Single sign-on has been around for a while. However, the concept of single sign-on has morphed over the years to be less about one identity connecting your users to everything that they need, and more about exceptions outside of the Microsoft Active Directory® world. Now, there is a new concept of virtual True Single Sign-On™ that is embracing the philosophy of having one identity for access to all critical IT resources – and one centralized place for admins to manage that access.
Evolution of SSO
The approach with SSO has really mimicked what has been going on in the IT landscape. The idea of SSO wasn’t even really talked about in the early 2000s when Active Directory emerged, but it was there. Microsoft’s idea of connecting you to your IT resources was two-fold: one, they needed to all be Windows-based, and two, they needed to be on-prem. Users would log in to their Windows device, and via the domain controller have access to whatever on-prem Windows resources they were authorized for. While we didn’t call it SSO, the process fit the definition of SSO: one set of credentials to access everything.
This model dominated the enterprise – for a while. Back in 2000, Microsoft owned 97% of the market share of devices [Forbes]. Just that number alone speaks volumes to the control Microsoft had. Unfortunately for Microsoft though, the IT landscape started to shift. Web applications started to become more popular. Cloud infrastructure rose to be the preferred choice for server infrastructure. On top of that, Mac and Linux devices began to overtake Windows machines on-prem. All of these changes had a major impact on the industry. In fact, by 2010, Microsoft only owned 20% of the device market [Forbes]. This was the death knell for the “Original SSO” – and it opened the door for a wave of solutions that sought to add on to Active Directory to complete the SSO picture.
The Second Edition of SSO
Of course, the plethora of new cloud-based IT resources and non-Windows devices were outside of the scope of Microsoft’s (Read more...)
*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at: https://jumpcloud.com/blog/virtual-true-single-sign/