Identity and Access Management in the Cloud

Identity and Access Management in the Cloud

Many IT organizations are considering identity and access management in the cloud. After all, the cloud offers increased productivity, agility, and resource consolidation while helping IT organizations save money compared to legacy alternatives. The thing is, not all cloud IAM solutions are created equal. With an ocean of options, it’s certainly no easy task deciding on which cloud identity and access management (IAM) platform is right for you.

This blog post discusses a next generation directory services platform that offers identity and access management in the cloud. First, though, we need to take a step back and look at how IAM started. Doing so will help us understand how cloud identity management solutions differ from one another.

Origins of IAM

How IAM got startedHistorically, the identity management world was far simpler. A couple decades ago, the IT infrastructure was largely Microsoft® Windows® based, so Active Directory® was most often the IAM solution of choice. This made a great deal of sense since Active Directory was built to manage this exact type of environment. However, it enabled Microsoft to effectively own the identity and access management world.

As the IT landscape started to shift to mixed platform and provider environments, the needs of IT organizations started to change too. The desire to shift their IT infrastructure to the cloud increased as they utilized AWS®, Google Cloud Platform, G Suite, and Office 365  among others. In fact, cloud resources have done so well that the use of on-prem applications will decrease by 29% over the next two years, while the use of web-based apps will increase by 41%. Additionally, Mac and Linux systems have been rapidly replacing Windows systems. All of these new resources have certainly brought about many benefits to IT organizations, but they have also introduced their fair share of challenges.

IAM Challenges

Complexities of Modern IAMOne of the challenges is that Active Directory has had a difficult time connecting with these cloud-based, non-Microsoft tools. As a result, many IAM categories have emerged to extend AD to these new resources. Today, these are often known (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 172 posts and counting.See all posts by natalie-bluhm