Advanced Search
Search Results
23 total results found
Configuration wizard
Configuration wizard
IGA
Identity Governance Administration
IRC
Identity Risk & Compliance
PAM
Privileged Access Management
AM
Access Management & SSO
⏰ Getting started
Introduction Soffid provides you a 360° perspective of the identities of your organization employees, providers and customers: Identity governance to manage the identities life-cycle Access management identifies your users accessing applications, includin...
Connect Soffid IdaaS to your on-premise network
Description In order to manage your information system, a component named Sync Server must be installed along with Soffid Console. You must choose one platform as your Sync Server Soffid host and follow the instructions. Once you have run the corresponding s...
Design user life cycle workflows
Description When you select the option "Design user life cycle workflows", Soffid will browse to the BPM Editor page, where you could define new workflows or import existing workflows from a file. For more information, you can visit the BPM Editor book. Scr...
Create SoD matrix
Description The segregation of duties (SoD) is a fundamental element of internal controls, defined to prevent error and fraud. Segregation of duties ensures that at least two individuals are responsible for the separate parts of any task. You can find additi...
Schedule weekly risk report
Description The wizard allows you to schedule a new Weekly risk report. It is a document that provides an overview of the potential risks. The information in this document is related to the rules defined in the SoD. For more information, you can visit the S...
Design a recertification campaign
Description The wizard allows you to create a new recertification campaign. To be able to do this, Soffid has created two recertification policies, All permissions and Critical permissions. For more information, you can visit the Recertification book. ...
Create advanced authorization rules
Description This wizard allows you to browse the XACML Policy Management page to create new policies to add more complex and restricted rules to the authorizations. For more information, you can visit the XACML page. Screen overview Screen o...
Discover your assets
Description Soffid allows you to configure the network discovery tool in a way to run the process to identify any asset present in your network. For more information, you can visit the Network discovery page. Step-by-step 1. Once you select the Discover yo...
Publish accounts in the password vault
Description This wizard allows you to publish some accounts in the password vault in order to save and manage these accounts and their password. For more information, you can visit the Password vault page. Step-by-step 1. Once you select the Public account...
Create monitoring and recording policies
Description PAM policy is a subset of cybersecurity policies that deal with privileged access. This determines which users can have privileged access to specific systems, when, and for how long. You can check the policies in the following menu option: Main M...
Create MFA policies
Description This wizard allows you to configure the access control rules for Soffid Console. By default, an OTP will be required to access to the Password vault or application menu. You can check the configuration in the following menu option: Main Menu > Ad...
Create identities (manually, CSV file, or authoritative source)
Create MFA policies
Description This wizard will help you to configure multi-factor authentication in order to expand security. This process requires users to provide two or more forms of identification before being granted access to a system or application. For more informatio...
Create adaptive authentication rules
Description Adaptive authentication rules are a set of security policies and mechanisms that adjust authentication requirements. These rules determine the strength of authentication required for each user, based on factors such as their location, device, past...
Configuration wizard
For more information, you can visit the Configuration wizard book For more information, you can visit the Configuration wizard book
Create identities (manually, CSV file or authoritative source)
Description You need to register the identities to manage and protect them. This wizard allows you to choose the easiest way to do it. Step-by-step 1. First, you must select one option to register the identities. Soffid allows you three options. 2. You m...
Add applications
Description The wizard allows you to add Applications or Information Systems to Soffid as well. The wizard allows you to choose from an application list. Once you choose one of them, you must fill in the required fields to connect to this application. Then th...
Add applications
Description This wizard allows you to add a new Service Provider, that is, to configure an application that relies on an Identity Provider (IdP) to authenticate users and provide access to its services. Step-by-step 1. Once you select the Add application op...