As the IT landscape becomes more complex, a new wave of management tools has emerged. One such tool is an identity bridge, which helps extend existing user identities to resources that are not within the purview of the existing IdP (Identity Provider). These bridges enable organizations to “bridge the gap” from the legacy, on-prem world, to the modern cloud era. While this type of identity and access management tool can be extremely useful, there is immense contrast between the original identity bridges and the more sophisticated, cloud-forward identity bridges available today. Identity bridges are still innovating, and the idea of a hosted identity bridge that can provision access to a wide variety of modern resources is the next step.
Why are Identity Bridges Needed?
To understand how you can leverage modern IT platforms, it’s critical to understand where they are coming from. Historically, the IT network had been largely Microsoft Windows-based. That meant that the systems, applications, and IT management tools were all built with Windows. The result was a homogenous network that could be controlled by Microsoft Active Directory® and the domain controller. On top of that, this environment was largely on-prem as well. All of the computers, printers, storage, and more were all Microsoft based and on-prem. As a result, AD was built to manage on-prem Microsoft based resources. This solution made sense for a while. But as we all know with everything in technology, nothing stays the same for long.
As the IT landscape started to shift with web applications, cloud infrastructure, and non-Windows platforms such as Mac and Linux, the Microsoft-based management tools started to break down. IT admins couldn’t easily control users, systems, applications, and file servers that weren’t based on Windows. As a result, many admins started pushing back against the changes. But, the draw for their end users was compelling, and the changes gained traction and are still growing to this day.
*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at: https://jumpcloud.com/blog/hosted-identity-bridge/