Cloud LDAP Microservice

Cloud LDAP Microservice

A new generation of solution is taking the concept of microservices further than previously thought possible. The original idea behind microservices was to make more modular, easy-to-build software by leveraging standards and components, rather than building monolithic solutions. The benefits of this approach are enormous, and now, as they’re beginning to be realized, the concept of microservices is being taken to a whole new level. A Cloud LDAP microservice, in particular, provides an excellent example of the new heights this approach is capable of reaching.

The Beginning of a Cloud LDAP Microservice

Cloud LDAP

Usually in the past, microservices were thought of as little services within a software solution, or even within an internal network. In essence, a utility would be built that could be called by other systems or software as needed. This approach provided value and made a great deal of sense as a practical tool for software developers and IT admins.

Once built, the microservice would be delivered with a standard API and SLA that would enable other components to rely on the microservice to accomplish specific tasks. Assuming that the microservice was well built and scalable, you could count on this service to effectively accomplish a specific task, time after time. As a result, you saved time and money while avoiding some hassle.

Microservices Meet Authentication Services

Microservices Meets Authentication Services

The concept of a microservice is also applicable to the idea of authentication services. Historically, authentication, or user access control, has been handled by solutions such as Microsoft® Active Directory® (MAD or AD) or OpenLDAP. These legacy directory services solutions were heavy implementations requiring servers, software, redundancy, and many other items to ensure that users could access what they needed. IT admins had to continually maintain a high level of upkeep to ensure the authentication process was running smoothly.

So, given the level of work and integration required for legacy directory services solutions, this could hardly be considered a microservices approach.

As the IT landscape started to shift to the cloud, a variety of IT management solutions were shifting with it. The concept of authentication as a (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by George Lattimore. Read the original post at:

George Lattimore

George Lattimore

George is a writer at JumpCloud, a central source for authenticating, authorizing, and managing your IT infrastructure through the cloud. With a degree in Marketing and a graduate degree in progress in Public Communications and Technology, George enjoys learning how the IT landscape is adapting to a diversified field of technology.

george-lattimore has 44 posts and counting.See all posts by george-lattimore