1Password Targets Okta and HashiCorp
1Password
This move turns 1Password from a vault for saved credentials into a control layer for how people and machines get access across a company. On the identity side, 1Password is pushing beyond password storage into SSO based access flows. On the developer side, Secrets Automation lets teams inject API keys, database credentials, and other secrets into apps, CI pipelines, and cloud infrastructure without hard coding them into software.
-
Okta’s core job is workforce login. It gives employees one sign in path into company apps. 1Password attacks the edge cases Okta misses, especially the long tail of apps and shared credentials that live outside formal SSO setups, and it has added Unlock with SSO and broader access products to move closer to identity infrastructure.
-
HashiCorp Vault’s core job is machine secrets. It stores credentials and hands them to applications at runtime. 1Password entered this lane with Secrets Automation in 2021, adding integrations with tools like Kubernetes, Terraform, and Ansible so engineering teams can pull secrets from 1Password into live systems instead of copying them by hand.
-
The business logic is simple. Password management alone is getting squeezed by Apple, Google, and browser built ins. By moving into identity, device security, and developer workflows, 1Password raises spend per customer and becomes harder to rip out. That is already showing up in the mix shift toward B2B, which reached 60% of revenue, up from 33% in 2019.
The next phase is a broader access platform where 1Password brokers logins for employees, manages shared credentials for teams, and delivers secrets to software and AI driven workflows. If execution holds, the company can grow from a seat based password tool into a much larger enterprise security layer that sits between users, devices, apps, and infrastructure.