ConductorOne is now C1

C1 Academy

Your hub for identity mastery.

Advanced Attribute Matching with Super Directory

Advanced Attribute Matching with Super Directory

See how Super Directory’s advanced attribute mappings let you control exactly how user attributes are sourced, prioritized, and customized across your apps.

Will Garrison3 min
Authorization in Modern Applications: SCIM Falls Short

Authorization in Modern Applications: SCIM Falls Short

See why SCIM can’t handle fine-grained authorization and how C1 connectors close visibility and control gaps.

Paul Querna2 min
Automations in C1

Automations in C1

Discover how C1’s automation engine helps you detect risks, trigger reviews, and take action instantly, all without writing code.

Ali Falahi3 min
Avoiding Common Identity Implementation Mistakes

Avoiding Common Identity Implementation Mistakes

Rich Manfredi outlines the most common mistakes that derail IAM and IGA implementations, from lack of executive buy-in to big-bang rollouts, and explains how to avoid costly delays and rework.

Rich Manfredi3 min
Build vs. Buy for IGA

Build vs. Buy for IGA

Rich Manfredi breaks down the build versus buy decision for identity governance solutions in an LLM-driven world, explaining why building your own IGA with AI may seem fast and inexpensive but often creates long-term risk.

Rich Manfredi2 min
C1 Connectors: Connect Every App

C1 Connectors: Connect Every App

Learn how C1’s connector ecosystem makes it effortless to integrate any application into your identity security workflows, whether it’s SaaS, on-prem, or custom-built.

Russell Haering4 min
Complete Visibility Starts with Connectors

Complete Visibility Starts with Connectors

Learn why directly connecting to applications via connectors is essential for full visibility and control over identity and access.

Alex Bovee2 min
Connectors at C1: Bringing Together Cloud and On-Prem Systems

Connectors at C1: Bringing Together Cloud and On-Prem Systems

Learn how C1’s connectors power secure access management by integrating with both cloud and on-prem systems without compromising visibility, control, or user experience.

Paul Querna3 min
Custom Connectors with C1

Custom Connectors with C1

Learn how C1’s custom connectors simplify integrations with a no-code, YAML-based approach so you can bring any application under management fast.

Ali Falahi4 min
Hosted vs. On-Prem Connectors

Hosted vs. On-Prem Connectors

Learn the differences between hosted and on-prem connectors in C1 and when to use each for secure, reliable identity syncs.

Logan Saso3 min
How C1 Policies Work

How C1 Policies Work

See how C1’s hierarchical policies bring automation, flexibility, and intelligence to access reviews and approvals.

Ali Falahi3 min
How C1 Manages Access Within Applications

How C1 Manages Access Within Applications

Learn how to simplify complex, app-specific authorization models into a unified framework for managing identity and access across your environment.

Alex Bovee5 min
How Dynamic Access Works

How Dynamic Access Works

See how C1 brings automation and intelligence to access management by dynamically granting and revoking access based on real-time user context.

Charles Kramer2 min
How On-Prem Connectors Work

How On-Prem Connectors Work

Discover how C1 securely connects to on-prem systems like Active Directory and SQL databases without opening your firewall.

Charles Kramer2 min
How to Set Up AWS with A Modern Identity Solution

How to Set Up AWS with A Modern Identity Solution

Learn how to simplify AWS access management with C1 to eliminate group sprawl, reduce complexity, and apply scalable, policy-based control.

Alex Bovee5 min
Human vs. Non-Human Identities

Human vs. Non-Human Identities

Understand how human and non-human identities differ, and why AI agents and tools are dramatically increasing the identity footprint you need to secure.

Logan Saso2 min
Identity is the Unlock for the Agentic Enterprise

Identity is the Unlock for the Agentic Enterprise

Alex Bovee explains why identity becomes the foundational control layer in the agentic enterprise, where humans manage fleets of AI agents that interact directly with cloud services, infrastructure, and corporate data.

Alex Bovee2 min
Incremental Sync Explained

Incremental Sync Explained

Learn how incremental sync brings identity and access changes into C1 faster.

MJ Palanker2 min
Justified vs. Unjustified Access

Justified vs. Unjustified Access

Harika explains the difference between justified and unjustified access in C1, and what happens when “Revoke Unjustified Access” is enabled within an access profile’s enrollment settings.

