Cloud Directory feature AWS Server User Management

Cloud Directory feature AWS Server User Management

 In AWS, Blog

IT networks are changing dramatically right before our eyes. Perhaps nowhere is that change more visible than in the data center. The migration of infrastructure from on-premises to the cloud has been so acute that Cisco recently reported that cloud data centers are expected to process 94% of workloads and compute instances by 2021. Clearly, remote data centers like Amazon Web Services (AWS®) are eliminating the traditional data center. This is why IT admins are interested in the cloud directory feature AWS server user management.

By shifting to cloud computing with AWS, IT organizations are experiencing tremendous benefits that include lower costs and improved agility, productivity, and data center consolidation (Suse).

The challenge is that cloud transformation hasn’t just impacted the data center. As IT organizations shift to remote servers, web-based applications, and wireless networks, it has become critical to revisit the strategy for identity management. Let’s take a look at why.

Active Directory is for an On-Prem Environment

For a long time, a core identity has been hosted within Microsoft® Active Directory® (AD), an on-prem identity provider. AD was created in an era where networks were all on-prem and Windows® based. Naturally, Active Directory thrives when it is managing this exact type of environment. AWS is not an on-prem, Microsoft resource, so the steady shift to AWS’s data centers has greatly impacted AD’s effectiveness.

Inefficient AWS Server User Management with AD

Amazon has attempted to address AD’s limitations in managing user access to AWS with a number of work arounds. One of their answers was to create a separate AWS Directory Service solution, which is an AWS hosted AD instance. This approach is not all that helpful though. IT admins are stuck with either managing two separate directory services, or they need to figure out how to integrate the two together to ensure that (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 170 posts and counting.See all posts by natalie-bluhm