Agile Directory

Agile Directory (pic of post it notes)

Today’s workplace environment is fast paced, and so are the resources that employees are leveraging to get work done. With Software-as-a-Service (SaaS) apps based in the cloud, a heterogeneous hodge podge of operating systems, wireless networks, and more, IT admins must be constantly on their toes. After all, fast-paced work environments need fast-paced identity management. IT admins need an agile directory service to keep up with that pace.

IT as it Was

old office

Naturally, one may think that IT technologies should advance at the same rate, so IT admins must already be using an agile directory, right? Well, in order to understand the state of IT now, we must follow its evolution. Flashback to the early 2000s. Y2K has blown over, the former governor of Texas is now President, and Blockbuster is still booming. In the workplace, the cubicle is still en vogue and Microsoft® Active Directory® (AD) is an IT admin’s bread-and-butter when it comes to authenticating access to IT resources.


Those days, however, were homogeneous, Windows®-centric, and deeply rooted on-prem. It only made sense to rely on a directory service that was specifically designed for the environment at hand. Compared to today’s workplace, the cube farm of yon was practically laid back, complete with cacophonous dial-up tones and fax machines.

IT Today

Such an approach is far too slow for the modern, cloud-forward era. SaaS applications, Mac® and Linux® devices, cloud servers and infrastructure. The list of IT innovations grows, heaping more and more on the admin’s identity management plate.

Despite this meteoric rise to the cloud, several key facets of IT remained grounded on-prem. First and foremost of these facets was the directory service. AD is still the most widely-used on-prem directory service on the market, but it is no longer the sole player in an organization’s identity management strategy. Since it was designed for the IT shop of the early 2000s, AD struggles to authenticate to cloud-based resources or other systems like Mac®or Linux®. Due to this inability, enterprises leveraging Active Directory today also require the help (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at:

Zach DeMeyer

Zach DeMeyer

Zach is a writer and researcher for JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, making music, and soccer.

zach-demeyer has 127 posts and counting.See all posts by zach-demeyer