Advanced Search
Search Results
75 total results found
Step 4.1. Add database (Optional)
The fourth step, to add a database, is an optional step. You only need to configure when there is any database (SQL Server or Oracle) in some of the discovered hosts and you want to manage its accounts as privileged or shared accounts. Step-by-step The net...
Search in PAM recordings
Description Soffid provides the functionality that allows searching for information about the PAM recording sessions. That option is located on Main Menu > Administration > Monitoring and reporting > Search in PAM recordings First of all, to query the PAM r...
Step 6. Passwords rotation
Introduction The password rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it. Soffid defines a procedure for Password rotation to keep safe the critical accounts. It allow...
Password vault
Description Soffid provides a protected storage, to save and manage accounts for multiple applications, that is the Password vault. Here you can save the accounts and passwords to access to critical systems and to your applications as well. Password vault all...
PAM Jump Server Upgrade
Upgrade To upgrade PAM you will need to run two scripts, one for the store and the other for the launcher. Upgrade store To upgrade the storage container you can download and execute the following script: upgrade-store.sh ~/Downloads$ bash ./upgrade-store...
PAM Policies
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that dictate how privileged access is granted, managed, and audited within an organization. Soffid allows you to define policies, those policies can be made up of sev...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Docker compose, to use critical resources without knowing the password required. Jump Server A jump server, jump host or jump box is a system on a network used to a...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Kubernetes, to use critical resources without knowing the password required. Jump Server A jump server, jump host or jump box is a system on a network used to acces...
PAM Jump Server Installation
The purpose of this tutorial is to show how to install Jump servers and configure PAM using Dockers, to use critical resources without knowing the password required. Jump Server A jump server, jump host or jump box is a system on a network used to access a...
SSH Gateway Connection
Introduction We can establish a connection to the target system using the SSH remote access protocol. How to connect 1 You can establish the connection with the ssh gateway and then Soffid will ask your password and the target system parameters to connect: ...
SSH Gateway Docker Installation
Introduction Soffid allows you to deploy a new docker container with the ssh gateway. The configuration is similar to the sync server configuration, the main difference is the ssh container is listening in ssh. Prerequisites The SSH Service is only released...
SSH Gateway Docker Compose Installation
Introduction Soffid allows you to deploy a new docker container with the ssh gateway. The configuration is similar to the sync server configuration, the main difference is the ssh container is listening in ssh. Prerequisites The SSH Service is only released...
RDP Gateway Docker Installation
Introduction Soffid allows you to deploy a new docker container with the RDP gateway. The configuration is similar to the sync server configuration. Prerequisites The RDP Service is only released as a docker service. 1. Install docker ( https://docs.docker...
RDP Gateway Docker Compose Installation
Introduction Soffid allows you to deploy a new docker container with the RDP gateway. The configuration is similar to the sync server configuration. Prerequisites The RDP Service is only released as a docker service. 1. Install docker (https://docs.docker....
PAM Rules
Definition Soffid allows you to define rules to detect commands executed on a server. When a user launches a command defined on a rule, Soffid will detect it. To use those rules you need to define the PAM policies. For more information, you can visit the PAM...
Network discovery
Description The Network discovery tool will be in charge to scan the networks to find the hosts and retrieve information about user accounts. Network discovery can detect system accounts as well. First of all, you need to create the networks that you want to...