The following sections provide instructions for mapping connected system authorizations to Identity Vault roles.
Section 2.1, Loading Authorizations
Section 2.2, Mapping Authorizations to Roles
Section 2.3, Removing Mappings