Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

68 total results found

Step 6.4. Enable Task

PAM Implementation guide Step 6. Passwords rotation

To rotate the password it will be necessary to enable the task Expire untrusted passwords. The Expire untrusted passwords task is in charge to create a new password for the accounts: Critical accounts with the password type "Automatically generated", in ...

Soffid
3
PAM
PAM Implementation

Step 7.2. Define XACML policy set to use a workflow

PAM Implementation guide Step 7. Just in time privileges

Step-by-step 1. To define policies, you must access the XACML Policy Management page in the following path: Main Menu > Administration > Configure Soffid > Security settings > XACML Policy Management 2. Once you have accessed the XACML Policy Management pag...

Soffid
3
PAM
PAM Implementation

Step 8.3. Assign PAM policy

PAM Implementation guide Step 8. Behavior analysis

Assign PAM policy 1. To assign the PAM policy to a Password Vault folder, you must access the Password vault page in the following path: Main Menu > Administration > Resources > Password vault 2. Then you must select the folder by clicking on the record. S...

Soffid
3
PAM
PAM Implementation

Step 8.2. PAM Policies

PAM Implementation guide Step 8. Behavior analysis

Step-by-step 1. To create a new PAM Policy, you must access the PAM Rules page in the following path: Main Menu > Administration > Configure Soffid > Security settings > PAM policies 2. To create a new PAM policy, you must click the add button (+) and Soff...

Soffid
3
PAM
PAM Implementation

Step 1. Create network

PAM Implementation guide

The first step of the PAM implementation will be to create the network we want to scan to discover the hosts Step-by-step 1. First of all, you must access the networks page, the path to access is the following: Main Menu > Administration > Resources > Net...

Soffid
3
PAM
PAM Implementation

Step 2. Configure network discovery

PAM Implementation guide

The second step will be to configure the network with the proper parameter to allow you to run the discovery process. Step-by-step 1. First of all, you must access the network discovery page in the following path: Main Menu > Administration > Configuratio...

Soffid
3
PAM
PAM Implementation

PAM Policies

PAM Deployment Configuration

Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that dictate how privileged access is granted, managed, and audited within an organization. Soffid allows you to define policies, those policies can be made up of sev...

Soffid
3
PAM
Deployment

Step 4.1. Add database (Optional)

PAM Implementation guide Step 4. Register additional resources (...

The fourth step, to add a database, is an optional step. You only need to configure when there is any database (SQL Server or Oracle) in some of the discovered hosts and you want to manage its accounts as privileged or shared accounts. Step-by-step The net...

Soffid
3
PAM
PAM Implementation

PAM Rules

PAM Deployment Configuration

Definition Soffid allows you to define rules to detect commands executed on a server. When a user launches a command defined on a rule, Soffid will detect it. To use those rules you need to define the PAM policies. For more information, you can visit the PAM...

Soffid
3
PAM
Deployment

Search in PAM recordings

PAM Monitoring

Description Soffid provides the functionality that allows searching for information about the PAM recording sessions. That option is located on Main Menu > Administration > Monitoring and reporting > Search in PAM recordings First of all, to query the PAM r...

Soffid
3
PAM
PAM Monitoring

Step 6. Passwords rotation

PAM Implementation guide Step 6. Passwords rotation

Introduction The password rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it. Soffid defines a procedure for Password rotation to keep safe the critical accounts. It allow...

Soffid
3
PAM
PAM Implementation

Network discovery

PAM Deployment Configuration

Description The Network discovery tool will be in charge to scan the networks to find the hosts and retrieve information about user accounts. Network discovery can detect system accounts as well. First of all, you need to create the networks that you want to...

Soffid 3
PAM
Deployment
Network discovery