Security planning

After you install IBM Verify Identity Governance, you must take more steps to plan how to grant and manage user access to resources.