Managed IdP

managed idp

As IT organizations make the shift to the cloud, many are asking whether a managed identity provider (IdP) is possible. This is because the IdP is one of the most critical management tools within IT infrastructure. It helps an organization keep their digital assets safe and optimizes a user’s access to IT resources.

However, the IT landscape has changed significantly over the last few years. One of the biggest developments has been the cloud. As the cloud has advanced and matured, it has proven itself a valuable asset when it comes to budgets, productivity, agility, and innovation (Suse). So, it’s not a surprise that hybrid cloud adoption grew from 19% to 57% in 2016 (Forbes). The trouble is that traditional IdPs like Microsoft® Active Directory® (AD) or OpenLDAP have been slow to respond.

Fortunately, a new solution called JumpCloud® Directory-as-a-Service® is effectively a next generation managed IdP. First, though, we need to take a look at the beginning of the identity provider space and how changes in the IT landscape have impacted legacy IdPs. Doing so will make it clear why IT organizations are motivated to adopt a managed IdP in their environment.

Active Directory Ruled the IdP Space

user management

Historically, the core identity provider has been Microsoft Active Directory. Active Directory emerged in a time when IT infrastructure was Windows based and on-prem. In this environment, Active Directory provided IT admins with excellent user and system management. Then, the world started to move away from on-prem, Microsoft resources.

Modern IT Needs a Managed IdP

Active Directory fails in the cloud

Web applications, cloud servers, Mac and Linux devices, WiFi, and much more transformed the IT world. These new resources also ushered in some new challenges with Active Directory. AD wasn’t built to integrate with these new resources. Consequently, IT organizations were stuck with no management, manual management, or a third-party add on.  

Manual management or no management are both undesirable management options. As a result, IT admins have been forced to purchase additional identity and access management solutions. These have only prolonged the life (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 171 posts and counting.See all posts by natalie-bluhm