IDaaS or Directory Services?

If you are an IT admin, there’s little doubt that you have faced or soon will face the question, IDaaS or directory services? Why? Well, the IT landscape has changed so much that legacy approaches to controlling user access and managing systems are under tremendous pressure. Let’s dive into the question of IDaaS or directory services.

The Question of IDaaS or Directory Services

The analyst firm Stack Analysis recently tackled this topic in their paper comparing SSO and cloud directory services. First generation IDaaS (Identity-as-a-Service) platforms are essentially just web application single sign-on solutions, while directory services have been most synonymous with solutions like Microsoft® Active Directory®.

In the Stack Analysis research paper, a new generation of IAM solution is explored—the cloud directory service. This modern identity provider isn’t just Active Directory in the cloud, but rather a new approach on directory service as a whole. Cloud directory services are pushing to be the central point of control for users and systems and what those users need to access. These resources include systems, servers, applications, files, and networks regardless of platform, protocol, provider, or location. Now, that’s a far cry from the on-prem, Windows-centric Active Directory platform.

But this new identity provider approach seems to be frequently confused with another core IAM category, single sign-on (SSO). As web applications have become mainstays in organizations, connecting users to them has become more difficult. Active Directory doesn’t handle non-Windows and off-prem IT resources very well, so a new generation of vendors have created solutions to leverage AD identities to bridge user access to web apps.

So Which is Better?

With a greater shift towards cloud-based IT management tools, the question often becomes: can IT organizations replace their on-prem directory service with an SSO platform? The question often sparks more debate about system management, on-prem applications, file servers, and network access. Can an IT organization get away with just focusing on web applications and ignoring other IT resources, especially those on-prem?

For some organizations, the answer to that is yes. Their view is that the core of their IT resources are (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at:

Zach DeMeyer

Zach DeMeyer

Zach is a writer and researcher for JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, making music, and soccer.

zach-demeyer has 128 posts and counting.See all posts by zach-demeyer