Outsourced Identity Bridge

outsourced identity bridge

In the last year, hybrid cloud adoption grew from 19% to 57%, and this trend is likely to continue with 80% of IT budgets expected to be committed to cloud solutions in 2018 (Forbes). A key component to securely adopting a hybrid environment is an identity bridge. Also referred to as a directory extension, an outsourced identity bridge is an important solution for IT organizations that plan to adopt more cloud solutions.

So why is an identity bridge a key component in today’s cloud-forward IT world and why are organizations choosing to outsource this important component of their infrastructure?

IAM Market Produces the Identity Bridge

identity management active directory

Stepping back, an identity bridge has really existed because of how the identity and access management market has evolved. When Microsoft introduced Active Directory®, it quickly became the identity provider of choice in the enterprise. This was because organizations at the time were Windows-based networks and virtually all IT resources existed on-prem. Active Directory offered pristine user and system management in this setup, so it’s not a surprise that Active Directory quickly monopolized the identity management space.

Unfortunately, any resource that wasn’t Microsoft-based, like Mac or Linux systems, were tedious and costly to manage in an Active Directory environment. So, for those few organizations that had Mac or Linux, they needed a way to bridge their identities from Active Directory to the Mac or Linux device. This would provide them with some control over the users who used these non-Windows devices and the devices themselves. Of course, they weren’t usually able to manage the Mac or Linux devices via GPOs, but user management was more critical to start anyway.

Legacy Identity Bridges Need to Evolve

outsourced identity bridge

Over time, as the IT landscape shifted away from Microsoft networks, IT admins needed to solve more problems than just connecting Active Directory to Mac and Linux devices. Now they had to worry about web applications, cloud infrastructure, WiFi access, and much more. Leveraging Active Directory only solved a small portion of the overall identity management problem, but some organizations aren’t completely ready to move their (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at: https://jumpcloud.com/blog/outsourced-identity-bridge/

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 172 posts and counting.See all posts by natalie-bluhm