In this modern era of IT technology, cloud-based solutions are considered king among most enterprises. Due to this, it seems like everybody has forgotten about on-prem, legacy applications. With all of the interest going towards modern web applications and how to connect users to them, on-prem solutions are often an afterthought. Of course, IT admins know that they represent critical systems within the organization, but they are also generally bulkier than their cloud counterparts. On top of that, they have a harder time integrating with other systems, be them on-prem or in the cloud. So, unified access management for legacy applications is definitely a requirement for modern identity management solutions.
The Modern IT Scene
Recently, the concept of unified access management has been making its rounds with analysts and vendors. The idea, as represented by these players, is that a single identity should be able to connect users to both web and legacy applications. The challenge with this definition is that it is often too narrow for modern organizations.
Today’s end users are leveraging a wide range of IT resources including systems (Windows®, Mac®, Linux®), cloud and on-prem servers (e.g. AWS®, GCP™, Azure®), productivity platforms such as G Suite™ and Office 365™, web and on-prem applications, physical and virtual file servers (NAS appliances, Samba file servers, G Drive), and wired and WiFi networks. All of these resources are a critical part of how work gets done.
Why Does IT Need Unified Access Management for Legacy Applications?
The challenge is that legacy identity management solutions such as Microsoft® Active Directory® (MAD or AD), and web application SSO platforms aren’t enough. Legacy applications require LDAP and sometimes RADIUS for authentication and control. For so many organizations, however, MAD is the go-to identity management solution. So, how can these IT admins obtain unified access management for legacy applications?
The good news is that there is a next generation cloud directory service that securely connects users to the IT resources they need, including systems, applications, (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at: https://jumpcloud.com/blog/unified-access-management-legacy-applications/