Adaptive Directory

Adaptive Directory

Part of what makes the future so exciting is the rise of new technologies. When it comes to systems and cloud computing, each industry is embroiled in a tight competition among three different competitors. For systems, Windows®, Mac®, and Linux® are engaged in a neck-and-neck race for the top of the market share pile. In cloud computing, Google Cloud®, Azure®, and AWS® are battling for supremacy in their space. Regardless of the outcome, every solution touts their own benefits, making them appealing to innumerable organizations. For the IT department of these organizations, however, managing user identities and their access to these disparate resources is a constant struggle. Is there an adaptive directory that can manage every solution, regardless of its provider?

The Traditional Directory

Active DirectoryBy the nature of that question, you can infer that traditional directories are not adaptive. Used by most IT organizations, the industry standard directory service is Microsoft® Active Directory® (AD or MAD). Being a Microsoft product, AD is obviously best suited for Windows environments. Unfortunately, when it comes to Mac and Linux systems, AD is poorly suited to manage and authenticate them. AD requires identity bridges and other add-on software for heterogeneous fleets. Although it doesn’t seem like much of a big deal, adding this toll to admins’ time and budgets creates a point of pain for IT organizations.

When it comes to cloud infrastructure, the on-prem Active Directory is also limited in its capabilities. Of course, Active Directory and Azure can interact amicably, but AD struggles to connect to AWS and Google Cloud servers and solutions. Add on Samba file servers, NAS appliances, wireless network access, etc. and AD’s effectiveness begins to dwindle.

What an Adaptive Directory Looks Like

A truly adaptive directory shouldn’t require additional tools to properly function in the modern era. An adaptive directory can federate user access to IT resources without concern of which resource that user chooses to use. This freedom of choice includes LDAP and SAML-based applications, local and cloud servers, and more.

IT resources shouldn’t (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at: https://jumpcloud.com/blog/adaptive-directory

Zach DeMeyer

Zach is a writer and researcher for JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, making music, and soccer.

zach-demeyer has 483 posts and counting.See all posts by zach-demeyer