The landscape of IT is one that is constantly evolving, challenging enterprises to find the best ways of maintaining security and managing user identities. Because of this, the traditional, on-premises methods of identity management have proven to be too cumbersome for some IT organizations, and many feel that now is the time for identity management migration to the cloud.
The History of Identity Management Migration
Modern identity management kicked off with the advent of the Lightweight Directory Access Protocol (LDAP). Developed by Tim Howes and his colleagues at the University of Michigan in the early 1990s, LDAP was a lighter, more accessible way to authenticate users and their PCs in an IT network. LDAP’s creation led to other innovations, namely Microsoft® Active Directory® (AD) and OpenLDAP™, which quickly became two of the most widely used identity management solutions. Active Directory would go on to own the directory services marketplace, largely because its focus was towards on-prem Windows® platforms. The tight integration with Exchange®, Office®, Windows File Server®, and other solutions locked in AD as the solution of choice for many years.
Just like with the creation of LDAP, however, the world of IT began to change. New IT solutions such as AWS® cloud infrastructure, G Suite™ and Office 365™ productivity suites, and web applications such as Salesforce®, Github, Slack, etc. began to shift the workforce from on-prem servers into a spacious new environment: the cloud. On top of that, Mac® and Linux® machines, WiFi, mobile, and more invaded organizations in a good way, providing better functionality and mobility. Users were becoming much more tech savvy and leveraging a wide range of interesting IT solutions. While all of these new solutions were providing improvements to IT as a whole, they left IT admins with a significant identity management challenge: Active Directory struggled with non-Windows platforms and off-prem resources. How could IT organizations deal with the identity management migration if the main arrow in their quiver couldn’t hit their new target?
One Identity to (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at: https://jumpcloud.com/blog/identity-management-migration/