Unified access management (UAM) is a new term that has recently been created by analysts and vendors to describe a narrow view of the identity and access management (IAM) space, specifically, with respect to controlling web and on-prem applications. However, IT admins are curious if it is possible to expand the concept to include virtually any IT resource, so they can leverage a single identity to connect users to all of the resources they need, including applications and more. Fortunately, there is a way to apply unified access management concepts throughout your IT network via one comprehensive IAM solution. Specifically, in this blog post, we will consider the concept of unified access management for Linux®. But, before we get to that…
What is Unified Access Management?
The concept of unified access management is primarily being developed by traditional web application single sign-on (SSO) providers to describe the fact that some vendors now support on-prem applications as well. It used to be that IT organizations required separate solutions for managing web and on-prem applications. Now, though, depending on which web app SSO provider you prefer, that may no longer be the case. However, the needs of a modern IT organization, as it relates to IAM, have changed dramatically in the past decade. As a result, the concept of unified access management has grown beyond simply managing user access to applications, at least as far as IT admins are concerned, regardless of whether they are on-prem or remote.
So, as it relates to this blog post, what is unified access management for Linux? Theoretically, it would describe a similar concept that would enable IT to leverage a single identity to connect Linux users to Linux-based laptops, desktops, and servers from one centralized location.
What Unified Access Management Should Be
While unified access management may be a new marketing term in the IAM space, the concept of having One Identity to Rule Them All® is nothing new in IT. In fact, legacy directory services platforms such as OpenLDAP™ and Microsoft® Active Directory® (AD) applied this concept when they (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Vince Lujan. Read the original post at: https://jumpcloud.com/blog/unified-access-management-linux/