Advanced Search
Search Results
79 total results found
How to enable Kerberos authentication
Step-by-step To enable the kerberos authentication method, the identity provider must have a keytab file that enables it to authenticate users. The steps to get it are described below: 1. First of all, you need to create a net user. You can use the old-fashi...
Profiles
Description A profile is a protocol or subset of protocols implemented by the Identity Provider. There are some accepted protocols, those allows a custom config dependent on the selected profile. The accepted protocols are the following: 1. OpenIDProfile 2...
Condition for Adaptive authentication
Introduction Adaptive authentication is designed to improve the security of online accounts by adding an additional layer of protection against unauthorized access. When the authentication is being defined, Soffid allows you to add some adaptive authenticati...
Identity Provider
Description An identity provider (abbreviated IdP or IDP) is a system entity that creates, maintains, and manages identity information for principals and also provides authentication services to relying applications within a federation or distributed networ...
ESSO
Definition Here is an explanation about how to configure the ESSO profile by using Soffid as Identity Provider. Please note that the profile parameters will be automatically updated on the PCs. Screen overview Standard attributes Class: class name (...