One of the most critical aspects of IT is user management. After all, connecting users to the IT resources they need is not only a crucial operational function, but is also a matter of security. But, what do you need to take into consideration for user management in this modern era? Well, in this article, we’ll provide an introduction to user management that’s fit for the age of cloud infrastructure, web applications, and other types of new IT resources. First, let’s take a quick look at what is user management and how IT admins have historically gone about it.
What is User Management?
User management describes the myriad tasks behind making sure employees get access to the right systems, applications, file storage, and networks. It also entails making sure that users are implementing best authentication practices like strong, complex passwords and that access is revoked when an employee leaves the company. All in all, when proper user management isn’t in place, it’s challenging to keep company data secure, to provide a seamless workflow for end users, and for IT admins to make progress on higher value projects. It’s not really an IT management tool you want to take shortcuts with. So what options are there for user management?
Traditional User Management Options
Since the late 90’s and early 2000’s, IT admins have really had two options for user management. They could manually manage users in each individual IT resource or via the legacy directory services solution, Microsoft® Active Directory®. Of the two, Active Directory was the ideal option because all of the common resources at the time could be integrated with the directory service. This setup provided one central place where IT could make changes and have those changes propagate to all of the necessary digital tools. This user management option was quick, secure, and less prone to human error. Ultimately, this is why centralized user management platforms such as AD ended up being so successful.
The Rise of Active Directory
Of course, there were other reasons as to why Microsoft’s on-prem directory service was historically the user (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at: https://jumpcloud.com/blog/user-management-introduction/