C1 Academy
Your hub for identity mastery.

Advanced Attribute Matching with Super Directory
See how Super Directory’s advanced attribute mappings let you control exactly how user attributes are sourced, prioritized, and customized across your apps.

Authorization in Modern Applications: SCIM Falls Short
See why SCIM can’t handle fine-grained authorization and how C1 connectors close visibility and control gaps.

Automations in C1
Discover how C1’s automation engine helps you detect risks, trigger reviews, and take action instantly, all without writing code.

Avoiding Common Identity Implementation Mistakes
Rich Manfredi outlines the most common mistakes that derail IAM and IGA implementations, from lack of executive buy-in to big-bang rollouts, and explains how to avoid costly delays and rework.

Build vs. Buy for IGA
Rich Manfredi breaks down the build versus buy decision for identity governance solutions in an LLM-driven world, explaining why building your own IGA with AI may seem fast and inexpensive but often creates long-term risk.

C1 Connectors: Connect Every App
Learn how C1’s connector ecosystem makes it effortless to integrate any application into your identity security workflows, whether it’s SaaS, on-prem, or custom-built.

Complete Visibility Starts with Connectors
Learn why directly connecting to applications via connectors is essential for full visibility and control over identity and access.

Connectors at C1: Bringing Together Cloud and On-Prem Systems
Learn how C1’s connectors power secure access management by integrating with both cloud and on-prem systems without compromising visibility, control, or user experience.

Custom Connectors with C1
Learn how C1’s custom connectors simplify integrations with a no-code, YAML-based approach so you can bring any application under management fast.

Hosted vs. On-Prem Connectors
Learn the differences between hosted and on-prem connectors in C1 and when to use each for secure, reliable identity syncs.

How C1 Policies Work
See how C1’s hierarchical policies bring automation, flexibility, and intelligence to access reviews and approvals.

How C1 Manages Access Within Applications
Learn how to simplify complex, app-specific authorization models into a unified framework for managing identity and access across your environment.

How Dynamic Access Works
See how C1 brings automation and intelligence to access management by dynamically granting and revoking access based on real-time user context.

How On-Prem Connectors Work
Discover how C1 securely connects to on-prem systems like Active Directory and SQL databases without opening your firewall.

How to Set Up AWS with A Modern Identity Solution
Learn how to simplify AWS access management with C1 to eliminate group sprawl, reduce complexity, and apply scalable, policy-based control.

Human vs. Non-Human Identities
Understand how human and non-human identities differ, and why AI agents and tools are dramatically increasing the identity footprint you need to secure.

Identity is the Unlock for the Agentic Enterprise
Alex Bovee explains why identity becomes the foundational control layer in the agentic enterprise, where humans manage fleets of AI agents that interact directly with cloud services, infrastructure, and corporate data.

Incremental Sync Explained
Learn how incremental sync brings identity and access changes into C1 faster.

Justified vs. Unjustified Access
Harika explains the difference between justified and unjustified access in C1, and what happens when “Revoke Unjustified Access” is enabled within an access profile’s enrollment settings.

PAM vs. Modern IGA
Learn the differences between PAM and IGA, including how they complement each other and why integrating both can deliver stronger, more efficient privileged access management.

Protecting On-Prem Applications
Learn how to govern legacy, on-prem, and custom business applications without modern APIs using C1 and Baton SQL.

RBAC vs. ABAC: What’s the Difference?
Learn the key differences between role-based access control (RBAC) and attribute-based access control (ABAC).

SAML. vs. SCIM
Understand the difference between SAML and SCIM and how they work together to authenticate users and provision access.

Security vs. Compliance
Learn why being compliant doesn’t always mean being secure and how focusing on security outcomes naturally drives compliance.

Simplifying Integrations with the HTTP Connector
See how C1’s HTTP Connector makes integrating any API fast, flexible, and completely no-code.

Separation of Duties in C1: How Access Conflicts Work
See how C1 detects, blocks, and escalates access conflicts using Separation of Duties controls.

Super Directory 101: Custom Attributes and Profile Types
Learn how Super Directory uses custom attributes and profile types to enrich identity data, automate decisions, and improve auditability.

Super Directory Attribute Matchings
Learn how Super Directory’s attribute matchings help map app users to C1 users accurately, even when emails or identifiers don’t line up out of the box.

The Agentic Enterprise
Alex Bovee explains the shift from the traditional cloud-enabled workforce to the agentic enterprise, where humans no longer perform most knowledge work themselves but instead orchestrate fleets of AI agents that operate on their behalf.

The AI Identity Problem
Learn how AI agents are driving an unprecedented identity explosion and why governance systems must adapt to scale.

The C1 Data Model
Learn how C1’s flexible data model mirrors complex app authorization structures by organizing resources, entitlements, and grants into nested, hierarchical trees.

Types of AI Agents
Understand the three main AI agent types and how each impacts identity security, access control, and enterprise risk.

User Access Reviews (UARS): Why Modern Tools Matter
See how C1 transforms user access reviews by automating data collection, streamlining certifications, and remediating access instantly.

Virtual Apps and Entitlements
Explore how C1’s virtual apps and entitlements simplify access management by abstracting complexity and bundling permissions for end users.

What is JML?
Learn what joiner-mover-leaver (JML) means in the context of identity governance and why managing the identity lifecycle is more complex than it seems.

What is Least Privilege?
Learn how just-in-time access, reviews, and automation enforce least privilege, reducing risk from unnecessary and accumulated permissions.

Why IAM, PAM, and IGA Fail in the Agentic Enterprise
Alex Bovee explains why the legacy identity stack, IAM, PAM, and IGA, was designed for human users and cannot effectively secure AI agents operating in the agentic enterprise.

Why Terraform Matters for Identity Security
Learn how to use Terraform with C1 to automate key configurations, manage policies safely, and deploy applications at scale.

Why You Need IGA in Your Tech Stack
Learn why IGA is a critical part of modern security and how C1 simplifies access requests and removals with policy-based automation.