Advanced Search
Search Results
514 total results found
Mail Domains
Description The mail domains identify each single mail domain that is going to be managed. If a mail domain is marked as obsolete, it won't be assigned to a user anymore. Custom attributes Code: domain, it will be as in email address is written. Descript...
Mail List
Description The mail lists identify addresses that are going to be delivered to one or more users, just as distribution mail lists do. Standard attributes Name: identifier name of the mail list. Mail domain: an existing domain in the system. It is a pred...
Privileged accounts dashboard
Search in PAM recordings
Column Selector
Description Throughout the Soffid Console, we can find a large number of list-type components. These lists are used to display the corresponding objects data in each case, for instance users, accounts, ... This component allows you to add or remove columns, ...
Download CSV file & Import
Download CSV file Soffid allows you to download all data objects displayed in tables in a CSV file. You can access to Download CSV file option through the hamburger icon from most of the components of the table type. Import Soffid allows you to upload a ...
AD Integration flows - Update user
Update Introduction Soffid provides a workflow to modify and/or delete a user in the final system. In it, we can see each of the steps of which this process is composed. Diagram Step by Step In this document, we will explain the process that Soffid p...
AD Integration flows - Update account
Update Introduction Soffid provides a workflow to modify and/or delete an account in the final system. In it, we can see each of the steps of which this process is composed. Diagram Step by Step In this document, we will explain the process that Soff...
Attribute mappings examples
Attributes When you are configuring an agent, depending on the connector type, it will be able to define some attributes. The attributes depend on the object that you are configuring, and the objects depend on the connector type. Get the value of an attribut...
Outgoing triggers examples
Attribute mapping triggers When you are configuring an agent and defining the attribute mappings of connectors, depending on the connector type, it will be able to define BeanShell scripts that will be triggered when data is loaded into the target system, out...
Triggers: Script Tips
Triggers: Script Tips Here we will show you some tips about how to use scripts. For more information you can visit the official documentation of Soffid Write into a sync-server log System.out.println("what you want......"); Recover data from a Soffid obje...
Look & feel
Definition Soffid's Look & feel page allows you to adjust the Console styles to your organization. In this configuration page, the customization of three sections is allowed: You can change the colors of the Soffid components and text. You can change the...
User Type
Description User type is the way to categorize users and allows configuring different password policies. Those policies can be more or less restrictive depending on the user's risk. For instance, internal users (automatically created) are different from exter...
User backup configure & restore
Privileged accounts dashboard
Description Soffid provides a monitoring functionality to consult all the information about the different Jump servers installed and configured. The displayed info is the following: Jump server enabled accounts. High-privileged accounts. Jump server ses...
Access logs
Sessions
💻System Monitoring
Launcher Soffid allows you to check the status of the launcher by browsing an URL: Request https://<your-host>/launch/status For instance: http://demolab.soffid.pat.lab:8082/launch/status Response { "sessions":0, "status":"ok" } status → “ok” t...
General instructions
Introduction The purpose of this document is to provide the instructions to implement PAM using the Soffid console. This is a step-by-step implementation guide. Soffid is an information security product that provides a web console to manage privileged accou...
Step 7. Just in time privileges
Introduction Once the discovery process has been run, the critical accounts have been detected and saved on the password vault, and the password rotation process has been defined, the next step would be to define the necessary approval process to manage the u...