The Domain Controller is Dead.

Long Live Cloud LDAP

With the dramatic shift to the cloud pushing infrastructure onwards and upwards, many IT organizations are asking whether the domain controller is really dead and gone. It’s actually a great question to consider as most IT admins would never have dreamed that the concept of the domain would ever be in jeopardy of going the way of the dinosaurs. As we walk through this transformation, we’ll try to steer clear of any Nietzsche-related references, but some allusions could admittedly slip through the cracks.

Letting Go of the Traditional Domain

Traditional DomainThe truth is that just like how the network perimeter has evaporated, so has the traditional concept of the domain. When Microsoft® introduced Active Directory Domain Services® (AD DS) and IT admins set up the domain on-prem with their Windows® environments, end users would be able to login to their Windows laptop/desktop and simply connect to just about anything they had access to.

As the IT landscape started to change with non-Windows and cloud-based IT resources, the concept of the domain became less valuable. On-prem infrastructure shifted from a source of enablement to a source of limitation. One identity no longer let a user into their resources outside of Microsoft Active Directory’s control, and as Mac® and Linux® grew in popularity, the downside of Microsoft-only restrictions grew impossible to ignore.

Of course, IT admins and MSPs tried to make this work with add-on identity management solutions such as identity bridges, web application single sign-on, privileged identity management, and more. Stitching these add-on solutions together into a patchwork sail that existed on top of Active Directory was a viable short-term approach, but the ship was never built to sail very far. A different approach was needed to take IT organizations into a new age that could reunite productivity with security.

For IT—The Truth Doesn’t have to Hurt

True Single Sign onWhile these add-on solutions helped solve some immediate problems, they actually added many others, including cementing IT organization’s on-prem with a limited identity and access management approach. Savvy IT organizations stepped back, saw the space growing (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by George Lattimore. Read the original post at:

George Lattimore

George Lattimore

George is a writer at JumpCloud, a central source for authenticating, authorizing, and managing your IT infrastructure through the cloud. With a degree in Marketing and a graduate degree in progress in Public Communications and Technology, George enjoys learning how the IT landscape is adapting to a diversified field of technology.

george-lattimore has 83 posts and counting.See all posts by george-lattimore