Advanced Search
Search Results
440 total results found
Step 7. Just in time privileges
Introduction Once the discovery process has been run, the critical accounts have been detected and saved on the password vault, and the password rotation process has been defined, the next step would be to define the necessary approval process to manage the u...
Step 7.1. Define an approval workflow
Step-by-step 1. To define and configure an approval workflow, you can use the Soffid BPM editor. You must access the BPM editor page in the following path: Main Menu > Administration > Configure Soffid > Workflow settings > BPM editor 2. To add a new workfl...
Step 7.3. Configure XACML PEP
Step-by-step 1. To configure the XACML PEP You must access the "XACML PEP configuration" page in the following path: Main Menu > Administration > Configure Soffid > Security settings > XACML PEP configuration 2. At the "XACML PEP configuration page you mus...
Step 8. Behavior analysis
Introduction Using PAM you can configure policies and rules in the Soffid console to detect actions or behaviors that may put your organization at risk. With this information, you will be able to analyze the behavior of the critical accounts that you have def...
Step 8.1. PAM Rules
Step-by-step 1. To create a new PAM Rule, you must access the PAM Rules page in the following path: Main Menu > Administration > Configure Soffid > Security settings > PAM rules 2. To add a new PAM rule, you must click the add button (+) and Soffid will di...
Quick overview
Introduction Once the Jump servers have been installed, following the steps defined on the PAM Jump Server installation page, it will be mandatory to configure the jump servers on the Soffid Console, to do that you can visit the Configure PAM session servers ...
Introduction
Why PAM? Privileged Account Management (from this point forward: PAM), allows you to manage accounts that are necessary to perform scheduled configuration and maintenance tasks, as well as supervening tasks such as the recovery of a hardware or software failu...
PAM videos
How works on-screen Keyboard
RDP Gateway Connection
Introduction We can establish a connection to the target system using the RDP remote access protocol. You can use a remote desktop client. How to connect You can establish the connection with the ssh gateway using a desktop client and then Soffid will ask ...
Deployment procedure
Introduction PAM is the process that determines who has access to what types of information as it creates an integrated view of risk, threats, and controls. Implementing a policy of least privilege minimizes unnecessary privilege allocation to ensure access ...
User backup configure
Description Soffid allows you to configure some backup parameters. Go to In the "User backup configure & restore" page, in the hamburger button click the option "Configure backup". Screen overview Custom attributes Minimum delay between backups Numbe...
Initialize database using Docker
The purpose of this tutorial is to show how to initialize a database MariaDB required for Soffid IAM installation using Docker. Prerequisites 1. Install docker ( https://docs.docker.com/install/ ) 2. Create a docker network, that network allows you to conne...
Recertification campaigns
Description Soffid allows you to define new campaigns to review the users' access rights and to assign who has to recertify or revoke their entitlements. You can create a campaign related to a previously defined recertification policy. Depending on the polic...
Console log
Description That option allows you to look up server logs from the console. The logs are created on the server filesystem. Screen Overview Actions Download Allows you to download the log file
Sessions
Description The sessions page displays the current open sessions made with ESSO, WSSO or PAM for which the user is the owner. This functionality allows the owner users, with appropriate privileges, to open and view online a session opened by another user. I...
Scheduled tasks
Description Schedule tasks display all the automatic tasks defined on Soffid, the scheduling of each task, and information about the last execution. Also, allows administrator users to update the execution of that tasks using a cron pattern and init the execu...
🔎 Overview
Introduction The Soffid 3 reference guide wants to present all the functionality contained in version 3 of the Soffid Console, explaining the functionality of all the screens and the functionality of each of them. The documentation is organized as the option...
Network discovery
SCIM Connector
Introduction Description SCIM connector can manage every target system with a published API that allows the SCIM protocol for communication. SCIM is basically a REST JSON web service with specific HTTP requests and responses, and also a specific JSON format...
Radius Example
Service Provider