Connect Google Cloud Identity with Windows®

Connect Google Cloud Identity with Windows
As organizations invest in Google
® applications and services, such as G Suite and Google Cloud Platform (GCP), IT admins need to understand how Google Cloud Identity can support their overall identity and access management (IAM) initiatives. A key requirement in that discussion is how to connect a Google Cloud Identity with Windows® systems. But, why do organizations want to connect Google Cloud Identity with Windows in the first place?

The Evolution of IT with Respect to Google

The IT landscape has undergone quite the transformation in recent years. What began as an on-prem market dominated by Microsoft® has since become a diverse space in the cloud and on-prem with solutions from a variety of platforms and vendors. Google, for example, is one of the leading service providers in the space, and many IT organizations are already very familiar with their various offerings. And, with the recent introduction of a core Google identity (i.e., Google Cloud Identity), many organizations are viewing Google as a key cloud platform for their business.

However, IT admins often wonder if Google Cloud Identity can function as the core identity provider for all of their IT resources––rather than just Google applications and services. It’s a logical outcome, considering that these organizations are likely already using G Suite as their email platform and potentially GCP as their infrastructure. Yet, while Google identity management services can function as the user management system for G Suite, GCP,  and a select group of web applications, Google Cloud Identity is not meant to be an organization’s core identity provider.

This limitation manifests itself in the fact that you can’t connect a Google Cloud Identity with Windows, Mac®, and Linux® systems, either on-prem or hosted elsewhere (e.g., AWS®, Azure®). A Google Cloud Identity is also not what users will leverage to authenticate into most of their web and on-prem applications, file servers, and WiFi networks. Ideally, users and IT admins would be able to leverage a single cloud-based identity to connect to virtually any IT (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by George Lattimore. Read the original post at:

George Lattimore

George Lattimore

George is a writer at JumpCloud, a central source for authenticating, authorizing, and managing your IT infrastructure through the cloud. With a degree in Marketing and a graduate degree in progress in Public Communications and Technology, George enjoys learning how the IT landscape is adapting to a diversified field of technology.

george-lattimore has 80 posts and counting.See all posts by george-lattimore