Skip to content
On-demand recording | SAP IdM End of Life: Migration Without Disruption | With Deloitte · 60 min Watch recording
Resources

Blog

Technical insights, migration guides, and architecture deep-dives from the EmpowerNow team.

All ARIAArchitectureComplianceAuthorizationAuthZENIGAOAuth VaultSAP Migration
ARIA April 11, 2026 12 min read

We Shipped Open-Source Adapters for Microsoft's Agent Governance Toolkit. Here's Why.

Two pip install commands connect any AGT-governed agent to enterprise-grade runtime execution control — with cryptographic proof, budget enforcement, and standards-based identity. No code changes required.

Read more →
Architecture April 11, 2026 14 min read

Runtime Execution Control Has Two Layers. Most Vendors Only Sell You One.

In-process guardrails help developers build agents that try to behave well. Infrastructure-level enforcement proves agents did behave well. Production deployments need both — and it's critical to understand the difference before you buy.

Read more →
Compliance April 11, 2026 15 min read

Your AI Agent Audit Trail Is Probably Just a Log File. Here's Why That Won't Survive a Regulator.

The EU AI Act enforcement date is August 2, 2026. Article 53 requires transparency. Article 14 requires human oversight records. Annex IV requires detailed record-keeping. Structured logs don't satisfy any of these. Cryptographic receipts do.

Read more →
Authorization April 3, 2026 8 min read

Why We Built Our PDP as the Identity Fabric Brain

Enterprise authorization has a fragmentation problem most vendors ignore. We built one PDP as the single decision engine for the entire identity fabric — application access, IGA governance, token decisions, and AI agent control.

Read more →
AuthZEN April 3, 2026 7 min read

Constraints and Obligations: What Comes After Allow/Deny

Binary allow/deny was designed for a human-centric world. AI agents need spend caps, egress allowlists, PII redaction, and audit obligations — all riding in AuthZEN's standard context field.

Read more →
Architecture April 3, 2026 10 min read

One PDP, Five Enforcement Points: How We Authorize Humans, APIs, and AI Agents

A single user journey touches browser UIs, REST APIs, agent tool calls, workflow connectors, and token issuance. Five enforcement surfaces, one PDP, one audit trail.

Read more →
IGA April 3, 2026 10 min read

IGA Rules as Authorization Policies: Why Your Governance Engine Should Be Your PDP

Separation of duties, birthright provisioning, temporal guardrails — these aren't GRC concerns living in a separate engine. They're authorization policies evaluated at provisioning AND runtime.

Read more →
ARIA April 2, 2026 10 min read

MCP Is the Interface. Governance Is the Product.

The Model Context Protocol is winning. Microsoft, Amazon, Anthropic — every major AI platform now speaks MCP. This is good news for interoperability. It is a governance problem hiding in plain sight.

Read more →
OAuth Vault April 2, 2026 9 min read

The Hidden Security Flaw in "Just Put the Token in a Vault"

HashiCorp Vault encrypts secrets at rest. It does not prevent the application from having the secret after retrieval. That distinction is the difference between credential storage and credential non-exposure.

Read more →
ARIA April 2, 2026 10 min read

Runtime Control for AI Agents Fails the Moment Identity Disappears

OWASP LLM-08 is called "Excessive Agency." Read the description carefully and you'll notice: it's not a model safety problem. It's an identity and authorization problem.

Read more →
SAP Migration March 31, 2026 8 min read

SAP IdM 8.0 End-of-Life: What to Do Now

December 2027 sounds far away — until you realize migration takes 18–36 months. Here's the timeline, the options, and a realistic migration path that doesn't require big-bang.

Read more →

See it in action

Walk through a live demo on your environment — SAP connectors, runtime authorization, and cryptographic proof chain.

Request a Demo