# Clarion Documentation ## Docs - [1Password](https://docs.clarion.cantina.xyz/integrations/1password.md): Connect 1Password to Clarion to monitor audit events, sign-in attempts, and item usage events from your 1Password Business account. - [Apex](https://docs.clarion.cantina.xyz/integrations/apex.md): Connect Apex to Clarion to ingest security findings from your repositories and code scanning workflows. - [AWS](https://docs.clarion.cantina.xyz/integrations/aws.md): Connect your AWS account to Clarion for CloudTrail events, CloudWatch alarms, GuardDuty findings, and IAM agent tools. - [Cloudflare](https://docs.clarion.cantina.xyz/integrations/cloudflare.md): Connect Cloudflare to Clarion for Cloudflare Notifications webhooks and optional API-powered DNS agent tools. - [CrowdStrike Falcon](https://docs.clarion.cantina.xyz/integrations/crowdstrike.md): Connect CrowdStrike Falcon to Clarion to poll detections and cases from your Falcon tenant and surface them as alerts. - [Generic Webhook](https://docs.clarion.cantina.xyz/integrations/generic-webhook.md): Send events from any service to Clarion via HTTP webhook for AI-powered triage and response. - [Google Workspace](https://docs.clarion.cantina.xyz/integrations/google-workspace.md): Connect Google Workspace Alert Center to Clarion for real-time security alert ingestion and AI-powered triage. - [Grafana](https://docs.clarion.cantina.xyz/integrations/grafana.md): Connect Grafana to Clarion to receive alerting notifications for AI-powered triage and response. - [Guardrail](https://docs.clarion.cantina.xyz/integrations/guardrail.md): Connect Guardrail to Clarion to receive Guard alerts for AI-powered triage and response. - [Hexagate](https://docs.clarion.cantina.xyz/integrations/hexagate.md): Connect Hexagate to Clarion to receive on-chain monitor alerts for AI-powered triage and response. - [Huntress](https://docs.clarion.cantina.xyz/integrations/huntress.md): Connect Huntress to Clarion for endpoint detection and response (EDR) data enrichment during alert triage. - [Hypernative](https://docs.clarion.cantina.xyz/integrations/hypernative.md): Connect Hypernative to Clarion for on-chain threat monitoring and AI-powered alert triage. - [Jira](https://docs.clarion.cantina.xyz/integrations/jira.md): Connect Jira Cloud to Clarion with an Atlassian service account so agents can create, look up, and search issues during triage. - [JumpCloud](https://docs.clarion.cantina.xyz/integrations/jumpcloud.md): Connect JumpCloud to Clarion to ingest directory and identity events via Insights Rule webhooks and enable agent-driven investigation and response using a JumpCloud service account. - [Linear](https://docs.clarion.cantina.xyz/integrations/linear.md): Connect Linear to Clarion so agents can create issues authored by the Clarion app, not by a person on your team. - [Microsoft Entra ID](https://docs.clarion.cantina.xyz/integrations/microsoft-entra.md): Connect Microsoft Entra ID (Azure AD) to Clarion to enforce enterprise single sign-on for your organization. - [Okta](https://docs.clarion.cantina.xyz/integrations/okta.md): Clarion is a security operations platform that helps teams detect, investigate, and respond to identity and access threats. Install the Clarion Okta app from the Okta Integration Network to connect your Okta org to Clarion. - [Tenderly](https://docs.clarion.cantina.xyz/integrations/tenderly.md): Connect Tenderly to Clarion to receive smart contract monitoring alerts for AI-powered triage and response. - [Welcome to Clarion](https://docs.clarion.cantina.xyz/introduction.md) - [Creating agents](https://docs.clarion.cantina.xyz/learn/agents/creating-agents.md): Build an agent from a template, customize its skills and monitors, and put it into production. - [Introduction](https://docs.clarion.cantina.xyz/learn/agents/introduction.md): Learn how agents triage alerts, investigate incidents, and execute response actions in your security stack. - [Monitors](https://docs.clarion.cantina.xyz/learn/agents/monitors.md): Configure the alert sources your agents listen to: webhooks, polling integrations, and active checks. - [Introduction](https://docs.clarion.cantina.xyz/learn/alerts/introduction.md): Learn how alerts are created, deduplicated, and triaged across all your connected integrations. - [Introduction](https://docs.clarion.cantina.xyz/learn/incidents/introduction.md): Learn how to manage incidents, the consolidated security events that track response from discovery to closure. - [Introduction](https://docs.clarion.cantina.xyz/learn/introduction.md): An overview of how Clarion's core concepts fit together, from incoming events to incidents to response. - [Introduction](https://docs.clarion.cantina.xyz/learn/notifications/introduction.md): Stay in the loop and respond when an agent needs your input across Slack, Teams, SMS, email, and more. - [Introduction](https://docs.clarion.cantina.xyz/learn/settings/introduction.md): Configure your workspace, manage members and access, and customize how your team works in Clarion. - [Members](https://docs.clarion.cantina.xyz/learn/settings/members.md): Invite teammates, set communication preferences, and manage workspace access. - [SSO](https://docs.clarion.cantina.xyz/learn/settings/sso.md): Enforce single sign-on through Microsoft Entra ID for centralized identity and access. - [Workspace](https://docs.clarion.cantina.xyz/learn/settings/workspace.md): Name your workspace and customize agent system prompts. - [Introduction](https://docs.clarion.cantina.xyz/learn/skills/introduction.md): Reusable playbooks that teach agents how to handle specific classes of tasks to a known standard. - [Introduction](https://docs.clarion.cantina.xyz/learn/tasks/introduction.md): Track follow-up work, agent improvements, and operational actions across your team. - [Introduction](https://docs.clarion.cantina.xyz/learn/tools/introduction.md): The integrations agents use to take action: send messages, change DNS, file tickets, and more.