Advanced Search
Search Results
58 total results found
Executed reports
Description At the Executed reports tab, Soffid displays all the reports previously executed. Soffid displays a list with the report name and the execution date. In addition, you could download the reports previously executed in XML, HTML, CSV or XLS format....
Scheduled reports
Description At the schedule reports tab you can schedule or run the report. The report must be defined in the report definition tab. First of all, you need to select the report you want to execute. Once the report was selected, then you will need to fill in ...
XACML Editor
Description Soffid Console provides a graphical interface, with a hierarchy structure, that allows the management of Policy Decision Points in a easy way. You can create new policy sets, policies, policy set references and policy references. To start you onl...
How to use OTP in Soffid
Introduction Soffid allows administrator users to config the access authentication with OTP as the second-factor authentication (2FA). This is the way to add a extra layer of protection used to ensure the security of online accounts beyond just a username and...
⏰ Getting Started
Introduction Soffid allows you to combine two of the most powerful addons you can use into Soffid Console, SCIM, and OTP. Please note that the SCIM REST Web Service Add-on installed must be installed, please check this part in How to use SCIM in Soffid # In...
⏰ Getting Started
Introduction Soffid allows you to combine two of the most powerful addons you can use into Soffid Console, SCIM, and Federation. Please note that the SCIM REST Web Service Add-on installed must be installed, please check this part in How to use SCIM in Soff...
Example Password Vault PEP
Password Vault Policy Enforcement Point Use case example 1 We want to define a policy to restrict access to the Soffid Password Vault. The users who are assigned to the SOFFID_ADMIN role (from this point forward: end-users) will have limitations to perform ...
OTP settings
Definition The OTP settings allow the administrator users to configure the available OPT options. Soffid provides four different OTP implementations. Main Menu > Administration > Configuration > Security settings > OTP settings Screen overview Standard...
SSH Gateway Docker Installation
Introduction Soffid allows you to deploy a new docker container with the ssh gateway. The configuration is similar to the sync server configuration, the main difference is the ssh container is listening in ssh. Prerequisites The SSH Service is only released...
SSH Gateway Docker Compose Installation
Introduction Soffid allows you to deploy a new docker container with the ssh gateway. The configuration is similar to the sync server configuration, the main difference is the ssh container is listening in ssh. Prerequisites The SSH Service is only released...
Policy Enforcement Point (PEP)
Description The PEP, Policy enforcement point, is a component of policy-based management, where enforce the policies. It is the component that serves as the gatekeeper to access a digital resource. The PEP gives the PDP, Policy Decision Point, the job of dec...
Policy Decision Point (PDP)
Definition The PDP, Policy Decision Point, is in charge of evaluating the defined rules. The Policy Decision Point is essentially a policy compiler. The PDP must verify that the specified rules are within the scope of the rule authors authority. The PDP provi...
XACML Rule combining algorithm
Definition The rule-combining algorithm defines a procedure for arriving at an authorization decision given the individual results of evaluation of a set of rules XACML rule combining algorithms is in charge to combine the decisions produced by different...
Rules
Description A rule is the most elementary unit of policy. It may exist in isolation only within one of the major actors of the XACML domain. In order to exchange rules between major actors, they must be encapsulated in a policy. A rule can be evaluated on t...
Expressions
Description The Expression signifies that an element that extends the ExpressionType and is a member of the Expression substitution group shall appear in its place. The Expression is not used directly in a policy. Expressions are elements that allow to...
Introduction to XACML
What is XACML? XACML "eXtensible Access Control Markup Language" is an open standard XML based language. The standard defines a declarative fine-grained, attribute-based access control policy language, an architecture, and a processing model describing how to...
Policy
Description A Policy represents a single access control policy, expressed through a set of Rules. Policy Combining Algorithm Target Variables Rules Obligations Screen overview Related objects Policy set Target Variables Rules Obligatio...
Policy set
Description A PolicySet is a container that can hold other Policies or PolicySets, as well as references to policies found in remote locations. Policy Combining Algorithm Target Obligations Every PolicySet contains a target and obligations, both c...
Target
Description Defines to which access requests a policy or rule applies. In XACML all the attributes are categorized into four main categories: Subjects Resources Actions Environments A target can contains more than one subject, environment, resource...
Network discovery
Description The Network discovery tool will be in charge to scan the networks to find the hosts and retrieve information about user accounts. Network discovery can detect system accounts as well. First of all, you need to create the networks that you want to...