Ship AI without shipping risk.

Blog

Insights on identity security, access governance, and modern IGA.

  • Extensible Identity Flows: How C1 Finally Made Joiner Provisioning Bend to Your Rules

    Extensible Identity Flows: How C1 Finally Made Joiner Provisioning Bend to Your Rules

    ·Ali Falahi
    Joiner flows accumulate business logic that outgrows whatever system tries to express it. Here's how C1's extensible identity flows and Functions let you describe exactly what your organization needs — without external scripts or an engineering team.
  • Introducing Secret Sharing in C1

    Introducing Secret Sharing in C1

    ·Will Bengtson
    Securely share credentials without Slack, vault sprawl, or risk. C1’s Secret Sharing encrypts secrets client-side, enforces access controls, and auto-expires links—simple, auditable, and built into identity governance.
  • Three Properties Identity Must Have in the Agentic Era

    Three Properties Identity Must Have in the Agentic Era

    ·Claire McKenna
    Identity governance was failing before AI agents arrived. With multiple agents per employee spawning their own, here's what infrastructure must look like to survive.
  • Your AI Strategy Has a Blind Spot

    Your AI Strategy Has a Blind Spot

    ·Claire McKenna
    AI governance isn't a new silo. It's an identity problem. See how identity-first governance makes every team AI-native without sacrificing control.
  • Access Management Needs a Conductor, Not More Instruments

    Access Management Needs a Conductor, Not More Instruments

    ·Kevin Paige
    Kevin Paige argues that enterprise identity's real problem isn't the tools -- it's the lack of orchestration. With AI agents multiplying and identity sprawl accelerating, access management needs a conductor, not more instruments.
  • Introducing Functions: Extend Identity Governance With Custom Code, Built Directly Into C1

    Introducing Functions: Extend Identity Governance With Custom Code, Built Directly Into C1

    ·Claire McKenna
    Extend identity governance with C1 Functions. Write and run custom TypeScript code securely to automate workflows, provisioning, and policy logic.
  • How RRCU Uses C1 Automations to Streamline Identity Operations

    How RRCU Uses C1 Automations to Streamline Identity Operations

    ·Claire McKenna
    Automate identity governance with C1 Automations. See how Red River Credit Union streamlined onboarding, offboarding, access reviews, and platform migrations using no-code workflows, AI optimization, and real-time identity data to reduce manual effort and improve security.
  • Your Enterprise Needs an Immune System, Not a Better Firewall

    Your Enterprise Needs an Immune System, Not a Better Firewall

    ·Kevin Paige
    Kevin Paige explores why identity and access management must evolve into a distributed “enterprise immune system” to govern AI agents, non-human identities, and continuous risk.
  • Why IAM, IGA, and PAM Break in the Agentic Enterprise

    Why IAM, IGA, and PAM Break in the Agentic Enterprise

    ·Alex Bovee
    Identity built for humans can’t govern autonomous AI. Learn why IAM, IGA, and PAM break in the agentic enterprise and what a modern identity control plane must look like.