Advanced Search
Search Results
518 total results found
Import settings and objects
Description Soffid has the functionality that allows you to import configuration, Soffid objects, and objects from target systems from a ZIP file. This ZIP file must be generated by the export action from another Soffid tenant. For more information, you can...
Console log
Description That option allows you to look up server logs from the console. The logs are created on the server filesystem. Screen Overview Actions Download Allows you to download the log file
Sessions
Description The sessions page displays the current open sessions made with ESSO, WSSO or PAM for which the user is the owner. This functionality allows the owner users, with appropriate privileges, to open and view online a session opened by another user. I...
Scheduled jobs
Description Schedule jobs display all the asynchronous tasks generated for the workflows engine. When a job is finished, it will disappear from that list. Standard attributes ID: job identifier. Name: job name. Process: process identifier and descriptio...
Scheduled tasks
Description Schedule tasks display all the automatic tasks defined on Soffid, the scheduling of each task, and information about the last execution. Also, allows administrator users to update the execution of that tasks using a cron pattern and init the execu...
🔎 Overview
Introduction The Soffid 3 reference guide wants to present all the functionality contained in version 3 of the Soffid Console, explaining the functionality of all the screens and the functionality of each of them. The documentation is organized as the option...
Network discovery
SCIM Entity Group examples
Operations This page shows the functions that can be performed for the Entity Group object. List all Request GET http://<your-domain>/soffid/webservice/scim2/v1/EntityGroup Response 200 OK { "schemas": [ "urn:ietf:params:scim:api:messages:2...
SCIM Connector
Introduction Description SCIM connector can manage every target system with a published API that allows the SCIM protocol for communication. SCIM is basically a REST JSON web service with specific HTTP requests and responses, and also a specific JSON format...
SCIM Federation Members examples
Operations This page shows the functions that can be performed for the Federation Member object. List all Request GET http://<your-domain>/soffid/webservice/scim2/v1/FederationMember Response 200 OK { "schemas": [ "urn:ietf:params:scim:api:...
TACACS+ (The Terminal Access Controller Access-Control System Plus)
TACACS+ is a security protocol that provides centralized validation of users who are attempting to gain access to a router or other devices. TACACS+ is a protocol for AAA services: Authentication Authorization Accounting https://www.rfc-edi...
Radius Example
Service Provider
TACACS+ Example
Service Provider Information Systems When a Tacacs Service Provider is created, Soffid creates an Information System There are some roles defined for this Information System (0: anonymous, 1: user, ....15: root)
SAML Example
Service Provider
How to install Role mining in Soffid
Installation Download Please download the Soffid Role mining add-on. You could download it at the following link http://www.soffid.com/download/enterprise/ if you have a Soffid user with authorization, or in the following http://download.soffid.com/download...
Role mining
📢 To bear in mind
If you are working with Mozilla Firefox, it will be possible that this message will be displayed.To solve it, you must allow the pop-up windows
Connecting Office 365
Introduction You can use an Identity Provider defined into Soffid to connect to Office 365. You only need to register the Office 365 metadata into a Soffid Service Provider and register the Identity Provider Metadata into your Office 365. At this tutorial So...
Introduction to Role mining
What is Role mining? Role mining is a process of analyzing user permissions and activities within an organization's information systems to identify common patterns of access and activity. The goal of role mining is to create roles or groups of users with simi...
Create identities (manually, CSV file or authoritative source)
Description You need to register the identities to manage and protect them. This wizard allows you to choose the easiest way to do it. Step-by-step 1. First, you must select one option to register the identities. Soffid allows you three options. 2. You m...