Advanced Search
Search Results
437 total results found
Start
Definition That is the first step of the workflow. At that step, you could define the fields you want to show when the end users. In that case, the request will be launched automatically when the end users request to use a privileged account to connect to a p...
Password vault
Description Soffid provides a protected storage, to save and manage accounts for multiple applications, that is the Password vault. Here you can save the accounts and passwords to access to critical systems and to your applications as well. Password vault all...
PAM Jump Server Upgrade
Upgrade To upgrade PAM you will need to run two scripts, one for the store and the other for the launcher. Upgrade store To upgrade the storage container you can download and execute the following script: upgrade-store.sh ~/Downloads$ bash ./upgrade-store...
Bulk actions
Description Allows massive operations to be performed on the selected records. With that operation, updates can be made to any of the object parameters. You can access this option through the hamburger icon from a few of the components of the table type, lik...
Segregation of Duties (SoD)
Description The segregation of duties (SoD) is a fundamental element of internal controls, defined to prevent error and fraud. Segregation of duties ensure that at least two individuals are responsible for the separate parts of any task. For each user, the r...
CVE-2024-39669
Title Necessary checks were not applied to some Java objects. Affected Product Code Base Soffid Console - 3.5.38 Descripition Recently the Soffid IAM team detected and corrected a vulnerability that had been detected in the product's Console. This vulnera...
Self service portal examples
Introduction Here we will try to explain some user cases about different types of process to know how that processes work. That processes will be a basic user cases, but you will be able to define process as much complex as your business needs. For more info...
Sync server monitoring
Description Soffid provides a monitoring functionality to consult all the information of the different agents and the status of each one of them and the amount of tasks assigned. Consequently, it allows diagnosing possible incidents in a quick and easy way. ...
Sample scripts
Note that Soffid supports different scripting languages, you can configure it in the Smart engine settings screen. Additionally, in the initial configuration of the container, we can configure the SOFFID_TRUSTED_SCRIPTS environment variable to allow the use...
Access logs
Description The access log page allows querying all the information about the opened sessions. Note that any session that was active during the specified date will be shown, even when it started before of finished after that date. Screen overview Cust...
⏰ Getting started
What is Soffid Break glass? It refers to a mechanism that allows users to gain emergency access to critical systems or information under exceptional circumstances when normal access procedures are not viable. Break glass is a crucial component of security a...
How to install Federation in Soffid?
Installation Download Please download the Soffid Federation add-on. You could download it at the following link http://www.soffid.com/download/enterprise/ if you have a Soffid user with authorization, or in the following http://download.soffid.com/download/...
Digital certificates
Definition Soffid includes Digital certificate functionality as a security enhancement. You could add new Digital certificates, internal or external. If you select the external certificate, you could add a valid certificate to Soffid; If you select the intern...
How to copy Sync Server Kube Conf to Database table?
When you install soffid Sync server in kubernetes, a properties file is generated. If this file is not saved in a permanent storage, it could be lost during the Syns Server upgrade process. Here you are the steps to copy your Kube config to a data base table ...
How to enable Kerberos authentication
Step-by-step To enable the kerberos authentication method, the identity provider must have a keytab file that enables it to authenticate users. The steps to get it are described below: 1. First of all, you need to create a net user. You can use the old-fashi...
Profiles
Description A profile is a protocol or subset of protocols implemented by the Identity Provider. There are some accepted protocols, those allows a custom config dependent on the selected profile. The accepted protocols are the following: 1. OpenIDProfile 2...
ESSO Installation Windows (from 3.3.3-enterprise to 3.4.3-enterprise)
Introduction Soffid ESSO is a full Enterprise Single Sign on solution. Here you can find the details about the ESSO from 3.3.3-enterprise to 3.4.3-enterprise iversions nstallation. Supported platforms Soffid ESSO supports Windows XP or later workstations....
Support and configuration tools
Introduction KojiKabuto.exe, the main Soffid ESSO component, picks settings and rules automatically from Soffid synchronization server at login. This configuration can be updated by running the command "KojiKabuto update". Once run, new rules will apply to al...
Windows user access
How to access? When you try to connecto to a Windows machine by using Soffid ESSO, you need to enter your user and password in the Windows login page. If the user does not exists in this machine, depending on the attribute "Create local accounts when there ...
Linux User access
How to access? When you try to connect to a Linux machine using Soffid ESSO, you will need to enter your username and password on the Linux login page. If the user does not exists in this machine, depending on the attribute "Create local accounts when there ...