Managed Identity Bridge

managed identity bridge

There are a lot of organizations that leverage Microsoft Active Directory® (AD) as their identity provider. This solution has been in use for over two decades now, and has for the most part been very effective through that time span. However, that effectiveness is starting to wane. The challenge that AD is facing is a consequence of the changes occurring within the IT environment. We are now in the era of heterogeneous IT and cloud applications, and these are both big problems for AD. Connecting user identities to the IT resources they need becomes much more difficult for IT organizations, requiring workarounds and additional solutions just to get by. Fortunately, a next generation managed identity bridge called Directory-as-a-Service® (DaaS) is changing the game and enabling IT organizations to seamlessly connect their users to the IT resources they need.

Why an Identity Bridge is Needed

identity management market alternative

Historically, IT organizations have relied on AD to connect users to IT resources. This included systems, applications, file servers, and networks. When AD was initially released, the entire network was Windows based, which made management easy to do. Microsoft designed AD to manage other Microsoft products, and as long as everything in the office stayed Microsoft and on-prem, it did everything that was needed.

As we all know though, nothing in the world of technology stays the same forever. Now, in the modern era of IT, organizations are using a wide variety of IT resources. This means cloud applications, different systems like Mac and Linux, WiFi networks, and more. These tools are great for the end consumers, but can be a nightmare for the admins that are trying to manage it all with AD.

Active Directory struggles to federate user identities and manage user accounts to non-Windows devices and applications. Solutions have been around that connect AD to other non-Microsoft resources for a while, but they are limited to web applications and tack on an additional expense and complication for admins. As more of these challenges appear, it only causes more strife for admins. This is where the need for a identity (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 86 posts and counting.See all posts by jon-griffin