2.0 Mapping Roles

The following sections provide instructions for mapping connected system authorizations to Identity Vault roles.