Advanced Search
Search Results
712 total results found
Disable inactive accounts
Description Probably there are some accounts that are no longer used. Using this tool you will be able to identify them and act upon them. The process is a two step process: Filter out the universe of accounts to analyze. Select the actions to perform on...
Export settings and objects
Description Soffid has the functionality that allows you to export configuration, Soffid objects, and objects from target systems in a ZIP file. Every object or configuration will be downloaded into the ZIP in a binary file. This ZIP file could be imported i...
Import settings and objects
Description Soffid has the functionality that allows you to import configuration, Soffid objects, and objects from target systems from a ZIP file. This ZIP file must be generated by the export action from another Soffid tenant. For more information, you can...
My certificates and FIDO tokens
Description My certificates and FIDO tokens are part of a Soffid Self-service portal that allows end-users to access their OTP devices configured. That option displays to each user, all their certificates and FIDO tokens and allows also to manage those and a...
SCIM Entity Group examples
Operations This page shows the functions that can be performed for the Entity Group object. List all Request GET http://<your-domain>/soffid/webservice/scim2/v1/EntityGroup Response 200 OK { "schemas": [ "urn:ietf:params:scim:api:messages:2...
SCIM Federation Members examples
Operations This page shows the functions that can be performed for the Federation Member object. List all Request GET http://<your-domain>/soffid/webservice/scim2/v1/FederationMember Response 200 OK { "schemas": [ "urn:ietf:params:scim:api:...
⏰ Getting Started
Introduction Soffid allows you to combine two of the most powerful addons you can use into Soffid Console, SCIM, and Federation. Please note that the SCIM REST Web Service Add-on installed must be installed, please check this part in How to use SCIM in Soff...
TACACS+ (The Terminal Access Controller Access-Control System Plus)
TACACS+ is a security protocol that provides centralized validation of users who are attempting to gain access to a router or other devices. TACACS+ is a protocol for AAA services: Authentication Authorization Accounting https://www.rfc-edi...
TACACS+ architecture
Introduction
TACACS+ Example
Service Provider Information Systems When a Tacacs Service Provider is created, Soffid creates an Information System There are some roles defined for this Information System (0: anonymous, 1: user, ....15: root)
SAML Example
Service Provider
Role mining
Introduction to Role mining
What is Role mining? Role mining is a process of analyzing user permissions and activities within an organization's information systems to identify common patterns of access and activity. The goal of role mining is to create roles or groups of users with simi...
How to install Role mining in Soffid
Installation Download Please download the Soffid Role mining add-on. You could download it at the following link http://www.soffid.com/download/enterprise/ if you have a Soffid user with authorization, or in the following http://download.soffid.com/download...
Role mining
Description Soffid’s role mining feature applies data mining technology to create business profiles based upon current application permissions in order to minimize the number of roles to be managed and maintained with the relevant cost saving. In this contex...
📢 To bear in mind
If you are working with Mozilla Firefox, it will be possible that this message will be displayed.To solve it, you must allow the pop-up windows
Cross-Origin Resource Sharing (CORS)
By default, for security reasons, the SCIM interface is published for any server application, but not for client-side (javascript) applications. In order to allow client-side applications to query or modify SCIM objects, the CORS protocol states how to define...
How to add to ESSO a second factor of authentication?
Introduction Soffid allows you to add a second factor of authentication by configuring a parameter in Soffid Console and the Second Factor Authentication (2FA). Step by step 1. First of all, you need to configure the addon.federation.essoidp parameter. The ...
Textual Index
Introduction A textual index is a data structure used in database systems to facilitate efficient search and retrieval of text-based information. It is designed to handle large volumes of textual data and provide quick access to relevant documents or records...
Operation
Operation The Lucene index information is stored in files arranged in a folder structure. This folder structure is replicated in every Soffid Console and every Sync Server and also is saved in the database. In case an instance (Docker, Kubernetes, or stand-a...