Identity-as-a-Service: SaaS Identity Provider?

The term Identity-as-a-Service has been popularized by IDaaS vendors and analysts alike. But, the challenge for IT organizations has always been figuring out what that term actually means. Is Identity-as-a-Service similar to a SaaS identity provider? Or, is IDaaS just equal to web application SSO? Part of the problem is that the definition keeps changing depending on the latest trends and the person you’re asking. So let’s get to the bottom of IDaaS, SaaS, and the IDP.

Understanding the History of IDaaS

virtual identity

To understand how the term Identity-as-as-Service was created, and what it means, we need to go back in history a little bit. The creation of the IDaaS world all started with Tim Howes and his colleagues at the University of Michigan. When this group created the LDAP protocol, they arguably kicked off the modern era of identity management. This is because of what was born from the protocol.

LDAP spawned two critical solutions: Microsoft Active Directory® and OpenLDAP™. These two solutions would become the core of many organization’s IAM strategy. AD would go on to become the monopoly in the space for commercial entities, and OpenLDAP would go on to become the dominant name in open source solutions. These solutions worked for a while, but as is usual in the tech world things started to change and cause complication for the older solutions.

Complications With The Traditional Solutions

Active Directory Server fail

As the world changed and the popularity of web applications rose, on-prem directories like AD started to struggle. To address this challenge that the directory was having, a wave of web application SSO solutions were created to connect users to these web applications via their AD credentials. To help create more buzz around their solutions, these vendors and a group of analysts created the term Identity-as-a-Service. Despite being a misnomer for the category, it was an appealing term and it caught on.

If we move in time closer to today, we now see more and more of the IT infrastructure being moved to the cloud, and heterogeneous environments with Mac and Linux systems emerging everywhere. In addition, many (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 169 posts and counting.See all posts by jon-griffin