Top Identity Management Solutions

Top Identity Management SolutionsAs the identity management space continues to enjoy a renaissance of sorts, a new generation of top identity management solutions has emerged for modern networks. The core of IAM (identity and access management) has primarily been owned by one solution for many years, and the only excitement came from solutions that could be added onto this core foundation. Now though, next generation identity management solutions are shaking up the market by shifting the core of identity management to the cloud.

A Brief History of Identity Management

History of Identity Management
For nearly two decades, Microsoft
® Active Directory® (AD) has been the core identity provider in the vast majority of IT organizations. Active Directory is Microsoft’s on-prem directory services platform designed for managing on-prem networks consisting of Windows®-based IT resources. When AD was brought to market in 1999, most enterprise networks followed this Windows-centric model. As a result, AD quickly became one of the most dominant identity management solutions to date.

By leveraging Active Directory in an on-prem, Windows-based environment, users could simply login to their Windows-based desktop or laptop, and they were subsequently granted access to any of the Windows-based IT resources they needed via the domain controller. On the flipside, IT admins were able to leverage a single identity management solution to centralize IAM for IT resources throughout the network. Not surprisingly, IT organizations loved it. Yet, for better or for worse, it wasn’t meant to last.

Modern Identity Management Challenges

modern identity management

Today, the key challenge is that modern networks are no longer Windows-based, nor completely on-prem. For example, Mac® and Linux® systems are more popular than ever, AWS® offers infrastructure as a cloud-based service, Samba file servers and NAS appliances are popular on-prem storage solutions, web applications exist for just about anything, and even the network itself has shifted from a wired connection to wireless via WiFi. With all of these changes and more, Microsoft’s legacy directory service platform has struggled to keep up. In fact, while AD may still be able to connect users to a small portion of their IT resources, the (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Vince Lujan. Read the original post at:

Vince Lujan

Vince is a documentation and blog writer at JumpCloud, the world’s first cloud-based directory service. Vince recently graduated with a degree in professional and technical writing from the University of New Mexico, and enjoys researching new innovations in cloud architecture and infrastructure.

vince-lujan has 133 posts and counting.See all posts by vince-lujan