Advanced Search
Search Results
40 total results found
Configuration wizard
Configuration wizard
IGA
Identity Governance Administration
IRC
Identity Risk & Compliance
PAM
Privileged Access Management
AM
Access Management & SSO
Tools
SCIM for Federation
SCIM for Service Providers
TACACS+
Tacacs+
Clear redundant roles
Description A high level profile can contain or grant application permissions. On the other side, application permissions can contain or grant low level permissions. All of them are referred to generally as roles. Some users could have been granted both high...
Disable inactive users
Description Probably there are some users that do not need access to any information system. Using this tool you will be able to identify them and act upon them. The process is a two step process: Filter out the universe of users to analyze. Select the a...
Disable inactive accounts
Description Probably there are some accounts that are no longer used. Using this tool you will be able to identify them and act upon them. The process is a two step process: Filter out the universe of accounts to analyze. Select the actions to perform on...
⏰ Getting started
Introduction Soffid provides you a 360° perspective of the identities of your organization employees, providers and customers: Identity governance to manage the identities life-cycle Access management identifies your users accessing applications, includin...
Connect Soffid IdaaS to your on-premise network
Description In order to manage your information system, a component named Sync Server must be installed along with Soffid Console. You must choose one platform as your Sync Server Soffid host and follow the instructions. Once you have run the corresponding s...
Design user life cycle workflows
Description When you select the option "Design user life cycle workflows", Soffid will browse to the BPM Editor page, where you could define new workflows or import existing workflows from a file. For more information, you can visit the BPM Editor book. Scr...
Create SoD matrix
Description The segregation of duties (SoD) is a fundamental element of internal controls, defined to prevent error and fraud. Segregation of duties ensures that at least two individuals are responsible for the separate parts of any task. You can find additi...
Schedule weekly risk report
Description The wizard allows you to schedule a new Weekly risk report. It is a document that provides an overview of the potential risks. The information in this document is related to the rules defined in the SoD. For more information, you can visit the S...
Design a recertification campaign
Description The wizard allows you to create a new recertification campaign. To be able to do this, Soffid has created two recertification policies, All permissions and Critical permissions. For more information, you can visit the Recertification book. ...
Create advanced authorization rules
Description This wizard allows you to browse the XACML Policy Management page to create new policies to add more complex and restricted rules to the authorizations. For more information, you can visit the XACML page. Screen overview Screen o...
Discover your assets
Description Soffid allows you to configure the network discovery tool in a way to run the process to identify any asset present in your network. For more information, you can visit the Network discovery page. Step-by-step 1. Once you select the Discover yo...
Publish accounts in the password vault
Description This wizard allows you to publish some accounts in the password vault in order to save and manage these accounts and their password. For more information, you can visit the Password vault page. Step-by-step 1. Once you select the Public account...
Create monitoring and recording policies
Description PAM policy is a subset of cybersecurity policies that deal with privileged access. This determines which users can have privileged access to specific systems, when, and for how long. You can check the policies in the following menu option: Main M...
Create MFA policies
Description This wizard allows you to configure the access control rules for Soffid Console. By default, an OTP will be required to access to the Password vault or application menu. You can check the configuration in the following menu option: Main Menu > Ad...
Create identities (manually, CSV file, or authoritative source)
Create MFA policies
Description This wizard will help you to configure multi-factor authentication in order to expand security. This process requires users to provide two or more forms of identification before being granted access to a system or application. For more informatio...
Create adaptive authentication rules
Description Adaptive authentication rules are a set of security policies and mechanisms that adjust authentication requirements. These rules determine the strength of authentication required for each user, based on factors such as their location, device, past...
Configuration wizard
For more information, you can visit the Configuration wizard book For more information, you can visit the Configuration wizard book
Export settings and objects
Description Soffid has the functionality that allows you to export configuration, Soffid objects, and objects from target systems in a ZIP file. Every object or configuration will be downloaded into the ZIP in a binary file. This ZIP file could be imported i...
Import settings and objects
Description Soffid has the functionality that allows you to import configuration, Soffid objects, and objects from target systems from a ZIP file. This ZIP file must be generated by the export action from another Soffid tenant. For more information, you can...