Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

514 total results found

SCIM Connector

Connectors SCIM Connector

Introduction Description SCIM connector can manage every target system with a published API that allows the SCIM protocol for communication. SCIM is basically a REST JSON web service with specific HTTP requests and responses, and also a specific JSON format...

Soffid
3
Connectors
SCIM

SCIM Federation Members examples

SCIM SCIM for Federation

Operations This page shows the functions that can be performed for the Federation Member object. List all Request GET http://<your-domain>/soffid/webservice/scim2/v1/FederationMember Response 200 OK { "schemas": [ "urn:ietf:params:scim:api:...

Addon
Federation
Soffid
3.4
Federation
3.4
Addon
SCIM
Examples

TACACS+ (The Terminal Access Controller Access-Control System Plus)

Federation TACACS+

Ā TACACS+ is a security protocol that provides centralized validation of users who are attempting to gain access to a router or other devices. TACACS+ is a protocol for AAA services: Authentication Authorization Accounting https://www.rfc-edi...

Soffid
3.4
Addon
Federation
Tacacs+

Radius Example

Federation Radius

Service Provider

Soffid
3
Addon
Federation
Radius

TACACS+ Example

Federation TACACS+

Service Provider Information Systems When a Tacacs Service Provider is created, Soffid creates an Information System There are some roles defined for this Information System (0: anonymous, 1: user, ....15: root)

Soffid
3.4
Addon
Federation
Tacacs+

SAML Example

Federation SAML

Service Provider

Soffid
3
Addon
Federation
SAML

How to install Role mining in Soffid

Installation Download Please download the Soffid Role mining add-on. You could download it at the following link http://www.soffid.com/download/enterprise/ if you have a Soffid user with authorization, or in the following http://download.soffid.com/download...

Soffid
3.4
Addon
Role Mining
Tools
Role mining

Role mining

Soffid 3 Reference guide Tools

Soffid
3.4
Tools
Role mining

šŸ“¢ To bear in mind

PAM Install & config

If you are working with Mozilla Firefox, it will be possible that this message will be displayed.To solve it, you must allow the pop-up windows Ā 

Soffid
3
PAM
Firefox
Warning

Connecting Office 365

Federation

Introduction You can use an Identity Provider defined into Soffid to connect to Office 365. You only need to register the Office 365 metadata into a Soffid Service Provider and register the Identity Provider Metadata into your Office 365. At this tutorial So...

Soffid
3
Addon
Federation
Office 365

Introduction to Role mining

What is Role mining? Role mining is a process of analyzing user permissions and activities within an organization's information systems to identify common patterns of access and activity. The goal of role mining is to create roles or groups of users with simi...

Soffid
3.4
Addon
Role Mining
Tools
Role mining

Create identities (manually, CSV file or authoritative source)

Configuration wizard IGA

Description You need to register the identities to manage and protect them. This wizard allows you to choose the easiest way to do it. Step-by-step 1. First, you must select one option to register the identities. Soffid allows you three options. 2. You m...

Configuration wizard
IGA
Wizard
Soffid
3.4

Add applications

Configuration wizard IGA

Description The wizard allows you to add Applications or Information Systems to Soffid as well. The wizard allows you to choose from an application list. Once you choose one of them, you must fill in the required fields to connect to this application.Ā Then th...

Soffid
3.4
Configuration wizard
IGA
Wizard

Operation

Soffid 3 Reference guide Textual Index

Operation The Lucene index information is stored in files arranged in a folder structure. This folder structure is replicated in every Soffid Console and every Sync Server and also is saved in the database. In case an instance (Docker, Kubernetes, or stand-a...

Soffid
3.5

Textual Index

SCIM Textual Index

Soffid
3.5

Operation

SCIM Textual Index

Soffid
3.5

Recertifications to do

Recertification Recertification

Description When a campaign is run, the pending recertifications will be displayed in the Recertifications to-do list of the proper user who has to Accept or Deny the recertification. The user who has to manage the recertification can delegate it as well to a...

Soffid
3
Addon
Recertification

Step 3.1. Launch network discovery

PAM Implementation guide Step 3. Launch network discovery

Then, the third step will be to launch the network discovery process. That is the process in charge to scan the network, getting the hosts information, and connecting to the hosts as well. Step-by-step 1.Ā The discovery network task can be executed manually...

Soffid
3
PAM
PAM Implementation

Step 4.2. Create an agent (Optional)

PAM Implementation guide Step 4. Register additional resources (...

That step will be an optional step, and it will be mandatory only when the SQL Server agentĀ or the Oracle agent was not created previously on Soffid Console and you need to add a database to manage its accounts. Step-by-step 1. First of all, to create an a...

Soffid
3
PAM
PAM Implementation
Addon

Step 4.3. Reconcile (Optional)

PAM Implementation guide Step 4. Register additional resources (...

To request the accounts you must launch the reconciliation process. The main purpose of reconciling process is to provide a mechanism to ensure that all users are aligned on the specific roles and responsibilities. Step-by-step 1. First of all, you need to...

Soffid
3
PAM
PAM Implementation
Addon