Next Generation Identity and Access Management

next generation identity and access management

IT organizations are ready for a next-generation identity and access management (IAM) platform that can effectively manage modern networks. So, it’s no surprise that the IAM market is becoming one of the most competitive markets on the planet. Yet, with so many competitors vying for a slice of this massive and critical category, the challenge for IT admins is determining which IAM solution is best for their organization.

The good news is that a next generation IAM solution has recently emerged that can securely manage and connect users to virtually any IT resource from the cloud. It’s called JumpCloud® Directory-as-a-Service®, but in order to truly understand the advantages of JumpCloud IAM, we should outline the evolution of the IAM space through the years.

First Generation Identity and Access Management

heterogenous IT windows mac linuxThe modern concept of identity and access management can be traced back to the creation of LDAP, otherwise known as the Lightweight Directory Access Protocol. LDAP enabled two major innovations in the IAM spaceOpenLDAP and Microsoft® Active Directory® (AD). Both of these identity providers would go on to dominate the IAM market, with AD becoming one of the most popular identity management solutions on the planet.

The popularity of Active Directory was primarily due to the dominance of the Windows® operating system prior to the new millennium. Microsoft leveraged AD to lock customers into the Windows platform and ecosystem. IT admins could more easily manage Windows systems and applications with AD, which translated into IT organizations desiring more Windows machines. It was a self-reinforcing cycle, and both Active Directory and Windows benefited. So began the dominance of Microsoft.

Of course, there may have been other solutions, but they paled in comparison from a market share and functionality perspective. As a result, AD became the default directory services platform in most IT organizations. However, as the IT landscape started to change and shift, the identity management space started to get a lot more interesting.

Second Generation Identity and Access Management

cloud identity group policy objectThe introduction of web applications in the mid-2000s kicked off a domino (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Vince Lujan. Read the original post at:

Vince Lujan

Vince is a documentation and blog writer at JumpCloud, the world’s first cloud-based directory service. Vince recently graduated with a degree in professional and technical writing from the University of New Mexico, and enjoys researching new innovations in cloud architecture and infrastructure.

vince-lujan has 191 posts and counting.See all posts by vince-lujan