Cloud Directory Feature Windows® User Management

Cloud Directory Feature Windows® User Management

 In Blog, User Management

The cloud directory is breaking new ground in the identity and access management world. Traditionally, the directory service has lived on-prem, but as the identities and IT resources move to the cloud, the identity provider is making the leap to the cloud as well. This shift has IT admins wondering about the cloud directory feature of Windows® user management.

First we’ll take a look at the history directory services and Windows user management. Then we’ll take a look at why IT admins are looking for a cloud directory to take over their Windows user management. Finally, we’ll show you an example of this feature in action in a cloud directory.

Microsoft® Windows Monopolizes the Office

Between 1986 and 1990, there was a huge surge of businesses that realized that personal computers could help eliminate time consuming manual tasks and therefore increase productivity. In a matter of years, many workplaces went from having no computers to almost every employee having a personal computer on their desk.

In the 1990’s, created the Windows Operating System. Microsoft Windows offered new features that made it easier for users and businesses to complete their work, and for years to come,  Microsoft Windows would hold 95% of the desktop operating system market share. When Microsoft was at the height of their dominance in 1999, they released Active Directory®.  Active Directory was introduced to capitalize on their market share advantage and further lock-in their customers with a user management system.

Active Directory helped create, delete, and modify user access to Windows systems, applications, files, and networks. Not only did Microsoft have a hand in personal computers and directory services, but they also had great success with email, productivity solutions, and their own line of servers. In an environment that used all of these Microsoft products, Active Directory worked very well; IT organizations had great visibility and (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 122 posts and counting.See all posts by natalie-bluhm