Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

66 total results found

PAM

Privileged Account Management

Soffid
3
PAM

PAM Policies

PAM Deployment Configuration

Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that dictate how privileged access is granted, managed, and audited within an organization. Soffid allows you to define policies, those policies can be made up of sev...

Soffid
3
PAM
Deployment

Configure PAM session servers

Soffid 3 Reference guide Security settings

Soffid
3
Security settings
PAM

Search in PAM recordings

Soffid 3 Reference guide Monitoring and reporting

Soffid
3
Monitoring and reporting
PAM

Network discovery

Soffid 3 Reference guide Resources Management

Soffid
3
Resources Management
PAM

Quick overview

PAM Getting started

Introduction Once the Jump servers have been installed, following the steps defined on the PAM Jump Server installation page, it will be mandatory to configure the jump servers on the Soffid Console, to do that you can visit the Configure PAM session servers ...

Soffid
3
PAM
Getting started

Configure PAM session servers

PAM Install & config

Definition Soffid provides the functionality that allows you to configure the Jump servers. That option is located on Main Menu > Administration > Configure Soffid > Security settings > Configure PAM session servers To configure that functionality is mandat...

Soffid
3
PAM
Install & config

PAM Rules

PAM Deployment Configuration

Definition Soffid allows you to define rules to detect commands executed on a server. When a user launches a command defined on a rule, Soffid will detect it. To use that rules you need to define the PAM policies. For more information, you can visit the PAM ...

Soffid
3
PAM
Deployment

Password vault

PAM Deployment Configuration

Soffid 3
PAM
Deployment
Password vault

PAM Rules

Soffid 3 Reference guide Security settings

Soffid
3
Security settings
PAM

Search in PAM recordings

PAM Monitoring

Description Soffid provides the functionality that allows searching for information about the PAM recording sessions. That option is located on Main Menu > Administration > Monitoring and reporting > Search in PAM recordings First of all, to query the PAM r...

Soffid
3
PAM
PAM Monitoring

Network discovery

PAM Deployment Configuration

Description The Network discovery tool will be in charge to scan the networks to find the hosts and retrieve information about user accounts. Network discovery can detect system accounts as well. First of all, you need to create the networks that you want to...

Soffid 3
PAM
Deployment
Network discovery

Access logs

PAM Monitoring

Soffid
3
PAM
PAM Monitoring

Sessions

PAM Monitoring

Soffid
3
PAM
PAM Monitoring

Privileged accounts dashboard

PAM Monitoring

Description Soffid provides a monitoring functionality to consult all the information about the different Jump servers installed and configured. The displayed info is the following: Jump server enabled accounts. High-privileged accounts. Jump server ses...

Soffid
3
PAM
PAM Monitoring

Privileged accounts dashboard

Soffid 3 Reference guide Monitoring and reporting

Soffid
3
Monitoring and reporting
PAM

PAM Policies

Soffid 3 Reference guide Security settings

Soffid
3
Security settings
PAM

Introduction

PAM Getting started

Why PAM? Privileged Account Management (from this point forward: PAM), allows you to manage accounts that are necessary to perform scheduled configuration and maintenance tasks, as well as supervening tasks such as the recovery of a hardware or software failu...

Soffid
3
PAM
Getting started

PAM Getting started

PAM Getting started

Soffid
3
PAM
Getting started

Step 4. Register additional resources (Optional)

PAM Implementation guide

Soffid
3
PAM
PAM Implementation

PAM Install & config

PAM Jump Server installation and configuration

Soffid
3
PAM
Install & config

PAM Deployment

Procedure to deploy PAM

Soffid
3
PAM
Deployment

PAM Monitoring

Monitoring and reporting

Soffid
3
PAM
PAM Monitoring

PAM Implementation guide

PAM Implementation guide

Soffid
3
PAM
PAM Implementation

FAQ

Frequently Asked Questions about Soffid

Soffid
3
IAM
IAM Console
PAM
FAQ

Configuration

PAM Deployment

Soffid
3
PAM
Deployment

Step 5. Account management

PAM Implementation guide

The account management step shows you how to manage the accounts to change the type, how to locate the accounts on the password vault and how to assign a password. To comply this step the discovery process must be completed.

Soffid
3
PAM
PAM Implementation

PAM Jump Server Upgrade

PAM Install & config

Upgrade  To upgrade PAM you will need to run two scripts, one for the store and the other for the launcher. Upgrade store To upgrade the storage container you can download and execute the following script: upgrade-store.sh ~/Downloads$ bash ./upgrade-store...

Soffid
3
PAM
Install & config

Step 6. Passwords rotation

PAM Implementation guide

The passwords rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it.

Soffid
3
PAM
PAM Implementation

Step 7. Just in time privileges

PAM Implementation guide

Soffid
3
PAM
PAM Implementation

Step 8. Behavior analysis

PAM Implementation guide

Soffid
3
PAM
PAM Implementation

SSH gateway

PAM Install & config

Soffid
3
PAM
Install & config
SSH
gateway

RDP gateway

PAM Install & config

Soffid
3
PAM
Install & config
RDP
gateway

Password vault

Soffid 3 Reference guide Resources Management

Description Soffid provides a protected storage, to save and manage accounts for multiple applications, that is the Password vault. Here you can save the accounts and passwords to access to critical systems and to your applications as well. Password vault all...

Soffid
3
Resources Management
PAM
IAM

Deployment procedure

PAM Deployment

Introduction PAM is the process that determines who has access to what types of information as it creates an integrated view of risk, threats, and controls. Implementing a policy of least privilege minimizes unnecessary privilege allocation to ensure access ...

Soffid
3
PAM
Deployment