The identity management space has a number of different sectors to it, and over the years, a number of different markets have evolved. In fact, we would argue that some have emerged and some are on their way to disappearing. The identity management category privileged identity management just may be one of the categories to disappear. To understand why, let’s discuss how the IAM space started as a whole.
The Start of IAM as a Whole
The modern era of identity management started with the LDAP protocol in the early 1990s. Back then, the X.500 was the directory used at the time in conjunction with the Directory Access Protocol (DAP). This setup provided IT admins with a secure method to authenticate users to resources, but it wasn’t the easiest to implement, and DAP required a lot of processing power to run smoothly. Because of this, the X.500 directory wasn’t widely adopted.
The IT world started to change as desktop computers became affordable and the internet became more prevalent. Still DAP required more processing power than what was available in desktop computers and other new emerging resources. So, LDAP was developed to replace DAP and to work with the smaller bandwidths that these new IT resources used.
While LDAP ended up working very well, IT organizations still struggled to network their Microsoft® Windows® PCs together, and they lacked a method for controlling user access. Luckily, they didn’t have to wait too long for a solution to emerge.
The LDAP protocol ended up being the basis for two major identity management innovations – Microsoft Active Directory® (AD) and OpenLDAP™. OpenLDAP became the leading open source directory service, while Active Directory would go on to become the market share leader. Active Directory also ended up being the solution IT admins needed to obtain better management over user access to Windows machines, applications, and even the network.
The Creation of the IAM Category Privileged Identity Management
Active Directory worked well for on-prem Windows desktops, laptops, and servers, but it didn’t work well for other critical infrastructure such as (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at: https://jumpcloud.com/blog/identity-management-category-privileged-identity-management/