Cloud Directory Feature: Linux Device Management

Linux Device Management

As Linux® has become the operating system of choice for the data center, Linux devices have become more popular than ever before. The challenge for IT admins is to figure out how to integrate Linux systems into their IT management infrastructure. Fortunately, a powerful new Identity-as-a-Service (IDaaS) platform has emerged that offers management capabilities for Linux systems. In this blog, we discuss the cloud directory feature: Linux device management. First, however, we should provide some context.

Legacy Device Management

Prior to the introduction of Microsoft® Active Directory® (AD), most IT admins thought identity management solutions simply encompassed the authentication and authorization process. AD changed that thought process with the Group Policy functionality.

Microsoft’s thought process on what the directory service would encompass was actually brilliant. When Microsoft released Active Directory in 1999, Windows-based IT resources were already the dominant player in the market for systems and applications. IT networks were virtually all Windows-based, and to help lock-in their customers, they created Active Directory and GPOs for Windows.

As the name implies, Group Policy describes the ability to manage policies on groups of systems. This is achieved via Group Policy Objects (GPOs), which are effectively scripts, templates, or commands that can be executed across Windows system groups. Obviously, the ability to manage groups of systems at once is a huge advantage.

Why are we talking about GPOs? The Group Policy functionality is a highly valued and critical system management tool. It is one of the primary justifications for the continued use of the on-prem Microsoft directory service in the cloud era. The trouble has always been (and apparently may always be) that Microsoft won’t make this concept available to Linux or Mac machines in an attempt to lock customers into the Microsoft ecosystem. After all, IT admins have had to deal with this limitation for nearly twenty years now.

Linux and the Limitations of Legacy Device Management

While AD has been great for managing Windows systems, the same cannot be said for non-Windows systems. For example, if IT admins needed to manage their Mac and Linux users and (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Vince Lujan. Read the original post at:

Vince Lujan

Vince is a documentation and blog writer at JumpCloud, the world’s first cloud-based directory service. Vince recently graduated with a degree in professional and technical writing from the University of New Mexico, and enjoys researching new innovations in cloud architecture and infrastructure.

vince-lujan has 198 posts and counting.See all posts by vince-lujan