One Login to All IT Resources: The Holy Grail of IT - Security Boulevard

One Login to All IT Resources: The Holy Grail of IT

By Zach DeMeyer Posted January 8, 2020

With all of the disparate IT resources at play in an organization, IT admins armed with traditional identity management tools struggle to manage access to them. In an ideal world, rather than a multitude of identities, IT admins can supply their users with one comprehensive set of credentials, meaning one login to all IT resources. 

Historically, this capability appeared to be a fantastical one, a flight of fancy akin to that of the mythical quest for the Holy Grail. But thanks to innovations in the modern cloud era, the concept of one login for all IT resources is closer than you might think.

History of Identity Management

IT admins know how difficult it is to provide end users with a single, comprehensive set of credentials. With a host of web-based applications, cloud infrastructure, a variety of endpoint systems, wireless networking, and more, IT admins have a tough time keeping track of all of the username/password combinations that each require. For the end users that leverage them, the task is even more arduous, which usually results in upticks in help desk tickets.

The First Unified Identity

Things weren’t always this way. In the early days of IT, admins relied upon Microsoft® Active Directory® (AD) to manage their users’ identities, which provided a core set of credentials for virtually all IT resources (as long as they were Windows-based).

Microsoft’s Windows® operating system (OS) was the de facto standard for nearly all systems used in the workplace. The OS dominated the applications space as well, and since the network consisted of wired connections, AD managed everything with relative ease. This near monopoly of the IT space established what is now known as the Windows domain, with AD as the domain controller. Of course, the IT landscape at that time was drastically different than it is now.

Disparate Times, Disparate Measures

After the Software-as-a-Service (SaaS) boom of the mid 2000s, Active Directory started to lose its grip on the average IT environment. Although these new innovations revolutionized work as we know it, (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at:

Zach DeMeyer

Zach is a writer and researcher for JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, making music, and soccer.

zach-demeyer has 492 posts and counting.See all posts by zach-demeyer