Tags to Groups Migration: POSIX Group

POSIX Group

JumpCloud has released a lot of powerful features over the past year, and one of the key improvements to our Directory-as-a-Service® platform was the addition of the Groups feature. This Groups functionality enables admins to set up collections of JumpCloud objects, like users or systems, and associate them to other objects. This allows admins to build a relationship between them, enabling abilities like granting access to an object or group of objects through the tool. This new Groups feature is replacing our old Tags feature, and as a result we will be migrating all of our customers to the powerful new platform shortly. In order to help with this transition, we have created a video series that demonstrates exactly what the migration process will look like. In this episode of the series, we will be examining how POSIX Groups translate from the Tags platform to the Groups platform. Find the video “Tags to Groups Migration | POSIX Group” below:

More Information on Creating POSIX/LDAP Groups

cloud ldap

Configuring a Tag for an LDAP posixGroup has been updated for the new Groups platform, and is now referenced here: “Creating an LDAP Group”. Essentially, in the new platform you must create a Group of Users, and enable it to create a Linux group for the Group of Users (this provides the same functionality as the posixGroup mentioned earlier). Once this is completed, you are able to use this POSIX Group to authorize user accounts to various resources like Jenkins, Linux servers, and more.

This ability to create POSIX Groups enables admins to use LDAP authentication for many of their Unix-based resources, with the same identity they use for the rest of their applications, servers, and more. The process to set this up is relatively straightforward. Simply create the user in JumpCloud, associate them with the LDAP-enabled Group, configure your application to connect and authenticate/authorize to JumpCloud’s LDAP-as-a-Service, and then the end user can authenticate against JumpCloud’s LDAP endpoint and get access to their resource. Because the identity is hosted in the central directory, that same identity that is used for LDAP authentication can be used for web applications, systems, the WiFi network, and more.

Don’t Have JumpCloud Yet?

Get Started and Learn more about JumpCloud

If you don’t have Directory-as-a-Service yet, and you would like to learn more about the innovative unified directory, reach out to us. We would be happy to answer any of the questions you have about the platform, as well as set up a demo to show the product in action. Alternatively, if you would like to try DaaS out for yourself, you can sign up for a free account. We offer 10 users free forever, with no credit card required, so there’s no reason not to give it a shot. This way, you can test out the cloud-based directory as much as you want and make sure that it works for you. Sign up today!

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

This is a Security Bloggers Network syndicated blog post authored by Jon Griffin. Read the original post at: JumpCloud

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 138 posts and counting.See all posts by jon-griffin