Using Keyfactor Identity Provider

Once you have finished configuring Keyfactor Identity Provider, you’re ready to add roles, optional groups, users, and service accounts into it to be used for authentication to Keyfactor Command.

Note:  You can grant access to Keyfactor Command on a user-by-user basis rather than with roles, but the management overhead of this method is much greater. Keyfactor recommends using roles.