Serverless Identity and Access Management

Serverless Identity and Access Management

With the expansion of the cloud and software-as-a-service (SaaS) solutions, there may be some services that you may have never considered being delivered from the cloud. Generally, a majority of these services were at one point represented in the workplace as on-prem hardware/software solutions often taking up space in a server closet or data center. Now, as the cloud expands, the next generation of serverless identity and access management (IAM) solutions are making the move as well.

A Changing IT Reality

Historically, identity and access management solutions – namely the identity provider – have been delivered on-prem. Generally the first “modern” example of IAM solution begins with LDAP in 1993; LDAP is a directory services protocol created by JumpCloud® advisor, Tim Howes, and his colleagues at the University of Michigan. LDAP found great success and spawned two successors: OpenLDAP™ and Microsoft® Active Directory®(AD or MAD). OpenLDAP, released in 1997, is generally used for technical applications and AD is the commercial market share leader in the space. Active Directory, along with the domain controller, provides a user’s identity and then authorizes and authenticates that identity to the on-prem Windows-based resources it requires. Microsoft Active Directory also extends identities to a wide range of other add-ons and patches to AD including single sign-on (SSO), identity bridges, privileged identity management, and many more.

But, IT is changing and an on-prem delivery model has not displayed the flexibility that IT admins prefer. Often, an on-prem identity provider simply acts to hinder a cloud forward approach. Recently, some of these add-on solutions have made their way to the cloud, but the core of the identity and access management infrastructure, usually Active Directory, remained on-prem. The challenge for IT organizations has been that the rest of their IT infrastructure is shifting to the cloud while users are migrating non-Windows platforms like Mac® and Linux® systems. The result is that AD struggles with managing the entire IT infrastructure without heavy investments in add-ons and the time it takes to implement and configure them.

While many of your most used applications and (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Ryan Squires. Read the original post at: