C1 Academy
Your hub for identity mastery.
Identity Foundations

How to Design RBAC
Rich Manfredi outlines the key considerations for designing a well-rounded RBAC program, including the difference between birthright and ad hoc roles and how to avoid common pitfalls like over-fragmentation.

Human vs. Non-Human Identities
Understand how human and non-human identities differ, and why AI agents and tools are dramatically increasing the identity footprint you need to secure.

PAM vs. Modern IGA
Learn the differences between PAM and IGA, including how they complement each other and why integrating both can deliver stronger, more efficient privileged access management.

RBAC vs. ABAC: What’s the Difference?
Learn the key differences between role-based access control (RBAC) and attribute-based access control (ABAC).

SAML. vs. SCIM
Understand the difference between SAML and SCIM and how they work together to authenticate users and provision access.

Security vs. Compliance
Learn why being compliant doesn’t always mean being secure and how focusing on security outcomes naturally drives compliance.

The Lifecycle of an RBAC Role
Rich Manfredi explains why an RBAC role should be treated as an ongoing program, not a one-time project, walking through the onboarding, maintenance, and offboarding phases of a role's lifecycle.

What is JML?
Learn what joiner-mover-leaver (JML) means in the context of identity governance and why managing the identity lifecycle is more complex than it seems.

What is Least Privilege?
Learn how just-in-time access, reviews, and automation enforce least privilege, reducing risk from unnecessary and accumulated permissions.