Identity Management 101

Identity management 101 is learning how to manage user identities and securely connect them to IT resources. And with all of the recent changes in the IT landscape, this IT management category is one of the most critical for IT organizations to understand. This blog post offers an overview of traditional identity management concepts, and introduces a next generation cloud directory that offers
identity management capabilities as a cloud-based service.

Intro to Identity Management

Intro to Identity ManagementThe ability to manage user identities effectively has been a critical challenge in IT organizations for many years now. In fact, the foundation of the modern understanding of identity management was established in 1993, with the advent of LDAP (Lightweight Directory Access Protocol). According to the co-inventor, Tim Howes, LDAP was created to provide low overhead access to the X.500 directory, which was the previous directory services standard.

“At the time, I was working for the University’s information technology division. The University was mostly on a homegrown mainframe system for email and directory services throughout the campus. I was assigned this project to deploy an X.500 directory for the campus, which I completed, but I quickly learned that it was way too heavy of a protocol and too complicated for the machines that were on most people’s desktops. LDAP came out of my desire to do something a little lighter weight to accommodate the Macs and PCs that were on everybody’s desktop.” – Tim Howes

LDAP was highly successful. In fact, according to Wikipedia, it became the internet standard for directory services in 1997, and laid the foundation for two other major innovations in the identity management space: OpenLDAP and Microsoft® Active Directory® (AD). These on-prem identity management solutions became a core aspect of the identity management infrastructure in virtually every organization around the turn of the century.

Evolution of Identity Management

evolution of identity managementDirectory services house core user identities, which are then federated to IT resources such as systems, applications, files, and networks. Historically, this meant that your choice in identity provider was largely dependent upon your IT (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Vince Lujan. Read the original post at:

Vince Lujan

Vince is a documentation and blog writer at JumpCloud, the world’s first cloud-based directory service. Vince recently graduated with a degree in professional and technical writing from the University of New Mexico, and enjoys researching new innovations in cloud architecture and infrastructure.

vince-lujan has 186 posts and counting.See all posts by vince-lujan