Deploying PrivX involves the following steps:
Onboard users (Getting Started with PrivX)
Define roles for granting access privileges (PrivX Users and Permissions).
Set up passwordless authentication methods for target hosts (Authentication Methods for Host Connections).
Use PrivX to connect to target hosts (Establishing and Managing Connections).
Record Sessions and Audit Events (Auditing)
To prevent having to reconfigure hosts later, we strongly recommend you set up the necessary roles in your environment before configuring authentication methods on target hosts.