Advanced Search
Search Results
514 total results found
Network discovery
SCIM Entity Group examples
Operations This page shows the functions that can be performed for the Entity Group object. List all Request GET http://<your-domain>/soffid/webservice/scim2/v1/EntityGroup Response 200 OK { "schemas": [ "urn:ietf:params:scim:api:messages:2...
SCIM Connector
Introduction Description SCIM connector can manage every target system with a published API that allows the SCIM protocol for communication. SCIM is basically a REST JSON web service with specific HTTP requests and responses, and also a specific JSON format...
SCIM Federation Members examples
Operations This page shows the functions that can be performed for the Federation Member object. List all Request GET http://<your-domain>/soffid/webservice/scim2/v1/FederationMember Response 200 OK { "schemas": [ "urn:ietf:params:scim:api:...
TACACS+ (The Terminal Access Controller Access-Control System Plus)
TACACS+ is a security protocol that provides centralized validation of users who are attempting to gain access to a router or other devices. TACACS+ is a protocol for AAA services: Authentication Authorization Accounting https://www.rfc-edi...
Radius Example
Service Provider
TACACS+ Example
Service Provider Information Systems When a Tacacs Service Provider is created, Soffid creates an Information System There are some roles defined for this Information System (0: anonymous, 1: user, ....15: root)
SAML Example
Service Provider
How to install Role mining in Soffid
Installation Download Please download the Soffid Role mining add-on. You could download it at the following link http://www.soffid.com/download/enterprise/ if you have a Soffid user with authorization, or in the following http://download.soffid.com/download...
Role mining
📢 To bear in mind
If you are working with Mozilla Firefox, it will be possible that this message will be displayed.To solve it, you must allow the pop-up windows
Connecting Office 365
Introduction You can use an Identity Provider defined into Soffid to connect to Office 365. You only need to register the Office 365 metadata into a Soffid Service Provider and register the Identity Provider Metadata into your Office 365. At this tutorial So...
Introduction to Role mining
What is Role mining? Role mining is a process of analyzing user permissions and activities within an organization's information systems to identify common patterns of access and activity. The goal of role mining is to create roles or groups of users with simi...
Create identities (manually, CSV file or authoritative source)
Description You need to register the identities to manage and protect them. This wizard allows you to choose the easiest way to do it. Step-by-step 1. First, you must select one option to register the identities. Soffid allows you three options. 2. You m...
Add applications
Description The wizard allows you to add Applications or Information Systems to Soffid as well. The wizard allows you to choose from an application list. Once you choose one of them, you must fill in the required fields to connect to this application. Then th...
Operation
Operation The Lucene index information is stored in files arranged in a folder structure. This folder structure is replicated in every Soffid Console and every Sync Server and also is saved in the database. In case an instance (Docker, Kubernetes, or stand-a...
Textual Index
Operation
Recertifications to do
Description When a campaign is run, the pending recertifications will be displayed in the Recertifications to-do list of the proper user who has to Accept or Deny the recertification. The user who has to manage the recertification can delegate it as well to a...
Step 3.1. Launch network discovery
Then, the third step will be to launch the network discovery process. That is the process in charge to scan the network, getting the hosts information, and connecting to the hosts as well. Step-by-step 1. The discovery network task can be executed manually...