Identity management 101 is learning how to manage user identities and securely connect them to IT resources. And with all of the recent changes in the IT landscape, this IT management category is one of the most critical for IT organizations to understand. This blog post offers an overview of traditional identity management concepts, and introduces a next generation cloud directory that offers identity management capabilities as a cloud-based service.
Intro to Identity Management
The ability to manage user identities effectively has been a critical challenge in IT organizations for many years now. In fact, the foundation of the modern understanding of identity management was established in 1993, with the advent of LDAP (Lightweight Directory Access Protocol). According to the co-inventor, Tim Howes, LDAP was created to provide low overhead access to the X.500 directory, which was the previous directory services standard.
“At the time, I was working for the University’s information technology division. The University was mostly on a homegrown mainframe system for email and directory services throughout the campus. I was assigned this project to deploy an X.500 directory for the campus, which I completed, but I quickly learned that it was way too heavy of a protocol and too complicated for the machines that were on most people’s desktops. LDAP came out of my desire to do something a little lighter weight to accommodate the Macs and PCs that were on everybody’s desktop.” – Tim Howes
LDAP was highly successful. In fact, according to Wikipedia, it became the internet standard for directory services in 1997, and laid the foundation for two other major innovations in the identity management space: OpenLDAP™ and Microsoft® Active Directory® (AD). These on-prem identity management solutions became a core aspect of the identity management infrastructure in virtually every organization around the turn of the century.
Evolution of Identity Management
Directory services house core user identities, which are then federated to IT resources such as systems, applications, files, and networks. Historically, this meant that your choice in identity provider was largely dependent upon your IT (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Vince Lujan. Read the original post at: https://jumpcloud.com/blog/identity-management-101/