Deploying PrivX involves the following steps:
Onboard users. Define roles for granting access privileges (Chapter 6).
Set up passwordless authentication methods for target hosts (Chapter 7).
Use PrivX to connect to target hosts (Chapter 8).
To prevent having to reconfigure hosts later, we strongly recommend you set up the necessary roles in your environment before configuring authentication methods on target hosts.