User Management-as-a-Service

User Management-as-a-Service

As the world moves to the cloud and delivers solutions ‘as a service’, the IT landscape has been changing significantly. Old world, legacy providers are being replaced with modern approaches. We are seeing this in virtually every category. Incumbents are determining if they need to move to this model and ‘cloud-wash’ their solution. New entrants are pushing the market to new heights with incredible new innovations.

One category that has largely gone untouched by the cloud has been directory services. But, now a new generation of User Management-as-a-Service is emerging.

Active Directory and OpenLDAP were Key Players

User Management-as-a-Service Key Legacy Players

Historically, the user management marketplace has been dominated by legacy, incumbent players such as Microsoft® Active Directory® and the open source solution, OpenLDAP™. Identity management has historically been a solution that is delivered on-prem and as a software solution. This made a lot of sense when the world was Microsoft Windows and resources were hosted on-prem.

The Modern Era Disrupts Legacy User Management

Disrupting Legacy User Management-as-a-Service

The world has shifted. Both the cloud and web applications are driving a new era of IT. New non-Windows platforms such as macOS and Linux are seeing significant success. Wired networks are moving to wireless and mobile phones and tablets are also a significant part of the mix.

Legacy user management systems are struggling because of these fundamental changes in the IT landscape. It is more difficult for AD to work with macOS and Linux devices than Windows. Cloud infrastructure such as servers hosted at AWS or Google Cloud Platform and web applications also typically require add-on technology in order to be managed by AD credentials. However, add-on technology (sometimes called identity bridges) is often costly, inefficient, and is not an actual replacement for legacy user management systems.

Due to the cost and implementation pain associated with these add-ons, these non-Microsoft resources end up being manually managed or not managed at all. Manual management offers some visibility, but it’s a huge time sink and IT will never have 100% certainty over what is going on in their IT environment. Unmanaged resources create even more of a security nightmare because IT (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 172 posts and counting.See all posts by natalie-bluhm