Identity Management Capability for User Management

Identity Management Capability for User ManagementOne of the core aspects of IT infrastructure is the identity management capability for user management. In fact, outside of running the network itself, there may not be a more important task for IT admins than identity and access control. Securely connecting users to the IT resources they need is a fundamental requirement for IT organizations in light of the shift to the cloud and identity security challenges.

The Onset of Identity Management

The Onset of Identity ManagementThe modern era of identity management kicked off almost 30 years ago with the advent of LDAP from our advisor Tim Howes and his colleagues. With PCs starting to emerge and networks being created, providing a lightweight method to authenticate and authorize user access to systems was critical, and ultimately, led to LDAP’s “birth.” The LDAP protocol would then go on to spawn two critical innovations in the IT sector: Microsoft® Active Directory® (MAD or AD) and OpenLDAP. Both helped usher in the era of directory services.

A core part of the directory service was user management. Also known as the identity provider, user management gave organizations the ability to create, delete, and modify user access. Through an identity provider solution, IT admins would connect their users to only the IT resources they were entitled to, rather than connect them manually. With an ever-increasing number of users and IT resources, a “database” of the connections was seemingly necessary, which is what identity management provided.

Challenges of User Management in the Modern Era

Challenges of User Management in the Modern EraThe challenge with user management is that things start to get unwieldy as IT infrastructure grows. AD did an excellent job of connecting users to Windows®-based resource, while OpenLDAP did a great job as long as the IT resource supported LDAP. Unfortunately, many new IT resources don’t fall into this category, and this creates a great deal of manual work for IT admins, even requiring additional identity management solutions to properly leverage.

More recently with the shift to the cloud and the move away from on-prem Windows platforms, IT admins are struggling with how to control user access to a (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by George Lattimore. Read the original post at:

George Lattimore

George Lattimore

George is a writer at JumpCloud, a central source for authenticating, authorizing, and managing your IT infrastructure through the cloud. With a degree in Marketing and a graduate degree in progress in Public Communications and Technology, George enjoys learning how the IT landscape is adapting to a diversified field of technology.

george-lattimore has 95 posts and counting.See all posts by george-lattimore