Identity Management Category Identity-as-a-Service

The modern identity management space is complex. There are any number of different categories – including directory services, web application single sign-on (SSO), privileged identity management, password management, multi-factor authentication (MFA), and plenty more where that came from. As the cloud and Software-as-a-Service (SaaS) solutions have emerged, one category that has historically lain dormant has recently become active. In this post, we discuss the identity management category: Identity-as-a-Service (IDaaS).

Origins of IDaaS

Like most of the identity management category, the Identity-as-a-Service space has morphed over the years. Initially, the identity management market was really just about Microsoft® Active Directory® (AD). Why? Historically, IT networks have been Windows® based and hosted on-prem. The simplicity of this approach meant that IT admins just needed to implement AD, and then close the book on their identity and access management (IAM) story.

However, everything changed when web applications appeared on the market in the mid-2000s. These were hosted on the web and were non-Windows based. Consequently, AD couldn’t handle connecting users to these new web-based IT resources. As a result, a new generation of identity management solution emerged – web app SSO. Of course, web app SSO was really just the first example of an entire category of solutions that would eventually be called Identity-as-a-Service.

IDaaS solutions have since become quite popular. Interestingly, despite the name, first generation IDaaS solutions didn’t actually host the identity. In fact, identities remained with Active Directory in most cases. Nevertheless, IDaaS solutions were able to provide a pathway for IT admins to extend on-prem identities to the cloud and more. The fact that they extended identities ‘as a service’ was really where the name came from.

The IDaaS approach with AD on-prem was certainly helpful for IT organizations (for a while), but this approach started to break down as IT infrastructure changed even more. The shift to cloud infrastructure such as AWS® and Google Cloud Platform as well as the move to Mac® and Linux® devices were at the tip of the spear. File storage also was in (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Vince Lujan. Read the original post at:

Vince Lujan

Vince is a documentation and blog writer at JumpCloud, the world’s first cloud-based directory service. Vince recently graduated with a degree in professional and technical writing from the University of New Mexico, and enjoys researching new innovations in cloud architecture and infrastructure.

vince-lujan has 133 posts and counting.See all posts by vince-lujan