Benefits of Identity Management

Identity Management

With so many moving parts and pieces in the IT landscape today, IT organizations are completely rethinking their traditional approaches to identity management. Many are even questioning the foundations of IT itself, the identity provider (IdP). A great example of this is how many are wondering why they should have Microsoft® Active Directory® or an on-prem identity and access management (IAM) platform at all in the cloud era. With that thought in mind, this post will discuss the benefits of identity management.

Identity Management Primer

Before diving in, it is key to get a firm understanding of how we got here in the first place. The modern era of identity management really kicked off with the advent of the LDAP protocol at the University of Michigan by Tim Howes and his colleagues. The success of LDAP would lay the foundations for the birth of two additional core identity management platforms—the open source solution, OpenLDAP™, and the commercial solution, Microsoft® Active Directory® (MAD or AD).

These two platforms were designed to help control access to on-prem IT resources such as servers and applications. AD took it a few steps further by helping IT organizations control access to Windows® desktops and laptops, as well as securing and managing the user identities themselves. With Active Directory in place, IT organizations had a unique ability to provision user access to what their team needed via a single set of credentials. At the same time, IT admins could maintain strict control and security over their IT resources with Group Policy Objects or GPOs.

Dried-Up Benefits of Traditional IAM

While this system was great for Windows-based networks, the model was completely blown up with the advent of cloud infrastructure from Amazon Web Services® (AWS®) and web applications like Salesforce® and Google Apps™ (now G Suite™). With these new tools in place, end users now had to endure the friction and frustration of using many different services with many different ways to log in. Some sets of credentials worked for the Windows-based systems, while another set worked (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Ryan Squires. Read the original post at: