Advanced Search
Search Results
68 total results found
Step 6.4. Enable Task
To rotate the password it will be necessary to enable the task Expire untrusted passwords. The Expire untrusted passwords task is in charge to create a new password for the accounts: Critical accounts with the password type "Automatically generated", in ...
Step 7.2. Define XACML policy set to use a workflow
Step-by-step 1. To define policies, you must access the XACML Policy Management page in the following path: Main Menu > Administration > Configure Soffid > Security settings > XACML Policy Management 2. Once you have accessed the XACML Policy Management pag...
Step 8.3. Assign PAM policy
Assign PAM policy 1. To assign the PAM policy to a Password Vault folder, you must access the Password vault page in the following path: Main Menu > Administration > Resources > Password vault 2. Then you must select the folder by clicking on the record. S...
Step 8.2. PAM Policies
Step-by-step 1. To create a new PAM Policy, you must access the PAM Rules page in the following path: Main Menu > Administration > Configure Soffid > Security settings > PAM policies 2. To create a new PAM policy, you must click the add button (+) and Soff...
Step 1. Create network
The first step of the PAM implementation will be to create the network we want to scan to discover the hosts Step-by-step 1. First of all, you must access the networks page, the path to access is the following: Main Menu > Administration > Resources > Net...
Step 2. Configure network discovery
The second step will be to configure the network with the proper parameter to allow you to run the discovery process. Step-by-step 1. First of all, you must access the network discovery page in the following path: Main Menu > Administration > Configuratio...
PAM Policies
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that dictate how privileged access is granted, managed, and audited within an organization. Soffid allows you to define policies, those policies can be made up of sev...
Step 4.1. Add database (Optional)
The fourth step, to add a database, is an optional step. You only need to configure when there is any database (SQL Server or Oracle) in some of the discovered hosts and you want to manage its accounts as privileged or shared accounts. Step-by-step The net...
PAM Rules
Definition Soffid allows you to define rules to detect commands executed on a server. When a user launches a command defined on a rule, Soffid will detect it. To use those rules you need to define the PAM policies. For more information, you can visit the PAM...
Search in PAM recordings
Description Soffid provides the functionality that allows searching for information about the PAM recording sessions. That option is located on Main Menu > Administration > Monitoring and reporting > Search in PAM recordings First of all, to query the PAM r...
Step 6. Passwords rotation
Introduction The password rotation reduces the vulnerability to password-based attacks. Soffid allows you to limit the password lifespan and force you to change it. Soffid defines a procedure for Password rotation to keep safe the critical accounts. It allow...
Network discovery
Description The Network discovery tool will be in charge to scan the networks to find the hosts and retrieve information about user accounts. Network discovery can detect system accounts as well. First of all, you need to create the networks that you want to...