Configuration overview¶
Once CyberArk has built your Zero Touch PKI instance, we provide you with an Account Admin user. You then configure the instance for user access and certificate issuance. This topic summarizes the configuration process.
About connectors
You must configure your instance before adding the connectors that install certificates in your live environment.
Tasks to complete¶
Whehn configuring Zero Touch PKI do the following:
- Add users to the instance by role.
- Add organizations based on your PKI use case.
- Attach certificate policies to organizations to define how certificates are issued.
- Test your instance by requesting a sample certificate.
Next steps¶
To get started, see About organizations and roles, which explains how access control works in Zero Touch PKI.