Identity Management Capability Mac® User Management

Identity Management Capability Mac<sup>®</sup> User Management

With so much activity flowing through the IT market today, many IT organizations are searching for innovative ways to handle the changing landscape around them. One area of deep interest that has emerged recently is the identity management capability: Mac® user management. Let’s explore why this area has become a hot topic, and some of the challenges it faces going forward.

Growing Need for Mac User Management

complete mac user managementAs Mac systems infiltrate the organization at large, IT admins have been struggling with how to manage users and the systems themselves. In a 2016 study (JAMF), three out of four employees were found to choose Mac over Windows®. As a result, this issue remains present because existing identity and access management solutions struggle with Mac user and system management.

In fact, the most common IAM system, Microsoft® Active Directory® (MAD or AD), has largely focused on on-prem Windows platforms and applications which, of course, makes a great deal of sense from Microsoft’s perspective. The challenge is that IT networks are no longer homogenous, but rather mixed platform, provider, and location, and Microsoft is reluctant to make way. Employees are leveraging new and innovative platforms from Mac and Linux® systems to AWS® cloud server infrastructure to SaaS applications, such as Slack, GitHub, G Suite, Office 365, and more.

The struggle for IT organizations is, of course, how do they connect users to all of these disparate IT resources. Traditionally, that was accomplished by MAD, but with the shift to the cloud and non-Windows platforms, IT admins are seeking new identity management capabilities. Is it practical to continue to employ MAD while leveraging non-windows platforms and various IT resources from the cloud? Probably not.

Empowering Identity Management

Empower ID mgmtThese new requirements have to certainly include the identity management capability, Mac user management. It’s totally reasonable that IT admins want to be able to remotely control user access to Macs with the ability to provision, de-provision, and modify user access. Further, IT admins want to be able to also control Windows and Linux (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by George Lattimore. Read the original post at:

George Lattimore

George Lattimore

George is a writer at JumpCloud, a central source for authenticating, authorizing, and managing your IT infrastructure through the cloud. With a degree in Marketing and a graduate degree in progress in Public Communications and Technology, George enjoys learning how the IT landscape is adapting to a diversified field of technology.

george-lattimore has 32 posts and counting.See all posts by george-lattimore