With the emergence of web-based applications, cloud infrastructure, and an increase in Mac and Linux systems in the identity management landscape, it has become a challenge for IT admins to securely manage and connect their users to the IT resources they need. Unfortunately, providing users access to all of their resources hasn’t always been done in the cleanest way. This is because IT organizations have often had to leverage multiple directory silos that prevent end users from having a single identity for their IT resources. Now, unified access management for AWS® servers is looking to solve that problem not only for cloud infrastructure, but also on-prem resources as well.
We’re getting ahead of ourselves, though. Let’s first take a look at why IT has had to resort to multiple directory silos for identity management.
Identity Management and the Changing IT Landscape
Historically, end users would log in to their Windows® device and then gain access to the Windows-based resources on-prem like the network, file servers, applications, and email. This all made sense because the identity provider was Microsoft® Active Directory®, and it worked closely with Windows systems, applications, and networks. This was also true with the data center. Most data center servers at the time were Windows-based. Then, the IT landscape changed.
IT organizations and DevOps personnel started to move to Linux®-based servers hosted in the cloud. This was a challenge for Active Directory because these servers weren’t on-prem and they weren’t Microsoft based – two characteristics necessary in order for resources to properly connect with AD. Identity management problems were only compounded as Mac® and Linux® desktops, web applications, virtual file storage, and more proliferated the workplace. IT admins were in a bind (no pun intended) because AD wasn’t built to integrate with these kinds of resources.
So to get by, IT organizations started to add other third-party identity management platforms such as web application single sign-on solutions, privileged identity management, identity bridges, and more. However, rather than unifying the approach to identity management, this splintered it (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at: https://jumpcloud.com/blog/unified-access-management-for-aws-servers/