Defining role-based access for users and computers
By default, Centrify Authentication Service, Privilege Elevation Service, and Audit & Monitoring Service includes two roles—the listed role and the UNIX Login role—that are required for migration. This section discusses additional role-based controls you can define for better management of privileged access and authorized activity.
Note: If you have well-defined access rules and command privileges in sudoers configuration files, you can import those definitions and use them as the basis for creating custom roles in Access Manager. For information about importing sudoers files and converting the imported definitions into roles, see the Administrator’s Guide for Linux and UNIX.