Set up CyberArk Identity

This topic provides an overview of how to quickly get started using CyberArk Identity.

The following work flow illustrates the steps required to add and authenticate your users, then authorize them to securely access CyberArk Identity features.