Advanced Search
Search Results
6 total results found
Step 4. Register additional resources (Optional)
PAM Implementation guide
Step 5. Account management
PAM Implementation guide
The account management step shows you how to manage the accounts to change the type, how to locate the accounts on the password vault and how to assign a password. To comply this step the discovery process must be completed.
Step 6. Passwords rotation
PAM Implementation guide
The passwords rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it.
Step 7. Just in time privileges
PAM Implementation guide
Step 8. Behavior analysis
PAM Implementation guide
Step 3. Launch network discovery
PAM Implementation guide