Virtual Authentication

Authentication services are a core part of any IT environment. Enabling end users to access the IT resources they need in a secure manner is one of the bedrock responsibilities of IT. Whether that means applications, data, networks, systems, or other IT resources, tightly controlling access is central to any IT strategy. But with the rise in popularity of cloud resources, that task has started to become more of a challenge. This change has left many admins wondering if a virtual authentication process is possible.

Birth of Authentication Services

Authentication services rose to prominence with the advent of the interconnected network. Our advisor, Tim Howes, and his colleagues from the University of Michigan created the LDAP protocol, which kicked off the modern era of identity and access management. From there, two on-prem solutions emerged: the open source OpenLDAP™ and the commercial solution Microsoft Active Directory®. OpenLDAP would go on to become the most popular open source solution, and AD would go on to become the dominant commercial identity provider.

These two solutions have been stalwarts of IT for almost two decades now. But the longer time goes on, the more they are beginning to show their age. These tools were built with on-prem environments in mind, and these new cloud solutions are creating problems for them. While not impossible to overcome, it has become clear that the further into the cloud world we move, the more workarounds and additional solutions will be required for these legacy solutions to keep up. Plus, when you consider that Microsoft’s solution only focuses on supporting other Microsoft solutions, it’s easy to see how limiting it can be. This is not an ideal scenario for admins, and it’s clear to see that these reasons are driving organizations to look for a new solution.

Moving to Virtual Authentication

With the shift to the cloud, one thought that IT organizations are having is to search for ways to virtualize their authentication services. This means that companies are looking for a cloud-based identity provider. The good news is that this type of solution is possible.

The (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 169 posts and counting.See all posts by jon-griffin