The identity management space is core to IT. Identity and access management solutions control who has access to what in an organization. Because of the fundamental nature of IAM, there are a number of identity management competitors in the space. So, what do you need to know when it comes to choosing an identity provider to manage your IT resources?
Well, let’s take a look at how identity management has evolved over the years. Doing so will reveal that identity management solutions have struggled to meet the needs of a cloud-forward, modern environment.
IAM Started Off with LDAP
The modern era of identity management really started with the advent of the LDAP protocol. This protocol was created by Tim Howes and his colleagues at the University of Michigan in the early 1990s, and it went on to become one of the core authentication methods for IT resources. Shortly after LDAP’s creation, it spawned two major innovations: Microsoft® Active Directory® and OpenLDAP™.
Both of these solutions were considered directory services, as they offered a database of users and what those users could access. IT resources would check with the directory service when someone tried to login. The directory service, or identity provider as it is often called, would check to see if the user had access or not and return that to the IT resource. For many years, OpenLDAP would be the core directory service for organizations that leveraged mainly Linux infrastructure. AD was the go-to choice for predominantly Windows environments, and as most know, Active Directory became the market share leader in the IAM space.
Then, when the IT landscape started to shift to web applications, cloud infrastructure, WiFi, Mac and Linux machines, and more, IT admins struggled to control access to those resources. This was because Active Directory simply wasn’t built to integrate with cloud-based non-Microsoft resources.
How Changes Impacted IAM
The result was that the identity management space splintered into a number of different categories including directory services, web application single sign-on, privileged identity management, identity bridges, and governance solutions, (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at: https://jumpcloud.com/blog/identity-management-competitors/