Advanced Search
Search Results
40 total results found
TACACS+ (The Terminal Access Controller Access-Control System Plus)
TACACS+ is a security protocol that provides centralized validation of users who are attempting to gain access to a router or other devices. TACACS+ is a protocol for AAA services: Authentication Authorization Accounting https://www.rfc-edi...
TACACS+ Example
Service Provider Information Systems When a Tacacs Service Provider is created, Soffid creates an Information System There are some roles defined for this Information System (0: anonymous, 1: user, ....15: root)
How to install Role mining in Soffid
Installation Download Please download the Soffid Role mining add-on. You could download it at the following link http://www.soffid.com/download/enterprise/ if you have a Soffid user with authorization, or in the following http://download.soffid.com/download...
Role mining
Introduction to Role mining
What is Role mining? Role mining is a process of analyzing user permissions and activities within an organization's information systems to identify common patterns of access and activity. The goal of role mining is to create roles or groups of users with simi...
Create identities (manually, CSV file or authoritative source)
Description You need to register the identities to manage and protect them. This wizard allows you to choose the easiest way to do it. Step-by-step 1. First, you must select one option to register the identities. Soffid allows you three options. 2. You m...
Add applications
Description The wizard allows you to add Applications or Information Systems to Soffid as well. The wizard allows you to choose from an application list. Once you choose one of them, you must fill in the required fields to connect to this application. Then th...
TACACS+ architecture
Introduction
Role mining
Description Soffid’s role mining feature applies data mining technology to create business profiles based upon current application permissions in order to minimize the number of roles to be managed and maintained with the relevant cost saving. In this contex...
Add applications
Description This wizard allows you to add a new Service Provider, that is, to configure an application that relies on an Identity Provider (IdP) to authenticate users and provide access to its services. To be able to add new applications (SP), you must insta...
Create MFA policies
Description This wizard will help you to configure multi-factor authentication in order to expand security. This process requires users to provide two or more forms of identification before being granted access to a system or application. For more informatio...
Create adaptive authentication rules
Description Adaptive authentication rules are a set of security policies and mechanisms that adjust authentication requirements. These rules determine the strength of authentication required for each user, based on factors such as their location, device, past...