Advanced Search
Search Results
551 total results found
Design user life cycle workflows
Description When you select the option "Design user life cycle workflows", Soffid will browse to the BPM Editor page, where you could define new workflows or import existing workflows from a file. For more information, you can visit the BPM Editor book. Scr...
⏰ Getting started
Introduction Soffid provides you a 360° perspective of the identities of your organization employees, providers and customers: Identity governance to manage the identities life-cycle Access management identifies your users accessing applications, includin...
Create SoD matrix
Description The segregation of duties (SoD) is a fundamental element of internal controls, defined to prevent error and fraud. Segregation of duties ensures that at least two individuals are responsible for the separate parts of any task. You can find additi...
Schedule weekly risk report
Description The wizard allows you to schedule a new Weekly risk report. It is a document that provides an overview of the potential risks. The information in this document is related to the rules defined in the SoD. For more information, you can visit the S...
Design a recertification campaign
Description The wizard allows you to create a new recertification campaign. To be able to do this, Soffid has created two recertification policies, All permissions and Critical permissions. For more information, you can visit the Recertification book. ...
Create advanced authorization rules
Description This wizard allows you to browse the XACML Policy Management page to create new policies to add more complex and restricted rules to the authorizations. For more information, you can visit the XACML page. Screen overview Screen o...
Discover your assets
Description Soffid allows you to configure the network discovery tool in a way to run the process to identify any asset present in your network. For more information, you can visit the Network discovery page. Step-by-step 1. Once you select the Discover yo...
Publish accounts in the password vault
Description This wizard allows you to publish some accounts in the password vault in order to save and manage these accounts and their password. For more information, you can visit the Password vault page. Step-by-step 1. Once you select the Public account...
Create monitoring and recording policies
Description PAM policy is a subset of cybersecurity policies that deal with privileged access. This determines which users can have privileged access to specific systems, when, and for how long. You can check the policies in the following menu option: Main M...
Create MFA policies
Description This wizard allows you to configure the access control rules for Soffid Console. By default, an OTP will be required to access to the Password vault or application menu. You can check the configuration in the following menu option: Main Menu > Ad...
Create identities (manually, CSV file, or authoritative source)
Add applications
Description This wizard allows you to add a new Service Provider, that is, to configure an application that relies on an Identity Provider (IdP) to authenticate users and provide access to its services. To be able to add new applications (SP), you must insta...
Create MFA policies
Description This wizard will help you to configure multi-factor authentication in order to expand security. This process requires users to provide two or more forms of identification before being granted access to a system or application. For more informatio...
Create adaptive authentication rules
Description Adaptive authentication rules are a set of security policies and mechanisms that adjust authentication requirements. These rules determine the strength of authentication required for each user, based on factors such as their location, device, past...
Clear redundant roles
Description A high level profile can contain or grant application permissions. On the other side, application permissions can contain or grant low level permissions. All of them are referred to generally as roles. Some users could have been granted both high...
Disable inactive users
Description Probably there are some users that do not need access to any information system. Using this tool you will be able to identify them and act upon them. The process is a two step process: Filter out the universe of users to analyze. Select the a...
Disable inactive accounts
Description Probably there are some accounts that are no longer used. Using this tool you will be able to identify them and act upon them. The process is a two step process: Filter out the universe of accounts to analyze. Select the actions to perform on...
Export settings and objects
Description Soffid has the functionality that allows you to export configuration, Soffid objects, and objects from target systems in a ZIP file. Every object or configuration will be downloaded into the ZIP in a binary file. This ZIP file could be imported i...
Import settings and objects
Description Soffid has the functionality that allows you to import configuration, Soffid objects, and objects from target systems from a ZIP file. This ZIP file must be generated by the export action from another Soffid tenant. For more information, you can...
My certificates and FIDO tokens
Description My certificates and FIDO tokens are part of a Soffid Self-service portal that allows end-users to access their OTP devices configured. That option displays to each user, all their certificates and FIDO tokens and allows also to manage those and a...