Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

440 total results found

Step 7. Just in time privileges

PAM Implementation guide Step 7. Just in time privileges

Introduction Once the discovery process has been run, the critical accounts have been detected and saved on the password vault, and the password rotation process has been defined, the next step would be to define the necessary approval process to manage the u...

Soffid
3
PAM
PAM Implementation

Step 7.1. Define an approval workflow

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To define and configure an approval workflow, you can use the Soffid BPM editor. You must access the BPM editor page in the following path: Main Menu > Administration > Configure Soffid > Workflow settings > BPM editor 2. To add a new workfl...

Soffid
3
PAM
PAM Implementation

Step 7.3. Configure XACML PEP

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To configure the XACML PEP  You must access the "XACML PEP configuration" page in the following path: Main Menu > Administration > Configure Soffid > Security settings > XACML PEP configuration 2. At the "XACML PEP configuration page you mus...

Soffid
3
PAM
PAM Implementation

Step 8. Behavior analysis

PAM Implementation guide Step 8. Behavior analysis

Introduction Using PAM you can configure policies and rules in the Soffid console to detect actions or behaviors that may put your organization at risk. With this information, you will be able to analyze the behavior of the critical accounts that you have def...

Soffid
3
PAM
PAM Implementation

Step 8.1. PAM Rules

PAM Implementation guide Step 8. Behavior analysis

Step-by-step 1. To create a new PAM Rule, you must access the PAM Rules page in the following path: Main Menu > Administration > Configure Soffid > Security settings > PAM rules 2. To add a new PAM rule, you must click the add button (+) and Soffid will di...

Soffid
3
PAM
PAM Implementation

Quick overview

PAM Getting started

Introduction Once the Jump servers have been installed, following the steps defined on the PAM Jump Server installation page, it will be mandatory to configure the jump servers on the Soffid Console, to do that you can visit the Configure PAM session servers ...

Soffid
3
PAM
Getting started

Introduction

PAM Getting started

Why PAM? Privileged Account Management (from this point forward: PAM), allows you to manage accounts that are necessary to perform scheduled configuration and maintenance tasks, as well as supervening tasks such as the recovery of a hardware or software failu...

Soffid
3
PAM
Getting started

PAM videos

PAM Getting started

How works on-screen Keyboard

Soffid
3
PAM
Getting started

RDP Gateway Connection

PAM Install & config RDP gateway

Introduction We can establish a connection to the target system using the RDP remote access protocol. You can use a remote desktop client. How to connect  You can establish the connection with the ssh gateway using a desktop client and then Soffid will ask ...

Soffid
3
PAM
Install & config
RDP
gateway

Deployment procedure

PAM Deployment

Introduction PAM is the process that determines who has access to what types of information as it creates an integrated view of risk, threats, and controls. Implementing a policy of least privilege minimizes unnecessary privilege allocation to ensure access ...

Soffid
3
PAM
Deployment

User backup configure

Backup configure & restore User backup configure & restore

Description Soffid allows you to configure some backup parameters. Go to In the "User backup configure & restore" page, in the hamburger button click the option "Configure backup". Screen overview Custom attributes Minimum delay between backups Numbe...

Soffid
3
Addon
Backup

Initialize database using Docker

Installation Database initialization

The purpose of this tutorial is to show how to initialize a database MariaDB required for Soffid IAM installation using Docker. Prerequisites 1. Install docker ( https://docs.docker.com/install/ ) 2. Create a docker network, that network allows you to conne...

Soffid
3
Install
DataBase
Docker

Recertification campaigns

Recertification Recertification

Description Soffid allows you to define new campaigns to review the users' access rights and to assign who has to recertify or revoke their entitlements. You can create a campaign related to a previously defined recertification policy. Depending on the polic...

Addon
Recertification
Soffid
3

Console log

Soffid 3 reference guide Monitoring and reporting

Description That option allows you to look up server logs from the console. The logs are created on the server filesystem. Screen Overview Actions Download  Allows you to download the log file 

Soffid
3
Monitoring and reporting

Sessions

Soffid 3 reference guide Monitoring and reporting

Description The sessions page displays the current open sessions made with ESSO, WSSO or PAM for which the user is the owner.  This functionality allows the owner users, with appropriate privileges, to open and view online a session opened by another user. I...

Soffid
3
Monitoring and reporting

Scheduled tasks

Soffid 3 reference guide Monitoring and reporting

Description Schedule tasks display all the automatic tasks defined on Soffid, the scheduling of each task, and information about the last execution. Also, allows administrator users to update the execution of that tasks using a cron pattern and init the execu...

Soffid
3
Monitoring and reporting

🔎 Overview

Soffid 3 reference guide

Introduction The Soffid 3 reference guide wants to present all the functionality contained in version 3 of the Soffid Console, explaining the functionality of all the screens and the functionality of each of them. The documentation is organized as the option...

Soffid
3

Network discovery

Soffid 3 reference guide Integration Engine

Soffid
3
Integration Engine
PAM

SCIM Connector

Connectors SCIM Connector

Introduction Description SCIM connector can manage every target system with a published API that allows the SCIM protocol for communication. SCIM is basically a REST JSON web service with specific HTTP requests and responses, and also a specific JSON format...

Soffid
3
Connectors
SCIM

Radius Example

Federation Radius

Service Provider

Soffid
3
Addon
Federation
Radius