{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreici3nukar56sk7mokhr4ua5wbvjcb7xlsyef62gzyd4ab37hrh52q",
    "uri": "at://did:plc:evwa3wgwmat3eowk6kwcfoog/app.bsky.feed.post/3milisgk32jo2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreifkflb5ifxtkfsgn65lzddnhncvgr245dpjhzfsvc6b3i3hjiymm4"
    },
    "mimeType": "image/webp",
    "size": 750906
  },
  "path": "/blog/natoma-1password-scale-enterprise-ai",
  "publishedAt": "2026-04-02T00:00:00.000Z",
  "site": "https://1password.com",
  "tags": [
    "Natoma",
    "Traditional IAM secures human access at login but doesn’t extend to the shared credentials, secrets, and service-level access paths AI agents operate within",
    "scale AI securely,",
    "Contact us"
  ],
  "textContent": "To support enterprise workflows like monitoring systems, triaging support tickets, and automating routine work, AI agents need access to the same sensitive systems employees use, including databases, APIs, SaaS tools, and internal infrastructure. However, many of these systems still rely on shared passwords, API keys, tokens, and other credential-based access paths that are difficult to manage and control.\n\nAs organizations put agents to work for new use cases and in new environments, IT and security teams need a better way to manage the credentials and secrets agents need, without embedding them in code, configuration files, and internal tools.\n\nTogether, Natoma and 1Password offer organizations a secure, scalable way to integrate AI agents into enterprise workflows where credentials are centrally managed, and agent access is governed across necessary tools and systems.\n\n## Where traditional access breaks down for agents\n\nTraditional IAM secures human access at login but doesn’t extend to the shared credentials, secrets, and service-level access paths AI agents operate within. Without a secure, centralized model, organizations can lose visibility into how sensitive access is being used, who or what is using it, and whether controls are being applied consistently over time.\n\nWhen secrets are embedded directly into code or agent configurations, they’re not governed at the point of use. Agents can invoke the same credential repeatedly across workflows, pass it through downstream tools, or continue using lingering access in ways that are difficult to scope, monitor, or revoke effectively.\n\n1Password helps close that gap by keeping credentials and secrets centrally managed and available for runtime retrieval. Natoma builds on that foundation by brokering and governing how agents exercise that access, so organizations can maintain control without embedding secrets directly into code or agent configurations.\n\n## A secure way to connect agents to enterprise systems with Natoma and 1Password\n\nNatoma and 1Password work together to secure how AI agents access enterprise systems. 1Password keeps credentials and secrets centrally managed. Natoma brokers and governs how agents use that access inside enterprise workflows.\n\nHere’s how it works:\n\n  1. A user connects their 1Password vault to Natoma\n\n  2. Credentials and secrets needed by agents remain stored in 1Password\n\n  3. When an agent needs access, Natoma retrieves the appropriate secret reference at runtime\n\n  4. Natoma brokers and governs the interaction between the agent and the target system\n\n\n\n\nThis eliminates the need to store credentials in code or configuration files, reducing secret sprawl. With sensitive access under centralized control, organizations get a more governable way to deploy AI agents and monitor access to sensitive enterprise systems.\n\n## Interoperable controls for growing access needs\n\nRavi Chinni, Global Head of IAM at S&P Global, highlights the value of interoperable solutions like Natoma and 1Password:\n\n> _What’s exciting about partnerships like this is their potential to strengthen the broader ecosystem, not just solve a single access challenge. As AI agents become more embedded in enterprise operations, organizations will need interoperable approaches that bring together credential protection, policy governance, and auditability across platforms.”_\n\nAs more teams adopt AI agents, the number of system connections grows quickly. Organizations can also define policies that control how agents interact with systems, such as:\n\n  * Allow read-only database access\n\n  * Block write operations\n\n  * Restrict access to sensitive tables\n\n  * Limit query rates\n\n  * Scope permissions by agent or user group\n\n\n\n\nThis gives teams a clear view of how agents interact with enterprise systems and a consistent way to govern access as adoption grows.\n\n## Enterprise-ready agent access\n\nTo scale AI securely, organizations need more than connectivity. They need a governed way to manage how agents access systems, use credentials, and interact with sensitive data.\n\nNatoma and 1Password provide that foundation by keeping credentials centrally managed in 1Password. They give organizations a way to operationalize and govern how agents use that access through Natoma.\n\nOrganizations can scale AI agent access with stronger control, better auditability, and fewer secrets scattered across the business.\n\n### Secure AI agent access\n\nContact us to see how Natoma and 1Password can help you securely connect AI agents to enterprise systems.\n\nContact us",
  "title": "Natoma and 1Password help enterprises scale AI securely with governed agent access"
}