Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

31 total results found

Step 2. Configure network discovery

PAM Implementation guide

The second step will be to configure the network with the proper parameter to allow you to run the discovery process. Step-by-step 1. First of all, you must access the network discovery page in the following path: Main Menu > Administration > Configuratio...

Soffid
3
PAM
PAM Implementation

Step 4.1. Add database (Optional)

PAM Implementation guide Step 4. Register additional resources (...

The fourth step, to add a database, is an optional step. You only need to configure when there is any database (SQL Server or Oracle) in some of the discovered hosts and you want to manage its accounts as privileged or shared accounts. Step-by-step The net...

Soffid
3
PAM
PAM Implementation

Step 6. Passwords rotation

PAM Implementation guide Step 6. Passwords rotation

Introduction The password rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it. Soffid defines a procedure for Password rotation to keep safe the critical accounts. It allow...

Soffid
3
PAM
PAM Implementation

Step 3.1. Launch network discovery

PAM Implementation guide Step 3. Launch network discovery

Then, the third step will be to launch the network discovery process. That is the process in charge to scan the network, getting the hosts information, and connecting to the hosts as well. Step-by-step 1. The discovery network task can be executed manually...

Soffid
3
PAM
PAM Implementation