Many IT organizations are considering identity and access management in the cloud. After all, the cloud offers increased productivity, agility, and resource consolidation while helping IT organizations save money compared to legacy alternatives. The thing is, not all cloud IAM solutions are created equal. With an ocean of options, it’s certainly no easy task deciding on which cloud identity and access management (IAM) platform is right for you.
This blog post discusses a next generation directory services platform that offers identity and access management in the cloud. First, though, we need to take a step back and look at how IAM started. Doing so will help us understand how cloud identity management solutions differ from one another.
Origins of IAM
Historically, the identity management world was far simpler. A couple decades ago, the IT infrastructure was largely Microsoft® Windows® based, so Active Directory® was most often the IAM solution of choice. This made a great deal of sense since Active Directory was built to manage this exact type of environment. However, it enabled Microsoft to effectively own the identity and access management world.
As the IT landscape started to shift to mixed platform and provider environments, the needs of IT organizations started to change too. The desire to shift their IT infrastructure to the cloud increased as they utilized AWS®, Google Cloud Platform™, G Suite™, and Office 365™ among others. In fact, cloud resources have done so well that the use of on-prem applications will decrease by 29% over the next two years, while the use of web-based apps will increase by 41%. Additionally, Mac and Linux systems have been rapidly replacing Windows systems. All of these new resources have certainly brought about many benefits to IT organizations, but they have also introduced their fair share of challenges.
One of the challenges is that Active Directory has had a difficult time connecting with these cloud-based, non-Microsoft tools. As a result, many IAM categories have emerged to extend AD to these new resources. Today, these are often known (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at: https://jumpcloud.com/blog/identity-and-access-management-in-the-cloud/