Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

24 total results found

General instructions

PAM Implementation guide

Introduction The purpose of this document is to provide the instructions to implement PAM using the Soffid console. This is a step-by-step implementation guide.  Soffid is an information security product that provides a web console to manage privileged accou...

Soffid
3
PAM
PAM Implementation

Step 7. Just in time privileges

PAM Implementation guide Step 7. Just in time privileges

Introduction Once the discovery process has been run, the critical accounts have been detected and saved on the password vault, and the password rotation process has been defined, the next step would be to define the necessary approval process to manage the u...

Soffid
3
PAM
PAM Implementation

Step 7.1. Define an approval workflow

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To define and configure an approval workflow, you can use the Soffid BPM editor. You must access the BPM editor page in the following path: Main Menu > Administration > Configure Soffid > Workflow settings > BPM editor 2. To add a new workfl...

Soffid
3
PAM
PAM Implementation

Step 7.3. Configure XACML PEP

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To configure the XACML PEP  You must access the "XACML PEP configuration" page in the following path: Main Menu > Administration > Configure Soffid > Security settings > XACML PEP configuration 2. At the "XACML PEP configuration page you mus...

Soffid
3
PAM
PAM Implementation

Step 8. Behavior analysis

PAM Implementation guide Step 8. Behavior analysis

Introduction Using PAM you can configure policies and rules in the Soffid console to detect actions or behaviors that may put your organization at risk. With this information, you will be able to analyze the behavior of the critical accounts that you have def...

Soffid
3
PAM
PAM Implementation

Step 8.1. PAM Rules

PAM Implementation guide Step 8. Behavior analysis

Step-by-step 1. To create a new PAM Rule, you must access the PAM Rules page in the following path: Main Menu > Administration > Configure Soffid > Security settings > PAM rules 2. To add a new PAM rule, you must click the add button (+) and Soffid will di...

Soffid
3
PAM
PAM Implementation

Step 3.1. Launch network discovery

PAM Implementation guide Step 3. Launch network discovery

Then, the third step will be to launch the network discovery process. That is the process in charge to scan the network, getting the hosts information, and connecting to the hosts as well. Step-by-step 1. The discovery network task can be executed manually...

Soffid
3
PAM
PAM Implementation

Step 4.2. Create an agent (Optional)

PAM Implementation guide Step 4. Register additional resources (...

That step will be an optional step, and it will be mandatory only when the SQL Server agent or the Oracle agent was not created previously on Soffid Console and you need to add a database to manage its accounts. Step-by-step 1. First of all, to create an a...

Soffid
3
PAM
PAM Implementation
Addon

Step 4.3. Reconcile (Optional)

PAM Implementation guide Step 4. Register additional resources (...

To request the accounts you must launch the reconciliation process. The main purpose of reconciling process is to provide a mechanism to ensure that all users are aligned on the specific roles and responsibilities. Step-by-step 1. First of all, you need to...

Soffid
3
PAM
PAM Implementation
Addon

Step 5.1. Account management

PAM Implementation guide Step 5. Account management

  The account management step shows you how to manage the accounts to change the type, how to locate the accounts on the password vault, and how to assign a password. To comply with this step the discovery process must be completed. Step-by-step 1. To acces...

Soffid
3
PAM
PAM Implementation

Step 5.4. Assign the password

PAM Implementation guide Step 5. Account management

To be able to use an account, it is necessary to assign a password, this can be the current password or a new password. In the case of assigning a new password, it will be synchronized with the target system. Step-by-step 1. Once Soffid displays the accoun...

Soffid
3
PAM
PAM Implementation

Step 6.1. Create User type

PAM Implementation guide Step 6. Passwords rotation

How to create a new  User type. That will be mandatory to create a new Password policy. Step-by-step 1. First of all, you must access the User types page, the path to access is the following: Main Menu > Administration > Configure Soffid > Global Settings...

Soffid
3
PAM
PAM Implementation

Step 6.3. Assign password policy

PAM Implementation guide Step 6. Passwords rotation

You must assign a proper password policy to the critical accounts to keep them safe. Step-by-step 1. To access the accounts of a specific host or database (SQL Server or Oracle), you must click the "Accounts" button. The button is located close to the name...

PAM Implementation
Soffid
3
PAM

Step 5.2. Change account type

PAM Implementation guide Step 5. Account management

The Change account type step shows how to change the type from unmanaged to shared or privileged depending on the case.  Step-by-step 1. Once Soffid displays the account detail, you can change the Type (located on the Common attributes) to the proper type....

Soffid
3
PAM
PAM Implementation

Step 5.3. Publish on Password vault

PAM Implementation guide Step 5. Account management

When critical accounts are detected, the best way to keep them safe is to place them on the Password vault. The password vault allows you to handle the access control list to these accounts, here you can define who are the owners, the managers, and the SSO u...

Soffid
3
PAM
PAM Implementation

Step 6.2. Create Password policy

PAM Implementation guide Step 6. Passwords rotation

How to define a new password policy for the previous user type created. Step-by-step 1. First of all, you must access the Password policies page, the path to access is the following: Main Menu > Administration > Configure Soffid > Security settings > Pass...

Soffid
3
PAM
PAM Implementation

Step 6.4. Enable Task

PAM Implementation guide Step 6. Passwords rotation

To rotate the password it will be necessary to enable the task Expire untrusted passwords. The Expire untrusted passwords task is in charge to create a new password for the accounts: Critical accounts with the password type "Automatically generated", in ...

Soffid
3
PAM
PAM Implementation

Step 7.2. Define XACML policy set to use a workflow

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To define policies, you must access the XACML Policy Management page in the following path: Main Menu > Administration > Configure Soffid > Security settings > XACML Policy Management 2. Once you have accessed the XACML Policy Management pag...

Soffid
3
PAM
PAM Implementation

Step 8.3. Assign PAM policy

PAM Implementation guide Step 8. Behavior analysis

Assign PAM policy 1. To assign the PAM policy to a Password Vault folder, you must access the Password vault page in the following path: Main Menu > Administration > Resources > Password vault 2. Then you must select the folder by clicking on the record. S...

Soffid
3
PAM
PAM Implementation

Step 8.2. PAM Policies

PAM Implementation guide Step 8. Behavior analysis

Step-by-step 1. To create a new PAM Policy, you must access the PAM Rules page in the following path: Main Menu > Administration > Configure Soffid > Security settings > PAM policies 2. To create a new PAM policy, you must click the add button (+) and Soff...

Soffid
3
PAM
PAM Implementation