Can you leverage an outsourced OpenLDAP™ provider rather than building your own LDAP infrastructure? The answer with Directory-as-a-Service® is yes. OpenLDAP has become a prominent solution in many IT networks. While it isn’t often the core identity provider for an organization, it often plays the critical role of being the user database for more technical systems and applications. OpenLDAP will also often serve as the identity store for an organization’s customers or end user logins (think mobile or web application users).
In The Beginning, There Was LDAP
OpenLDAP hit the market after Tim Howes, our advisor, and his colleagues created the Lightweight Directory Access Protocol (LDAP) while they were at the University of Michigan. At the time, desktop computers and the internet were radically changing the workplace, and the bandwidth of these resources couldn’t effectively support the X.500 – the directory services protocol at the time. So, LDAP was created to be a much more efficient (lightweight) version of the X.500.
AD and OpenLDAP Dominate the Identity Provider Market
The creation of LDAP spawned OpenLDAP and Microsoft Active Directory®. Both identity providers had important use cases within the IT infrastructure.
Active Directory would go on to become the monopoly in the space and be used for the core identity provider for internal employees and contractors. This was largely due to the fact that most IT networks were based on Windows and located on-prem.
OpenLDAP was successful where Linux or different flavors of Unix were in use for data center implementation. Applications based on these platforms would also often be connected to LDAP, and LDAP authentication was relatively straightforward to add to a non-Windows based product. As a result, IT admins and DevOps engineers would often add an LDAP instance to help manage user access to their technical infrastructure.
Of course, the challenges with OpenLDAP were well known. As an open source platform, OpenLDAP had the benefit of being highly flexible, but the downside was the complexity and difficulty in installing, configuring, and maintaining the identity management platform. Often, IT organizations would delegate running OpenLDAP to their more technical engineers and admins.
Outsourced OpenLDAP for the Cloud Era
As more IT management infrastructure moves to the cloud, an outsourced OpenLDAP solution can be extremely helpful for IT and DevOps organizations. By outsourcing the LDAP infrastructure, IT admins and DevOps engineers can focus on other higher priorities and simply leverage the functionality of LDAP without worrying about running it.
The outsourced OpenLDAP functionality of JumpCloud’s Directory-as-a-Service platform – also known as LDAP-as-a-Service – enables IT admins to leverage a cloud LDAP platform without the heavy lifting. Furthermore, our comprehensive directory services offer centralized user and system management by providing frictionless access to applications, systems, storage, and networks regardless of place, provider, platform, or protocol.
For more information on outsourced OpenLDAP, consider reading how Ooyala has saved on time and money by leveraging LDAP-as-a-Service. For an in depth look at the architecture behind a cloud LDAP platform, you might also enjoy watching this whiteboard video. If you have any questions about our OpenLDAP replacement, please reach out to us. We also encourage you to start testing our outsourced OpenLDAP by signing up for a free account. Your first ten users are free forever.
This is a Security Bloggers Network syndicated blog post authored by Natalie Bluhm. Read the original post at: JumpCloud