Skip to content

Configuration overview

Once CyberArk has built your Zero Touch PKI instance, we provide you with an Account Admin user. You then configure the instance for user access and certificate issuance. This topic summarizes the configuration process.

About connectors

You must configure your instance before adding the connectors that install certificates in your live environment.

Tasks to complete

Whehn configuring Zero Touch PKI do the following:

  1. Add users to the instance by role.
  2. Add organizations based on your PKI use case.
  3. Attach certificate policies to organizations to define how certificates are issued.
  4. Test your instance by requesting a sample certificate.

Next steps

To get started, see About organizations and roles, which explains how access control works in Zero Touch PKI.