Over the last decade identity management has gotten quite complex. It’s a result of how the IT landscape has evolved, and the tools that are supporting the identity and access management (IAM) market. With all of that complexity comes increased cost and resources. Is there a simple identity management approach that is powerful as well?
First, we need to define what we mean by simple.
Simple Doesn’t Mean Bad
In today’s society, we’ve been led to believe that simple means ineffective. The truth is that when simple is done well, there’s actually a lot of complexity going on behind the scenes that is creating that easy-to-use experience. Producing that is incredibly hard. Look at some of the most simple, yet successful solutions in IT. The iPhone® was considered simple to use and elegant. We all know how hard it was to build that. Dropbox™ is another example of a simple solution, yet that was also incredibly difficult to create and perfect.
So when we talk about simple identity management, we’re talking about identity management that adapts and works for your environment, securely and efficiently. Now, let’s discuss how changes in the IT landscape have complicated IAM.
How Identity Management has Evolved Over Time
In the identity management space, solutions have become complex and difficult. While the start of the category may have been simple, the end result has been far from it.
Over two decades ago, Microsoft® introduced Active Directory® to manage Windows®-based networks. Conceptually the solution was simple, but, of course, it wasn’t easy to implement nor use. End users would login to their network attached Windows laptop or desktop, and Active Directory and the domain controller would ensure that the user could access whatever Windows resources they were entitled to. This worked well for a while.
But, then the IT landscape started to change. Web applications and cloud infrastructure started to appear. Mac® and Linux® machines became more popular. Windows file servers gave way to cloud solutions such as Box™, Google Drive, and Dropbox, and even on-prem Samba file servers and NAS appliances rose in popularity as well. To top it off, Microsoft Office® was replaced by G Suite (formerly Google Apps). All of these changes significantly complicated IAM because IT organization needed an additional solution to manage each of these new IT resources. So, IT admins would need Active Directory and solutions like MFA, identity bridges, web app SSO, and more to securely manage their environment. Clearly, what used to be simple became complex.
The good news is that a new approach to identity management is simplifying the process. Instead of requiring Active Directory and add-ons, IT admins simply leverage the JumpCloud® Directory-as-a-Service® platform to connect users to the IT resources they need.
Simple Identity Management with JumpCloud
JumpCloud simplifies identity management in a few ways. First, our cloud identity provider connects with virtually all IT resources regardless of platform, provider, location, and protocol. This makes it possible to manage all of your IT resources from one place. Seriously. Whether it’s systems, infrastructure, networks, or apps and file storage, you can manage user access to all of it with JumpCloud. This in turn also makes your users’ lives easier because they only need one set of credentials to authenticate to all of their digital assets.
Additionally, JumpCloud’s graphical user interface makes it very easy to navigate and use. Most likely, even your beginner sysadmins will feel comfortable adding and removing users or executing Linux, Mac, and Windows system policies, for example.
Learn More About JumpCloud’s Ease of Use
Discover more about a secure, simple identity management solution by reaching out to us. You also don’t have to take our word for how easy it is to use JumpCloud. Read the Ooyala Case Study, or experience it for yourself by signing up for a free account. You don’t need a credit card; every feature is available; and your first ten users are free forever.
This is a Security Bloggers Network syndicated blog post authored by Natalie Bluhm. Read the original post at: Blog – JumpCloud