The following sections provide instructions for mapping managed system authorizations to Identity Vault roles.
Section 2.1, Loading Authorizations
Section 2.2, Mapping Authorizations to Roles
Section 2.3, Editing Mappings
Section 2.4, Removing Mappings