Advanced Search
Search Results
240 total results found
CAS (Central Authentication Service)
Introduction The CAS protocol is a simple and powerful ticket-based protocol. It involves one or many clients and one server. Clients are embedded in CASified applications (called “CAS services”) whereas the CAS server is a standalone component. The Cas ...
CAS architecture
Introduction The CAS is a Single Sign On protocol for the web. This protocol allows users to access multiple applications by providing their credentials. The response will be a JSON or XML Single Log-in The single log-in is usually initiated by the appl...
OpenID-Connect example
Identity Provider Service Provider
CAS Example
Service Provider
Radius (Remote Authentication Dial-In User Service)
Introduction The Radius protocol (Remote Authentication Dial-In User Service) is a networking protocol that authorizes and authenticates users who access a remote network. https://es.wikipedia.org/wiki/RADIUS
Radius
Definition Networking protocol that authorizes and authenticates users who access a remote network. Screen overview Standard attributes Class: class name (readOnly field). Enabled: if it is checked (selected option is Yes) that protocol will be enable...
CAS
Definition Cas protocol is rarely used. Screen overview Standard attributes Class: class name (readOnly field). Enabled: if it is checked (the selected option is Yes) that protocol will be enabled.
User backup restore
Description On the User backup configure & restore page, you could search, check and restore the user's snapshots. Main Menu > Administration > Configuration > Global Settings > User backup configure & restore Screen overview Custom attributes User Na...
How to perform unsolicited login
Soffid Identity Provider supports unsolicited login (Idp initiated login) profile. In order to enable it, you must be sure that federation metadata for the target service provider allows it. It is configured using the AuthnRequestsSigned attribute of the SPS...
My OTP devices
⏰ Getting Started
SCIM OTP devices examples
SCIM OTP devices Workflows examples
SAML architecture
Introduction SAML is the most complete, secure, and mature solution to get identity federation. SAML defines three main kinds of servers: Federation metadata server. Publishes information about the federation members, its protocols, and capabilities. Any f...
OpenID-Connect architecture
Introduction OpenID is based on the well known protocol. It is easier to implement and deploy, as it does not require digital signature or encryption. The drawback is that it is significantly less secure. For example, the single logout protocol is not finish...
User management
Description The user management process type is used to define business processes to create and update identities and their attributes. You can use the default template included on Soffid BPM Editor and customize it with your business needs. Also, you can im...
Permissions management
Description The permissions management process type is used to define processes used to create, update and remove permissions and account to identities. You can use the default template included on Soffid BPM Editor and customize it with your business needs....
Account reservation
Description The account reservation process type is used to configure the use of privileges accounts. That type of process will be launched when the end-users want to connect to a system using a privileged account through the password vault. Soffid allows yo...
Permission request
Description The permission request process type is used to define business processes to request permissions. That process is defined by default with 4 steps, but you can add new, delete and update steps to customize your business process. Start Approve ...
Delegation Roles
Description The delegation roles process type is used to allow the users to delegate temporary their own permissions. That process is defined by default with 3 steps, but you can add new, delete and update steps to customize your business process. Start...