Simple Identity Management

Simple Identity Management

Over the last decade identity management has gotten quite complex. It’s a result of how the IT landscape has evolved, and the tools that are supporting the identity and access management (IAM) market. With all of that complexity comes increased cost and resources. Is there a simple identity management approach that is powerful as well?

First, we need to define what we mean by simple.

Simple Doesn’t Mean Bad

In today’s society, we’ve been led to believe that simple means ineffective. The truth is that when simple is done well, there’s actually a lot of complexity going on behind the scenes that is creating that easy-to-use experience. Producing that is incredibly hard. Look at some of the most simple, yet successful solutions in IT. The iPhone® was considered simple to use and elegant. We all know how hard it was to build that. Dropbox is another example of a simple solution, yet that was also incredibly difficult to create and perfect.

So when we talk about simple identity management, we’re talking about identity management that adapts and works for your environment, securely and efficiently. Now, let’s discuss how changes in the IT landscape have complicated IAM.  

How Identity Management has Evolved Over Time

In the identity management space, solutions have become complex and difficult. While the start of the category may have been simple, the end result has been far from it.

Over two decades ago, Microsoft® introduced Active Directory® to manage Windows®-based networks. Conceptually the solution was simple, but, of course, it wasn’t easy to implement nor use. End users would login to their network attached Windows laptop or desktop, and Active Directory and the domain controller would ensure that the user could access whatever Windows resources they were entitled to. This worked well for a while.

But, then the IT landscape started to change. Web applications and cloud infrastructure started to appear. Mac® and Linux® machines became more popular. Windows file servers gave way to cloud solutions such as Box, Google Drive, and Dropbox, and (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 172 posts and counting.See all posts by natalie-bluhm