Benefits of User Management

Benefits of User Management

The average workday of IT admins are chock full of tasks and to-dos. With IT infrastructure now being more critical to businesses than ever, IT admins are in demand. So, the value of everything they do must be analyzed and understood, especially from an executive’s perspective. Thankfully, the benefits of user management can be easily understood and agreed upon, given the long history of identity management within IT.

User Management Origins

The history of user managementThe modern era of identity management really kicked off with the advent of the Lightweight Directory Access Protocol (LDAP). LDAP’s conception subsequently helped to create two major identity management solutions, Microsoft® Active Directory® and OpenLDAP™. The concept behind these user management solutions was to give IT admins the ability to control user access to the IT resources they needed.

The open-source OpenLDAP was able to provide widespread availability of the LDAP protocol to give admins control over on-prem application and server access. Meanwhile, Active Directory (AD) was ideal to control user access to Windows® networks and resources. With these traditional, on-prem identity and access management (IAM) tools, IT admins had the ability to provision, deprovision, and modify user access centrally. IT organizations could also specify password complexity settings to help with security.

Changes to Identity and Access Management

How identity and access management has changedThe legacy OpenLDAP/AD approach to user management worked well for a quite a long time. As the IT landscape shifted cloudwards, however, the user management process turned more complex. In fact, because of the advent of SaaS applications and cloud infrastructure, most IT organizations ended up having to manage users is many disparate places, rather than from one centralized location.

For instance, since Active Directory struggles to authenticate non-Windows, cloud based resources, IT admins needed to invest in additional identity management tools to federate access to them. These add-on tools were most often called Identity-as-a-Service (IDaaS) or single sign-on (SSO) solutions. Additional add-ons required by organizations included identity bridges for Mac® or Linux® systems, governance tools, and security solutions like MFA enablers.

While these add-ons help IT admins to accomplish their user management needs (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at:

Zach DeMeyer

Zach DeMeyer

Zach is a writer and researcher for JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, making music, and soccer.

zach-demeyer has 318 posts and counting.See all posts by zach-demeyer