Advanced Search
Search Results
521 total results found
Groups
Description Groups are a convenient way to apply policies to a collection of users. Groups allow administrator users to specify permission for multiple users in a quick and easy way. Groups are managed in a hierarchical way. A user can belong to a group, and ...
Attribute sharing policies
Description After defining the attributes to publish, it’s required to write a policy that defines which attributes will be allowed to share with each service provider. Soffid allows you to define security rules that apply to any attribute that should be del...
Attribute definition
Description The attribute definition page displays all the auto-generated user attributes. Those attributes will be the attributes to deliver from the identity providers to the service providers depending on the defined rules. Soffid has a default implementa...
Group Type
Description Companies are organized in different business units, departments or workgroups. In Soffid, they all are named as groups. These group can be categorized by a group type. Group types can be used in the definition of Holder Groups. Some roles can ...
Steps to configure
Steps to configure 1. Group type: Create at least one organizational unit with the role holder attribute active (yes). https://bookstack.soffid.com/books/soffid-3-reference-guide/page/group-type 2. Groups: Assign Groups to the organizational unit. Define ...
Audit
Description The audit trail page allows you to query for audit records. Each action done at the Soffid console will be reported. Here you have a list of common Advanced searches, you only have to copy, paste and search, e.g. // User changes trace calendar ...
Holder group login
Introduction In some organizations is necessary to assign roles that affect only a part of the structure, for instance, a department, a division or a country. A Holder Group can be defined as a collection of entities (referred to as "holders") that share simi...
Use cases
Premises 1. An Organizational Unit has been defined as Role holder Yes. 2. Several groups have been defined with type organizational unit with role holder Yes. 3. An attribute sharing policy has been defined. 4. Indicates which Service Providers will...
Active Directory back channel configuration
Introduction Active Directory Back Channel refers to a mechanism that allows Soffid to synchronize user information with an external Active Directory (AD) server in real-time or near real-time (Password synchronizer). This synchronization ensures that both So...
Networks
Description Operators can define the subnets that compose the internal network, in order to manage the IP address space. The main goal is to manage a limited resource as the IP address is. Soffid supports both static and dynamic IP assignments. Anyway, stati...
Add applications
Description This wizard allows you to add a new Service Provider, that is, to configure an application that relies on an Identity Provider (IdP) to authenticate users and provide access to its services. To be able to add new applications (SP), you must insta...
Create MFA policies
Description This wizard will help you to configure multi-factor authentication in order to expand security. This process requires users to provide two or more forms of identification before being granted access to a system or application. For more informatio...
Create adaptive authentication rules
Description Adaptive authentication rules are a set of security policies and mechanisms that adjust authentication requirements. These rules determine the strength of authentication required for each user, based on factors such as their location, device, past...
Authentication
Definition Soffid could use different kinds of external authentication sources. These mechanisms could be selectively enabled or disabled. Screen overview Standard attributes Global status Soffid server host name Enforce TLS connections t...
Windows Connector
Introduction Description This connector implements the LDAPS protocol and it is used to connect the Sync-Server with every server that allows this communication protocol. Managed System This connector has been performed to connect to the Active Directory s...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Kubernetes, to use critical resources without knowing the password required. Jump Server A jump server, jump host or jump box is a system on a network used to acces...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Dockers, to use critical resources without knowing the password required. Jump Server A jump server, jump host or jump box is a system on a network used to access a...
Delegation Roles
Description The Delegation Roles Process type is used to allow the users to delegate temporary their own permissions. That process is defined by default with 3 steps, but you can add new, delete and update steps to customize your business process. Start...
Permission request
Description The Permission Request Process type is used to define business processes to request permissions. That process is defined by default with 4 steps, but you can add new, delete and update steps to customize your business process. Start Approve ...
Account reservation
Description The Account Reservation Process type is used to configure the use of privileges accounts. That type of process will be launched when the end-users want to connect to a system using a privileged account through the password vault. Soffid allows yo...