Advanced Search
Search Results
66 total results found
PAM
Privileged Account Management
PAM Policies
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that dictate how privileged access is granted, managed, and audited within an organization. Soffid allows you to define policies, those policies can be made up of sev...
Configure PAM session servers
Search in PAM recordings
Network discovery
Quick overview
Introduction Once the Jump servers have been installed, following the steps defined on the PAM Jump Server installation page, it will be mandatory to configure the jump servers on the Soffid Console, to do that you can visit the Configure PAM session servers ...
Configure PAM session servers
Definition Soffid provides the functionality that allows you to configure the Jump servers. That option is located on Main Menu > Administration > Configure Soffid > Security settings > Configure PAM session servers To configure that functionality is mandat...
PAM Rules
Definition Soffid allows you to define rules to detect commands executed on a server. When a user launches a command defined on a rule, Soffid will detect it. To use that rules you need to define the PAM policies. For more information, you can visit the PAM ...
Password vault
PAM Rules
Search in PAM recordings
Description Soffid provides the functionality that allows searching for information about the PAM recording sessions. That option is located on Main Menu > Administration > Monitoring and reporting > Search in PAM recordings First of all, to query the PAM r...
Network discovery
Description The Network discovery tool will be in charge to scan the networks to find the hosts and retrieve information about user accounts. Network discovery can detect system accounts as well. First of all, you need to create the networks that you want to...
Access logs
Sessions
Privileged accounts dashboard
Description Soffid provides a monitoring functionality to consult all the information about the different Jump servers installed and configured. The displayed info is the following: Jump server enabled accounts. High-privileged accounts. Jump server ses...
Privileged accounts dashboard
PAM Policies
Introduction
Why PAM? Privileged Account Management (from this point forward: PAM), allows you to manage accounts that are necessary to perform scheduled configuration and maintenance tasks, as well as supervening tasks such as the recovery of a hardware or software failu...
PAM Getting started
PAM Getting started
Step 4. Register additional resources (Optional)
PAM Install & config
PAM Jump Server installation and configuration
PAM Deployment
Procedure to deploy PAM
PAM Monitoring
Monitoring and reporting
PAM Implementation guide
PAM Implementation guide
FAQ
Frequently Asked Questions about Soffid
Configuration
Step 5. Account management
The account management step shows you how to manage the accounts to change the type, how to locate the accounts on the password vault and how to assign a password. To comply this step the discovery process must be completed.
PAM Jump Server Upgrade
Upgrade To upgrade PAM you will need to run two scripts, one for the store and the other for the launcher. Upgrade store To upgrade the storage container you can download and execute the following script: upgrade-store.sh ~/Downloads$ bash ./upgrade-store...
Step 6. Passwords rotation
The passwords rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it.
Step 7. Just in time privileges
Step 8. Behavior analysis
SSH gateway
RDP gateway
Password vault
Description Soffid provides a protected storage, to save and manage accounts for multiple applications, that is the Password vault. Here you can save the accounts and passwords to access to critical systems and to your applications as well. Password vault all...
Deployment procedure
Introduction PAM is the process that determines who has access to what types of information as it creates an integrated view of risk, threats, and controls. Implementing a policy of least privilege minimizes unnecessary privilege allocation to ensure access ...