Tell us about your organization to tailor the Access Control Policy.
Select the primary framework this policy must align with.
Define your identity and authentication requirements.
Configure remote access, account lifecycle, and review requirements.
Review your selections, then generate your Access Control Policy.