With so much activity flowing through the IT market today, many IT organizations are searching for innovative ways to handle the changing landscape around them. One area of deep interest that has emerged recently is the identity management capability: Mac® user management. Let’s explore why this area has become a hot topic, and some of the challenges it faces going forward.
Growing Need for Mac User Management
As Mac systems infiltrate the organization at large, IT admins have been struggling with how to manage users and the systems themselves. In a 2016 study (JAMF), three out of four employees were found to choose Mac over Windows®. As a result, this issue remains present because existing identity and access management solutions struggle with Mac user and system management.
In fact, the most common IAM system, Microsoft® Active Directory® (MAD or AD), has largely focused on on-prem Windows platforms and applications which, of course, makes a great deal of sense from Microsoft’s perspective. The challenge is that IT networks are no longer homogenous, but rather mixed platform, provider, and location, and Microsoft is reluctant to make way. Employees are leveraging new and innovative platforms from Mac and Linux® systems to AWS® cloud server infrastructure to SaaS applications, such as Slack, GitHub, G Suite™, Office 365™, and more.
The struggle for IT organizations is, of course, how do they connect users to all of these disparate IT resources. Traditionally, that was accomplished by MAD, but with the shift to the cloud and non-Windows platforms, IT admins are seeking new identity management capabilities. Is it practical to continue to employ MAD while leveraging non-windows platforms and various IT resources from the cloud? Probably not.
Empowering Identity Management
These new requirements have to certainly include the identity management capability, Mac user management. It’s totally reasonable that IT admins want to be able to remotely control user access to Macs with the ability to provision, de-provision, and modify user access. Further, IT admins want to be able to also control Windows and Linux (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by George Lattimore. Read the original post at: https://jumpcloud.com/blog/identity-management-capability-mac-user-management/