<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.yeshid.com/old-pages/use-cases</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/old-pages/request-demo-old</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/support</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/privacy</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/about</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/careers</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/blog</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/old-pages/new-navbar</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/labs</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/old-pages/request-demo-calendly</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/old-pages/old-home-4</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/old-pages/pricing-old2</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/old-pages/old-home-3</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/okta-alternative</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/request-demo</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/integrations</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/resources-verified</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/solutions/identity-lifecycle-management</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/solutions/role-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/solutions/just-in-time-access</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/solutions/shadow-access-saas-visibility</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/solutions/app-self-service</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/solutions/identity-governance-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/solutions/rae-ai-for-iam</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/yeshid-product-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/3-identity-and-access-management-housekeeping-tasks-to-start-2024</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/3-reasons-to-ditch-the-access-management-spreadsheet-for-yeshid-access-grid</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/800</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/a-new-era-of-secure-it-identity-management-yeshid-soc-ii-and-you</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/a-non-technical-guide-how-to-streamline-employee-onboarding-in-yeshid</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/access-management-made-easy</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/agentic-ai-for-iam-built-for-trust</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/agentic-identity-monitoring-splits-immediately-once-you-ask-where-is-the-agent-actually-running</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/ai-for-iam-admins-stop-bolting-chat-onto-dashboards--build-a-real-colleague</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/balancing-saas-tools-with-security-through-an-employee-growth-spurt</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/boost-your-identity-security-4-ways-for-startups-to-elevate-their-security-game</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/buyers-remorse-in-identity-and-access-management-theres-no-silver-bullet</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/case-study-quivo-cut-onboarding-time-in-half</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/celebrate-world-password-day-while-you-still-can</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/centralized-iam-playbooks-the-key-to-solving-saas-app-access-management-chaos</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/choosing-the-right-identity-access-management-approach-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/connect-any-application-in-minutes-with-yeshids-upgraded-ssotax</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/day-2-securing-your-login-review-and-update-authentication-settings</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/day-3-securing-your-apps-review-and-restrict-settings-in-google-workspace-apps</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/day-4-standardize-on-chrome-and-adjusting-settings</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/day-5-securing-your-data-managing-and-monitoring-applications-access</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/death-to-the-sso-tax-why-modern-identity-leaves-saml-and-scim-behind</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/decentralized-verifiable-credentials-for-the-future-of-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/doing-more-with-less-and-364-saas-apps</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/drift-happens-the-problem-is-everyone-pretends-it-doesnt</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/easier-more-secure-employee-offboarding-for-small-businesses-with-yeshid</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/employee-offboarding-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/free-google-workspace-risk-assessment-tool</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/free-shadow-it-assessment-tool</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/free-tool-google-groups-should-not-be-a-mystery</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/from-zero-to-secure-in-5-minutes-the-fastest-way-to-deploy-yeshid</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/geek-speak-should-you-choose-saml</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/give-passwords-the-finger</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/got-an-hris-you-can-streamline-your-onboarding-flow-with-yeshid</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/guide-to-google-workspace-and-saas-management-organizational-units-groups-and-access-control</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/how-to-cut-costs-pass-compliance-and-secure-your-company-with-visibility</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/how-to-find-out-what-that-mysterious-oauth-app-is</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/how-to-meet-soc-2-access-review-requirements---a-startups-toolkit</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/how-to-prevent-uncontrolled-google-drive-sharing-and-protect-your-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/how-to-talk-to-your-cfo-about-identity-access-a-practical-budget-script</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/iam-or-saas-management-first</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/identity-access-management-stop-chasing-integrations-start-orchestrating</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/identity-architecture-for-the-modern-saas-stack</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/identity-geek-speak-id-tokens-what-are-they</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/identity-geek-speak-session-tokens-what-are-they</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/idps-only-govern-the-apps-they-touch-and-thats-not-enough</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/introducing-access-review-simplify-your-compliance-journey</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/introducing-application-workflows-real-world-automation-for-real-world-apps</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/introducing-rae-agentic-ai-built-for-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/it-and-security-from-the-start-ups</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/it-efficiency-through-playbooks</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/join-yeshids-beta-waitlist-and-see-how-easy-identity-management-can-be</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/joining-a-startup-in-a-recession</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/july-2025-release-note</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/june-2025-highlights-at-yeshid-faster-audits-easier-onboarding-seamless-integrations</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/lapsus-facebook-and-your-corporate-network</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/manage-application-access-without-ever-leaving-slack-8643f</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/may-2025-product-highlights-easier-smarter-and-more-collaborative-iam</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/microsoft-365-support-is-here</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/navigating-the-oauth-maze-in-smb-identity-management</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/new-from-yeshid-data-visualization-for-google-workspace-access</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/new-in-yeshid-hris-triggers-and-per-app-approvals</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/nist-just-opened-a-public-rfi-on-securing-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/non-technical-guide-how-to-streamline-employee-onboarding-in-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/november-2025-release-notes</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/oauth-oh-oh</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/october-2025-release-note</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/one-agent-to-run-iam-why-holistic-context-beats-a-fleet-of-siloed-bots</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/our-values</