SaaS Identity and Access Management (IAM)

SaaS Identity and Access Management

Identity and access management is one of the most important capabilities in IT. In our increasingly connected world, controlling access to digital assets has never been more critical. The rate of breaches is accelerating – and one of the largest contributing factors is poorly managed identities. So how does IT go about securing and controlling access to digital assets in today’s modern IT world? One option is to take identity management and security to the next level with a new generation of SaaS identity and access management (IAM).

So let’s take a look at how changes in the IT landscape have had a significant impact on the IAM market.

IAM Market Started When LDAP Replaced the X.500

The IAM space really kicked off when Tim Howes and his colleagues at the University of Michigan created the LDAP protocol. As the internet and desktop computers became the norm, IT found that the X.500, LDAP’s counterpart, was too cumbersome for the bandwidth of these resources. So, Tim and his peers created the Lightweight Directory Access Protocol (LDAP), and LDAP ended up being the catalyst for two critical identity management tools – OpenLDAP and Microsoft Active Directory. Of course, AD would go on to be the most widely used IAM solution on the market.

Over time, the IT vendor community just assumed that the core identity provider in an organization would be Active Directory, so they turned their attention to solutions that were designed to be built on top of AD. These categories included directory extensions, web application single sign-on, privileged identity management, password management, multi-factor authentication, and others. None of these categories, though, would match the importance or size of the directory service or core identity provider.

AD Didn’t Adapt to Changes in the IT World

Active Directory fails in the cloud

AD was the monopoly in the space because of their dominance with Windows and the fact that most IT resources were on-prem. Over the last decade, though, the IT landscape has been changing: Windows systems only make up one in five devices, web applications are extremely popular, the on-prem data center is being (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 124 posts and counting.See all posts by natalie-bluhm