Harika Vadipalli1 min
PAM vs. Modern IGA

PAM vs. Modern IGA

Learn the differences between PAM and IGA, including how they complement each other and why integrating both can deliver stronger, more efficient privileged access management.

Ali Falahi4 min
Protecting On-Prem Applications

Protecting On-Prem Applications

Learn how to govern legacy, on-prem, and custom business applications without modern APIs using C1 and Baton SQL.

Alex Bovee5 min
RBAC vs. ABAC: What’s the Difference?

RBAC vs. ABAC: What’s the Difference?

Learn the key differences between role-based access control (RBAC) and attribute-based access control (ABAC).

Paul Querna5 min
SAML. vs. SCIM

SAML. vs. SCIM

Understand the difference between SAML and SCIM and how they work together to authenticate users and provision access.

Logan Saso2 min
Security vs. Compliance

Security vs. Compliance

Learn why being compliant doesn’t always mean being secure and how focusing on security outcomes naturally drives compliance.

Ali Falahi4 min
Simplifying Integrations with the HTTP Connector

Simplifying Integrations with the HTTP Connector

See how C1’s HTTP Connector makes integrating any API fast, flexible, and completely no-code.

Ali Falahi4 min
Separation of Duties in C1: How Access Conflicts Work

Separation of Duties in C1: How Access Conflicts Work

See how C1 detects, blocks, and escalates access conflicts using Separation of Duties controls.

Gowthami Dommety4 min
Super Directory 101: Custom Attributes and Profile Types

Super Directory 101: Custom Attributes and Profile Types

Learn how Super Directory uses custom attributes and profile types to enrich identity data, automate decisions, and improve auditability.

Muhammad Kumail4 min
Super Directory Attribute Matchings

Super Directory Attribute Matchings

Learn how Super Directory’s attribute matchings help map app users to C1 users accurately, even when emails or identifiers don’t line up out of the box.

Will Garrison3 min
The Agentic Enterprise

The Agentic Enterprise

Alex Bovee explains the shift from the traditional cloud-enabled workforce to the agentic enterprise, where humans no longer perform most knowledge work themselves but instead orchestrate fleets of AI agents that operate on their behalf.

Alex Bovee2 min
The AI Identity Problem

The AI Identity Problem

Learn how AI agents are driving an unprecedented identity explosion and why governance systems must adapt to scale.

Paul Querna4 min
The C1 Data Model

The C1 Data Model

Learn how C1’s flexible data model mirrors complex app authorization structures by organizing resources, entitlements, and grants into nested, hierarchical trees.

Paul Querna2 min
Types of AI Agents

Types of AI Agents

Understand the three main AI agent types and how each impacts identity security, access control, and enterprise risk.

Paul Querna4 min
User Access Reviews (UARS): Why Modern Tools Matter

User Access Reviews (UARS): Why Modern Tools Matter

See how C1 transforms user access reviews by automating data collection, streamlining certifications, and remediating access instantly.

Charles Kramer3 min
Virtual Apps and Entitlements

Virtual Apps and Entitlements

Explore how C1’s virtual apps and entitlements simplify access management by abstracting complexity and bundling permissions for end users.

Ali Falahi4 min
What is JML?

What is JML?

Learn what joiner-mover-leaver (JML) means in the context of identity governance and why managing the identity lifecycle is more complex than it seems.

Paul Querna4 min
What is Least Privilege?

What is Least Privilege?

Learn how just-in-time access, reviews, and automation enforce least privilege, reducing risk from unnecessary and accumulated permissions.

Paul Querna8 min
Why IAM, PAM, and IGA Fail in the Agentic Enterprise

Why IAM, PAM, and IGA Fail in the Agentic Enterprise

Alex Bovee explains why the legacy identity stack, IAM, PAM, and IGA, was designed for human users and cannot effectively secure AI agents operating in the agentic enterprise.

Alex Bovee3 min
Why Terraform Matters for Identity Security

Why Terraform Matters for Identity Security

Learn how to use Terraform with C1 to automate key configurations, manage policies safely, and deploy applications at scale.

Charles Kramer4 min
Why You Need IGA in Your Tech Stack

Why You Need IGA in Your Tech Stack

Learn why IGA is a critical part of modern security and how C1 simplifies access requests and removals with policy-based automation.

Charles Kramer2 min