Unified Access Management

unified access management

The identity management space is filled with different terms and acronyms. A new one that is emerging is unified access management. It’s a term that is being driven by vendors and adopted by analysts, so it’s important for IT organizations to understand what it means. Once understood, it becomes much easier for admins to evaluate solutions that fit under this umbrella category of unified access management and determine which solution fits their needs best. To help with that understanding, this post will examine what unified access management really is.

Why New IAM Terms Keep Appearing

cloud device management

Before we dive into what this new identity and access management term means, we should examine why these new terms or categories are even necessary. The simple answer is because the IT landscape is changing and evolving. New solutions are being introduced at a rapid pace, and in order to keep everything working together new identity management solutions are appearing as well. Where did all of it begin?

The modern era of IAM kicked off over twenty-five years ago with the advent of the LDAP protocol. Created by our advisor Tim Howes and his colleagues at the University of Michigan, the LDAP authentication protocol enabled two major solutions: OpenLDAP and Microsoft® Active Directory®. These two solutions became known as directory services, or identity providers, and they were two of the most critical solutions for the modern era of identity management. Microsoft AD went on to become the market leader in the commercial market, and OpenLDAP soon became the most popular open-source alternative.

With these tools, IT organizations were able to centrally control access to systems, applications, and, in the case of Microsoft AD and the domain controller, the network as well. When choosing between the two directories, there was a rather common route companies took. If your organization was driven by Microsoft solutions, you’d opt for Active Directory. If you were based on Unix/Linux solutions, you might leverage OpenLDAP. Some IT organizations would even leverage both, where one would work with end users and the other would work with the data (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at: https://jumpcloud.com/blog/unified-access-management/

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 169 posts and counting.See all posts by jon-griffin