By default, C1 sends notifications fromDocumentation Index
Fetch the complete documentation index at: https://www.c1.ai/docs/llms.txt
Use this file to discover all available pages before exploring further.
no-reply@conductorone.com. You can instead send through your own AWS Simple Email Service (SES) account so recipients see your company’s domain as the sender.
This task requires the Super Admin role in C1 and permission to create IAM roles and verify identities in your AWS account.
C1 authenticates to your AWS account via IAM role assumption with an External ID — no access keys or secrets are shared with C1. You keep full control of the role and can revoke access at any time by deleting it.
Before you begin
Configure SPF, DKIM, and DMARC for your sending domain by following AWS SES’s recommended email authentication settings before proceeding.
- An AWS account with SES available in your target region.
- The ability to create IAM roles and policies in that account.
- A sending identity (email address or domain) you own and can verify.
Step 1: Verify a sending identity in SES
Before SES will send mail on your behalf, the sender address (or its domain) must be verified.Choose one:
- Domain (recommended): Enter your domain (for example,
yourcompany.com). SES displays three DKIM CNAME records. Publish all three at your DNS provider. - Email address: Enter the specific sender address. SES sends a verification link to that address — click it to verify.
Wait for the Identity status to become Verified. Domain verification can take up to 72 hours, though it’s usually much faster.
Step 2: Open C1 and copy your tenant’s External ID
C1 generates a unique External ID per tenant. This value is used in your IAM role’s trust policy so that only your C1 tenant can assume the role.
Leave the C1 edit form open — you’ll return to it in Step 4 to finish configuration.
Step 3: Create the IAM role
Create a role in your AWS account that C1 can assume to send mail.For Trusted entity type, select Custom trust policy and paste the following, replacing
YOUR_C1_EXTERNAL_ID with the value you copied in Step 2:On the role’s detail page, open the Permissions tab and click Add permissions > Create inline policy. Paste the following:
Step 4: Finish configuring the email provider in C1
Return to the Settings > Email provider edit form you left open in Step 2.Fill in the remaining fields:
- Sender name: The display name recipients see (for example, Governance Team).
- Sender email address: A verified SES identity, or an address on a verified domain from Step 1.
- Reply-to address: Usually the same as the sender address.
- IAM role ARN: The role ARN from Step 3.
- AWS region: The AWS region where your SES identity is verified (for example,
us-east-1). - Configuration set name (optional): An SES configuration set for tracking and metrics. Leave blank if you don’t use configuration sets.
sts:GetCallerIdentity against your role. If the role ARN, trust policy, or External ID is wrong, save fails with a clear error and your previous configuration is preserved.
Step 5: Verify
Send a test message to confirm C1 can send through SES and that your email authentication records are passing.Check your inbox. View the raw headers (in Gmail: ⋮ → Show original) and confirm SPF: PASS, DKIM: PASS with your domain as signer, DMARC: PASS.