Set up CyberArk Identity

The following work flow illustrates the steps required to add and authenticate your users, then authorize them to securely access CyberArk Identity features.