The average workday of IT admins are chock full of tasks and to-dos. With IT infrastructure now being more critical to businesses than ever, IT admins are in demand. So, the value of everything they do must be analyzed and understood, especially from an executive’s perspective. Thankfully, the benefits of user management can be easily understood and agreed upon, given the long history of identity management within IT.
User Management Origins
The modern era of identity management really kicked off with the advent of the Lightweight Directory Access Protocol (LDAP). LDAP’s conception subsequently helped to create two major identity management solutions, Microsoft® Active Directory® and OpenLDAP™. The concept behind these user management solutions was to give IT admins the ability to control user access to the IT resources they needed.
The open-source OpenLDAP was able to provide widespread availability of the LDAP protocol to give admins control over on-prem application and server access. Meanwhile, Active Directory (AD) was ideal to control user access to Windows® networks and resources. With these traditional, on-prem identity and access management (IAM) tools, IT admins had the ability to provision, deprovision, and modify user access centrally. IT organizations could also specify password complexity settings to help with security.
Changes to Identity and Access Management
The legacy OpenLDAP/AD approach to user management worked well for a quite a long time. As the IT landscape shifted cloudwards, however, the user management process turned more complex. In fact, because of the advent of SaaS applications and cloud infrastructure, most IT organizations ended up having to manage users is many disparate places, rather than from one centralized location.
For instance, since Active Directory struggles to authenticate non-Windows, cloud based resources, IT admins needed to invest in additional identity management tools to federate access to them. These add-on tools were most often called Identity-as-a-Service (IDaaS) or single sign-on (SSO) solutions. Additional add-ons required by organizations included identity bridges for Mac® or Linux® systems, governance tools, and security solutions like MFA enablers.
While these add-ons help IT admins to accomplish their user management needs (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at: https://jumpcloud.com/blog/benefits-user-management/