Simple Directory Services

Is there such a thing as simple directory services? If there were, would you even want it? Is a simple identity provider even up to matching the identity and access management (IAM) needs of an organization?

Before we answer any of those questions, we need to clarify what we mean by simple.

Simple Ingenuity

It’s too bad that the word simple has come to have such a negative connotation in the world of IT because simple in IT should really be an indicator of a well-executed, elegant concept. Take the iPhone or Dropbox for instance. Both pieces of technology created a simple user experience, and we would all likely agree that in those cases, simple is a strong competitive advantage.

While simplicity has found its way into many avenues of technology, the world of identity and access management hasn’t really been one of them. With over a dozen leading authentication protocols that each have their own complex process to authenticate users and/or IT systems, the IAM world is complex to the say the least. In fact, it continues to get more complex with each new generation of technology that emerges. However, identity management didn’t start out this way.

IAM in the Microsoft Era

identity management active directoryIdentity management really solidified itself in the IT organization when Microsoft® Active Directory® emerged in 1999. Almost every IT resource used at the time was from Microsoft, so AD was specifically created to manage user access to these on-prem, Windows® based digital assets. For a short time, IT admins could manage their entire environment with one identity management solution.

However, since 1999, the IT landscape has changed dramatically. IT resources have shifted to the cloud and they are no longer just from Microsoft. The net result is that AD is struggling to keep up, so IT organizations are piling on solutions like identity bridges, IDaaS platforms, MFA apps, and much more. Slowly but surely, IT organizations have gone from using one solution to using 5 or more in order to securely manage user authentication. This has increased cost, security risks, and created (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 137 posts and counting.See all posts by natalie-bluhm