 5.3. Publish on Password vault

PAM Implementation guide Step 5. Account management

When critical accounts are detected, the best way to keep them safe is to place them on the Pas...

Updated 11 months ago by pgarcia@soffid.com

Step 5.2. Change account type

PAM Implementation guide Step 5. Account management

The Change account type step shows how to change the type from unmanaged to shared or privilege...

Updated 11 months ago by pgarcia@soffid.com

Step 6.3. Assign password policy

PAM Implementation guide Step 6. Passwords rotation

You must assign a proper password policy to the critical accounts to keep them safe. Step-by-s...

Updated 11 months ago by pgarcia@soffid.com

Step 6.1. Create User type

PAM Implementation guide Step 6. Passwords rotation

How to create a new  User type. That will be mandatory to create a new Password policy. Step-b...

Updated 11 months ago by pgarcia@soffid.com