Advanced Search
Search Results
68 total results found
PAM
Privileged Account Management
Step 6. Passwords rotation
Introduction The password rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it. Soffid defines a procedure for Password rotation to keep safe the critical accounts. It allow...
Password vault
Description Soffid provides a protected storage, to save and manage accounts for multiple applications, that is the Password vault. Here you can save the accounts and passwords to access to critical systems and to your applications as well. Password vault all...
Privileged accounts dashboard
Description Soffid provides a monitoring functionality to consult all the information about the different Jump servers installed and configured. The displayed info is the following: Jump server enabled accounts. High-privileged accounts. Jump server ses...
Access logs
Sessions
💻System Monitoring
Launcher Soffid allows you to check the status of the launcher by browsing an URL: Request https://<your-host>/launch/status For instance: http://demolab.soffid.pat.lab:8082/launch/status Response { "sessions":0, "status":"ok" } status → “ok” t...
General instructions
Introduction The purpose of this document is to provide the instructions to implement PAM using the Soffid console. This is a step-by-step implementation guide. Soffid is an information security product that provides a web console to manage privileged accou...
Step 7. Just in time privileges
Introduction Once the discovery process has been run, the critical accounts have been detected and saved on the password vault, and the password rotation process has been defined, the next step would be to define the necessary approval process to manage the u...
Privileged accounts dashboard
Step 7.1. Define an approval workflow
Step-by-step 1. To define and configure an approval workflow, you can use the Soffid BPM editor. You must access the BPM editor page in the following path: Main Menu > Administration > Configure Soffid > Workflow settings > BPM editor 2. To add a new workfl...
Step 7.3. Configure XACML PEP
Step-by-step 1. To configure the XACML PEP You must access the "XACML PEP configuration" page in the following path: Main Menu > Administration > Configure Soffid > Security settings > XACML PEP configuration 2. At the "XACML PEP configuration page you mus...
Step 8. Behavior analysis
Introduction Using PAM you can configure policies and rules in the Soffid console to detect actions or behaviors that may put your organization at risk. With this information, you will be able to analyze the behavior of the critical accounts that you have def...
Step 8.1. PAM Rules
Step-by-step 1. To create a new PAM Rule, you must access the PAM Rules page in the following path: Main Menu > Administration > Configure Soffid > Security settings > PAM rules 2. To add a new PAM rule, you must click the add button (+) and Soffid will di...
Quick overview
Introduction Once the Jump servers have been installed, following the steps defined on the PAM Jump Server installation page, it will be mandatory to configure the jump servers on the Soffid Console, to do that you can visit the Configure PAM session servers ...
Introduction
Why PAM? Privileged Account Management (from this point forward: PAM), allows you to manage accounts that are necessary to perform scheduled configuration and maintenance tasks, as well as supervening tasks such as the recovery of a hardware or software failu...
Search in PAM recordings
PAM Policies
PAM Getting started
PAM Getting started
Step 4. Register additional resources (Optional)
PAM Install & config
PAM Jump Server installation and configuration
PAM Deployment
Procedure to deploy PAM
PAM Monitoring
Monitoring and reporting
PAM Implementation guide
PAM Implementation guide
FAQ
Frequently Asked Questions about Soffid
Configuration
Step 5. Account management
The account management step shows you how to manage the accounts to change the type, how to locate the accounts on the password vault and how to assign a password. To comply this step the discovery process must be completed.
PAM Rules
Step 6. Passwords rotation
The passwords rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it.
Step 7. Just in time privileges
Step 8. Behavior analysis
SSH gateway
RDP gateway
Step 3. Launch network discovery
Configure PAM session servers
PAM videos
How works on-screen Keyboard