Advanced Search
Search Results
711 total results found
Policy Decision Point (PDP)
Definition The PDP, Policy Decision Point, is in charge of evaluating the defined rules. The Policy Decision Point is essentially a policy compiler. The PDP must verify that the specified rules are within the scope of the rule authors authority. The PDP provi...
XACML Rule combining algorithm
Definition The rule-combining algorithm defines a procedure for arriving at an authorization decision given the individual results of evaluation of a set of rules XACML rule combining algorithms is in charge to combine the decisions produced by different...
Expressions
Description The Expression signifies that an element that extends the ExpressionType and is a member of the Expression substitution group shall appear in its place. The Expression is not used directly in a policy. Expressions are elements that allow to...
Example Web PEP
Web Policy Enforcement Point Use case example We want to define a policy to restrict access to some pages of the Soffid console. The users who are assigned to the SOFFID_RRHH role (from this point forward: end-users) will have limitations to access to some ...
Example Password Vault PEP
Password Vault Policy Enforcement Point Use case example 1 We want to define a policy to restrict access to the Soffid Password Vault. The users who are assigned to the SOFFID_ADMIN role (from this point forward: end-users) will have limitations to perform ...
Example Role centric PEP
Role centric Enforcement Point Use case example We want to define a policy to restrict access to the Soffid console role's page (MainMenu > Administration > Resources > Roles). The users who belong to the "enterprise" group as primary group (from this point...
Introduction to Identity Federation
What is Identity Federation? A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems. The federation is a system of trust between two par...
How to install BPM Editor in Soffid
Installation Download Please download the Soffid BPM Editor add-on. You could download it at the following link http://www.soffid.com/download/enterprise/ if you have a Soffid user with authorization, or in the following http://download.soffid.com/download/...
How to install XACML in Soffid
Installation Download Please download the Soffid XACML add-on. You can download it at the following link http://www.soffid.com/download/enterprise/ if you have Soffid user with authorization, or in the following http://download.soffid.com/download/ by regis...
How to install Federation in Soffid?
Installation Download Please download the Soffid Federation add-on. You could download it at the following link http://www.soffid.com/download/enterprise/ if you have a Soffid user with authorization, or in the following http://download.soffid.com/download/...
Example Dynamic role PEP
Dynamic role Enforcement Point Use case example We want to define a policy to restrict access to the Soffid console user's page (MainMenu > Administration > Resources > Users). The users who are assigned to the SOFFID_RRHH role (from this point forward: end...
Outgoing triggers examples
Attribute mapping triggers When you are configuring an agent and defining the attribute mappings of connectors, depending on the connector type, it will be able to define BeanShell scripts that will be triggered when data is loaded into the target system, out...
Incoming triggers examples
Load triggers When you are configuring an agent, depending on the connector type, it will be able to define BeanShell scripts that will be triggered when data is loaded into Soffid, incoming triggers. Triggers can be used to validate or perform a specific ac...
Triggers: Script Tips
Triggers: Script Tips Here we will show you some tips about how to use scripts. For more information you can visit the official documentation of Soffid Write into a sync-server log System.out.println("what you want......"); Recover data from a Soffid obje...
Attribute mappings examples
Attributes When you are configuring an agent, depending on the connector type, it will be able to define some attributes. The attributes depend on the object that you are configuring, and the objects depend on the connector type. Get the value of an attribut...
Configure PAM session servers
Definition Soffid provides the functionality that allows you to configure the Jump servers. That option is located on Main Menu > Administration > Configure Soffid > Security settings > Configure PAM session servers To configure that functionality is mandat...
PAM Rules
Definition Soffid allows you to define rules to detect commands executed on a server. When a user launches a command defined on a rule, Soffid will detect it. To use those rules you need to define the PAM policies. For more information, you can visit the PAM...
PAM Policies
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that dictate how privileged access is granted, managed, and audited within an organization. Soffid allows you to define policies, those policies can be made up of sev...
Password vault
Search in PAM recordings
Description Soffid provides the functionality that allows searching for information about the PAM recording sessions. That option is located on Main Menu > Administration > Monitoring and reporting > Search in PAM recordings First of all, to query the PAM r...