Set up CyberArk Identity

The following workflow illustrates the steps required to configure email delivery, add and authenticate your users, then create roles to securely access CyberArk Identity features.