In the past, IT environments were on-prem and largely based on one type of provider and platform. Identity and access management (IAM) tools were created with this in mind, and user management was straightforward. Now, there is a flood of web-based applications, a variety of providers and platforms, and an increasing mobility of users and IT resources. All of this has complicated user management. Subsequently, IT organizations are looking to the IAM function, cloud user management, to uncomplicate things.
How is cloud user management helping IT organizations? To answer that, let’s take a closer look at how IT admins managed users in the past.
Legacy User Management
For the longest time, IT environments were dominated by Microsoft® solutions. Users were leveraging Windows® systems, Office®, Windows File Server®, and Outlook®, while IT admins used Microsoft’s identity management platform, Active Directory® (AD), to manage it all. In this setup, IT organizations were able to provide users with one set of credentials to access all of their digital assets. This allowed for centralized control over user access, efficient resource management, and a good level of security. As a result, IT admins didn’t think twice about implementing AD and other Microsoft IT resources. It’s also why IT environments have been this way for a couple decades, but, nowadays, this is no longer the typical workplace.
Modern IT Resources Require Modern User Management
Like we mentioned in the introduction, web-based applications have emerged, users now prefer to use Mac® and Linux® systems over Windows, and cloud service providers have transformed the data center. As these new IT resources started to dominate the workplace, problems started to arise because Active Directory wasn’t designed to support resources that strayed away from the on-prem, Microsoft-only model. Consequently, a user’s single set of credentials turned into multiple sets of credentials, and user management just hasn’t been as easy as it used to be. For IT admins, it’s been difficult to gain control over all the identities and resources that are proliferating in their environment. They have tried using (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at: https://jumpcloud.com/blog/iam-function-cloud-user-management/