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/passkey-user-experience-two-steps-forward-one-step-back</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/rbac-isnt-dead-meet-rebac</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/release-note-december-2025</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/release-notes-for-january-25-2024</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/release-notes-for-may-2024</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/release-notes-for-november-28-2023</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/release-notes-janurary-2026</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/release-notes-october-2025</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/release-notes-smarter-workflows-faster-performance-and-enhanced-security-feb-20</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/review-by-role-a-smarter-way-to-run-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/right-sized-onboarding-and-offboarding-free-for-the-first-100-signups</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/scheduled-access----even-when-the-app-doesnt-support-it</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/should-you-trust-your-mobile-pin</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/simple-and-powerful-identity-and-access-management-the-somehow-still-unsolved-problem</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/simplify-soc-2-compliance-with-yeshid</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/start-the-new-year-on-the-right-foot-a-5-day-challenge-for-securing-your-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/starting-soc-2-without-the-burnout-a-practical-guide-for-lean-teams</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/starting-up-a-pain-the-saas</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/stepping-lightly-a-guide-to-avoiding-onboarding-and-offboarding-missteps</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/streamline-your-google-workspace-decentralize-admin-tasks-for-greater-efficiency-and-productivity</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/streamlining-employee-management-with-yeshid</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/streamlining-identity-access-management-for-dunder-mifflin</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-adventures-of-super-er-google-admin-reduce-your-attack-surface-for-free</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-ai-revolution-comes-to-iam-introducing-yeshai</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-automation-illusion-why-saas-vendors-make-it-life-harder</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-cost-of-doing-nothing</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-history-of-sso-and-why-its-time-for-a-change</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-identity-management-struggle-overpromised-underdelivered-and-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-linus-tech-tips-hack-don-t-be-next-follow-these-security-tips</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-modern-stack-or-just-the-messy-middle</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-real-priorities-of-an-identity-access-management-program</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-saas-discovery-buyers-guide-whats-relevant-whats-noise-and-whats-just-creepy</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/the-yeshid-kitchen-where-security-and-usability-meet</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/three-reasons-why-email-should-not-be-the-center-of-identity</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/tips-for-building-effective-iam-processes-at-your-startup</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/tips-on-improving-google-account-management-contractor-accounts-handling-2-step-verification-lock</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/tired-of-manual-user-list-headaches-try-appsync</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/tired-of-paying-the-subscription-cost-of-suspended-users-try-the-google-workspace-archived-user-license</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/uber-hack-self-service-identity-is-hard</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/unexpected-google-admins-hd-moore-chairman-founding-cto-at-runzero</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/unexpected-google-admins-sunil-dhaliwal-founder-general-partner-at-amplify-partners</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/unexpected-google-admins-tom-daly-ceo-of-big-network-former-co-founder-cto-dyn</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/we-hired-an-engineering-team-that-worked-together-and-this-happened</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/what-i-didnt-know-about-mfa--and-why-you-dont-need-sso-for-compliance</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/what-makes-iam-ai-native-a-definition-maturity-model-and-why-being-the-idp-matters</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/what-to-look-for-in-an-employee-onboarding-tool-for-small-businesses</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/when-the-business-bullies-security-it-and-wins</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/where-is-your-business-in-the-identity-automation-journey</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-are-we-giving-yeshid-onboard-away-for-free</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-identity-access-is-the-first-project-every-new-it-leader-should-tackle</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-itsm-isnt-iam-and-why-ai-ticketing-tools-dont-solve-access</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-modern-schools-need-visibility-control-and-simplicity</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-offboarding-ai-agents-is-harder-than-offboarding-employees</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-people-hate-roles-and-groups----and-how-were-doing-it-differently</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-scim-is-so-hard-to-set-up</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-use-yeshid-before-migrating-domains</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-we-built-demo-center</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/why-yeshid-is-better-than-okta-workflows</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-iam-platform-release-notes---february-2026</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-identity-management-beta-open</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-integrations-an-easier-way-to-manage-app-access-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-monthly-release-notes-august-2024</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-monthly-release-notes-december-2024</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-monthly-release-notes-november-2024</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-monthly-release-notes-october-2024</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-monthly-release-notes-september-2024</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-now-available-on-google-workspace-marketplace</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-product-update-november-12-2023</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-product-updates----august-2025</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-release-notes---march-2026</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshid-your-small-businesss-security-superhero</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshidsoc2-type-2-round-2</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/post/yeshlist</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/thank-you/get-a-demo</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/thank-you/support</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/products/access-requests</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/products/access-reviews</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/products/identity-access-management</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/products/saas-discovery-shadow-it</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/how-to-find-apps-that-were-never-added-to-okta</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/how-to-find-shadow-api-keys-and-service-accounts</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/how-to-manage-access-for-apps-that-dont-support-saml</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/how-to-offboard-a-service-account-or-ai-agent</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/lightweight-iam-for-small-it-teams</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/what-are-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/what-are-oauth-grants</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/what-breaks-during-an-idp-migration</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/what-is-app-level-access</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/what-is-delegated-access</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/what-is-effective-access</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/what-is-identity-drift</loc>
    </url>
    <url>
        <loc>https://www.yeshid.com/learn/when-is-okta-overkill</loc>
    </url>
</urlset>