Advanced Search
Search Results
60 total results found
⏰ Getting Started
Introduction Soffid allows you to combine two of the most powerful addons you can use into Soffid Console, SCIM, and Federation. Please note that the SCIM REST Web Service Add-on installed must be installed, please check this part in How to use SCIM in Soff...
Policy
Description A Policy represents a single access control policy, expressed through a set of Rules. Screen overview Related objects Policy set Target Variables Rules Obligations Standard attributes Policy set Identifier: identify the polic...
Expressions
Description The Expression signifies that an element that extends the ExpressionType and is a member of the Expression substitution group shall appear in its place. The Expression is not used directly in a policy. Related objects Variables Condition...
Example Password Vault PEP
Password Vault Policy Enforcement Point Use case example 1 We want to define a policy to restrict access to the Soffid Password Vault. The users who are assigned to the SOFFID_ADMIN role (from this point forward: end-users) will have limitations to perform ...
OTP settings
Definition The OTP settings allow the administrator users to configure the available OPT options. Soffid provides four different OTP implementations. Main Menu > Administration > Configuration > Security settings > OTP settings Screen overview Standard...
Introduction to Custom scripts
What is a Custom script? The Administration Addon provides the capacity to launch custom scripts to perform any functionality or process that the Soffid API has available. Additionally, with this addon, there is available the possibility to enable a special...
Password recovery configuration
Description Soffid provides you the functionality that allows to the users recover their passwords. To do that, the admin user, o a user with the proper roles, must config the the password recovery parameters. Screen Overview Custom attributes Enable e...
Network discovery
Description The Network discovery tool will be in charge to scan the networks to find the hosts and retrieve information about user accounts. Network discovery can detect system accounts as well. First of all, you need to create the networks that you want to...