Cloud Identity Bridge as-a-Service

cloud identity bridge as-a-service

The concept of a cloud identity bridge is changing the identity and access management (IAM) world, especially for organizations that still want to keep one foot on-prem while gaining control over their cloud-based apps and infrastructure. Like many categories within the IAM space, the cloud identity bridge is being offered as a SaaS based service. So what does a cloud identity bridge as a service mean for IAM?

To answer that question, let’s take a look at how the IAM industry has evolved overtime.

The Evolution of IAM

Identity and Access Management Pyramid

As most people in IT know, LDAP started the modern era of identity management in the early 90’s, and then Microsoft Active Directory® took on the mantle a few years later. Microsoft was able to establish quite the empire with Active Directory because, at this time, IT environments consisted of mostly Windows systems, and on-prem networks, applications, and data centers.

Within this ecosystem, Active Directory was excellent, and a lot of that had to do with the domain controller. On-prem resources within an IT environment were bound to the domain controller, and this created a central point for authenticating to on-prem resources. This made it possible for users to login with one set of credentials into their Windows system and easily gain access to their apps, networks, files, and servers. All the while, IT was able to have excellent control over their users, systems, and other IT resources.

Changes to the Core IT Landscape Altered IAM

cloud hosted solution

But, as the core IT landscape started to change, the IAM space started to shift as well. Many of the changes in the core IT landscape included shifting away from Microsoft resources. Users started using Mac and Linux systems, web-based apps like G Suite, and cloud-based servers hosted by AWS. Microsoft wanted to hang on to their monopoly, so they made it difficult to integrate these new resources with Active Directory.

However, these new resources have spurred a new category of identity management called cloud identity and access management that has started to chip away at Microsoft’s grasp on IT organizations. It also has became apparent (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 169 posts and counting.See all posts by natalie-bluhm