Set up CyberArk Identity
This topic provides an overview of how to quickly get started using CyberArk Identity.
The following work flow illustrates the steps required to add and authenticate your users, then authorize them to securely access relevant services.
The following work flow illustrates the steps required to add and authenticate your users, then authorize them to securely access CyberArk Identity features.