Identity, examined.
Vendor profiles, comparisons, expert interviews, and practitioner guides — written by people who've actually shipped IAM, CIAM, PAM, IGA, and Zero Trust.
IAM User Experience Design Principles: Building Frictionless, Accessible Identity Systems
Design principles for creating identity and access management systems that users actually want to use—covering frictionless authentication, progressive profiling, self-service identity management, and accessibility.
- ArticleJul 1, 2026IAM Compliance Guide: Navigating GDPR, CCPA, and Global Privacy Regulations
How privacy regulations like GDPR and CCPA impact identity and access management programs, covering consent management, data subject rights, cross-border identity flows, and building privacy-compliant IAM architectures.
- ArticleJun 22, 2026Continuous Authentication Best Practices: Balancing Security and User Experience
A practical guide to implementing continuous authentication using behavioral biometrics, session risk scoring, and step-up authentication while maintaining a frictionless user experience.
- NewsJun 20, 2026The Future of Authentication: Beyond Passwords to Ambient, Continuous, and Invisible Identity
- ArticleJun 15, 2026Privileged Access Governance Framework: Policies, Monitoring, and Break-Glass Procedures
A comprehensive framework for governing privileged access, covering PAM policies, session monitoring strategies, credential vaulting best practices, break-glass procedures, and audit trail requirements.
- GuideJun 11, 2026Customer Identity Verification Guide: KYC, Document Verification, and Fraud Prevention
- NewsJun 8, 2026The IAM Skills Gap: Workforce Challenges, Salary Trends, and Strategies for 2026
- ArticleJun 6, 2026IAM for Mergers and Acquisitions: Identity Integration from Day 1 to Full Consolidation
A strategic guide to managing identity through M&A transactions, covering Day 1 access requirements, directory consolidation strategies, culture alignment challenges, and accelerated integration timelines.
- GuideJun 5, 2026IAM Audit Preparation Guide: SOX, SOC 2, and HIPAA Readiness
Vendors we'd actually recommend.
Scored against a published 30-capability matrix. Re-evaluated every 90 days.
Microsoft Entra ID
4.7/ 5Best for: Microsoft 365 and Azure-centric organizations
Read the profile →Okta
4.7/ 5Best for: Workforce SSO and lifecycle for mid-to-large enterprises
Read the profile →HashiCorp Vault
4.7/ 5Best for: Secrets management with dynamic credentials for cloud infrastructure
Read the profile →Identity is a community of practice.
Behind every identity system are the people who designed it, shipped it, broke it, and rebuilt it better. We document their work — and connect you to where the conversations are happening.
Weekly practitioner discussion.
When something material ships.
Channels by category.
r/StartWithIdentity
Find what you came for.
Occasional. Useful.
We send when something material ships — an annual report, a major vendor profile, a fresh interview. Maybe twice a month at peak. Often less.
SubscribeAuthored by people who've actually shipped identity at scale.
Every evaluation carries a date, an author, and a confidence level.
The capability matrix is open. You can see what we scored and how.
Anything that could shape a view is disclosed on the page.