2.0 Mapping Roles

The following sections provide instructions for mapping managed system authorizations to Identity Vault roles.