Advanced Search
Search Results
514 total results found
Step 7.1. Define an approval workflow
Step-by-step 1. To define and configure an approval workflow, you can use the Soffid BPM editor. You must access the BPM editor page in the following path: Main Menu > Administration > Configure Soffid > Workflow settings > BPM editor 2. To add a new workfl...
Step 7.3. Configure XACML PEP
Step-by-step 1. To configure the XACML PEP You must access the "XACML PEP configuration" page in the following path: Main Menu > Administration > Configure Soffid > Security settings > XACML PEP configuration 2. At the "XACML PEP configuration page you mus...
Step 8. Behavior analysis
Introduction Using PAM you can configure policies and rules in the Soffid console to detect actions or behaviors that may put your organization at risk. With this information, you will be able to analyze the behavior of the critical accounts that you have def...
Step 8.1. PAM Rules
Step-by-step 1. To create a new PAM Rule, you must access the PAM Rules page in the following path: Main Menu > Administration > Configure Soffid > Security settings > PAM rules 2. To add a new PAM rule, you must click the add button (+) and Soffid will di...
Quick overview
Introduction Once the Jump servers have been installed, following the steps defined on the PAM Jump Server installation page, it will be mandatory to configure the jump servers on the Soffid Console, to do that you can visit the Configure PAM session servers ...
Introduction
Why PAM? Privileged Account Management (from this point forward: PAM), allows you to manage accounts that are necessary to perform scheduled configuration and maintenance tasks, as well as supervening tasks such as the recovery of a hardware or software failu...
PAM videos
How works on-screen Keyboard
Configure PAM session servers
Definition Soffid provides the functionality that allows you to configure the Jump servers. That option is located on Main Menu > Administration > Configure Soffid > Security settings > Configure PAM session servers To configure that functionality is mandat...
RDP Gateway Connection
Introduction We can establish a connection to the target system using the RDP remote access protocol. You can use a remote desktop client. How to connect You can establish the connection with the ssh gateway using a desktop client and then Soffid will ask ...
Deployment procedure
Introduction PAM is the process that determines who has access to what types of information as it creates an integrated view of risk, threats, and controls. Implementing a policy of least privilege minimizes unnecessary privilege allocation to ensure access ...
User backup configure
Description Soffid allows you to configure some backup parameters. Go to In the "User backup configure & restore" page, in the hamburger button click the option "Configure backup". Screen overview Custom attributes Minimum delay between backups Numbe...
Initialize database using Docker
The purpose of this tutorial is to show how to initialize a database MariaDB required for Soffid IAM installation using Docker. Prerequisites 1. Install docker ( https://docs.docker.com/install/ ) 2. Create a docker network, that network allows you to conne...
Recertification campaigns
Description Soffid allows you to define new campaigns to review the users' access rights and to assign who has to recertify or revoke their entitlements. You can create a campaign related to a previously defined recertification policy. Depending on the polic...
Clear redundant roles
Description A high level profile can contain or grant application permissions. On the other side, application permissions can contain or grant low level permissions. All of them are referred to generally as roles. Some users could have been granted both high...
Disable inactive users
Description Probably there are some users that do not need access to any information system. Using this tool you will be able to identify them and act upon them. The process is a two step process: Filter out the universe of users to analyze. Select the a...
Disable inactive accounts
Description Probably there are some accounts that are no longer used. Using this tool you will be able to identify them and act upon them. The process is a two step process: Filter out the universe of accounts to analyze. Select the actions to perform on...
⏰ Getting started
Introduction Soffid provides you a 360° perspective of the identities of your organization employees, providers and customers: Identity governance to manage the identities life-cycle Access management identifies your users accessing applications, includin...
Connect Soffid IdaaS to your on-premise network
Description In order to manage your information system, a component named Sync Server must be installed along with Soffid Console. You must choose one platform as your Sync Server Soffid host and follow the instructions. Once you have run the corresponding s...
Design user life cycle workflows
Description When you select the option "Design user life cycle workflows", Soffid will browse to the BPM Editor page, where you could define new workflows or import existing workflows from a file. For more information, you can visit the BPM Editor book. Scr...
Create SoD matrix
Description The segregation of duties (SoD) is a fundamental element of internal controls, defined to prevent error and fraud. Segregation of duties ensures that at least two individuals are responsible for the separate parts of any task. You can find additi...