The following workflow illustrates the steps required to configure email delivery, add and authenticate your users, then create roles to securely access CyberArk Identity features.
In this topic: