Identity Management Category System Management

Identity Management Category System Management

Why would system management be in the identity and access management (IAM) category? It doesn’t make sense. Isn’t system management its own category? We’d argue the identity management category system management is not only within the IAM sector, but the deep tie between users and their systems should make system management and IAM tightly integrated.

System management being a subset of identity management didn’t just happen. In fact. It was Microsoft® who saw this opportunity almost two decades ago and capitalized on it.

System Management Two Decades Ago

The modern era of identity management kicked off when Tim Howes and his colleagues got together to create the LDAP protocol at the University of Michigan. That spawned two core directory services solutions – OpenLDAP and Microsoft Active Directory®.

While OpenLDAP focused on the authentication and authorization process of users to IT resources – namely highly technical ones such as Linux and Linux-based applications – it didn’t focus on managing the user’s systems.

Microsoft, on the other hand, added in the concept for Group Policy Objects (GPOs) to provide system management along with user management for Windows-based IT resources. GPOs would allow IT admins to disable or enable certain system behaviors, like whether or not users would have access to the control panel on a Windows system. The best part was GPOs didn’t require any scripting or coding. All IT admins had to do was check a few boxes and make a couple of clicks.

Of course, GPOs were strictly focused on Windows machines because, at the time, almost the entire enterprise consisted of Windows machines and applications. In this setup IT admins only needed one tool – Active Directory – and they could manage their users and what was going on with their Windows machines. IT admins could set security policies, execute tasks, and remotely manage their Windows fleet.

System Management in the Modern Era

Active Directory system management capabilities weren’t really seen as a key advantage in the identity management industry, until recently. The thing is, now there are two other major platforms to worry about – (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 136 posts and counting.See all posts by natalie-bluhm