Identity Management Migration

Identity Management Migration

The landscape of IT is one that is constantly evolving, challenging enterprises to find the best ways of maintaining security and managing user identities. Because of this, the traditional, on-premises methods of identity management have proven to be too cumbersome for some IT organizations, and many feel that now is the time for identity management migration to the cloud.

The History of Identity Management Migration

identity management market alternative

Modern identity management kicked off with the advent of the Lightweight Directory Access Protocol (LDAP). Developed by Tim Howes and his colleagues at the University of Michigan in the early 1990s, LDAP was a lighter, more accessible way to authenticate users and their PCs in an IT network. LDAP’s creation led to other innovations, namely Microsoft® Active Directory® (AD) and OpenLDAP, which quickly became two of the most widely used identity management solutions. Active Directory would go on to own the directory services marketplace, largely because its focus was towards on-prem Windows® platforms. The tight integration with Exchange®, Office®, Windows File Server®, and other solutions locked in AD as the solution of choice for many years.

RADIUS limitations

Just like with the creation of LDAP, however, the world of IT began to change. New IT solutions such as AWS® cloud infrastructure, G Suite™ and Office 365™ productivity suites, and web applications such as Salesforce®, Github, Slack, etc. began to shift the workforce from on-prem servers into a spacious new environment: the cloud. On top of that, Mac® and Linux® machines, WiFi, mobile, and more invaded organizations in a good way, providing better functionality and mobility. Users were becoming much more tech savvy and leveraging a wide range of interesting IT solutions. While all of these new solutions were providing improvements to IT as a whole, they left IT admins with a significant identity management challenge: Active Directory struggled with non-Windows platforms and off-prem resources. How could IT organizations deal with the identity management migration if the main arrow in their quiver couldn’t hit their new target?

One Identity to (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at:

Zach DeMeyer

Zach DeMeyer

Zach is a writer and researcher for JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, making music, and soccer.

zach-demeyer has 111 posts and counting.See all posts by zach-demeyer