Making AD Work with Remote Workers

A world where Microsoft® Active Directory® (AD) thrives looks much different than the world we’re currently working in. Before, workers walked into offices lined with cubicles that each housed their own desk. On each desk typically sat a Windows® computer, and on that computer was everything an employee needed to do their job. 

Now, employees use web applications and productivity suites to accomplish daily tasks, networks are wireless instead of wired, employees work on different operating systems (Windows, macOS®, and Linux®), and much of the world is working from home. This new way of working challenges organizations hosting Microsoft’s legacy directory service, as it struggles to manage user access to resources beyond the Windows domain.

Below, we’ll discuss key components admins need to address for enabling users as they work from home, and how they can make AD work for a remote workforce.

Remote Users Need to Access Their Work

Previously, only a small percentage of the user population was remote, so the focus on enhancing the remote user experience wasn’t necessarily there. Typically, IT admins taught the few users who worked from home how to work around issues, with the goal to get everybody productive quickly.

Now, remote user troubleshooting no longer applies to the minority of your workforce. It’s not as simple as helping one user who works from home; entire organizations are now operating on a full-time remote model.

IT needs to efficiently enable a wide range of users with access to an even wider array of IT solutions, including legacy and web applications, cloud and on-premises servers, physical and virtual file servers, and WiFi and VPN networks — all while being remote. The challenge with AD is that it wasn’t built for cloud technology and remote working. 

Managing Access to Cloud Resources

Active Directory struggles to grant user access to web applications, productivity suites, and Infrastructure-as-a-Service (IaaS) platforms like AWS®. As a result, admins enable point solutions to manage user access to non-Windows or cloud-based resources. 

Maintaining numerous identity management solutions is difficult for IT (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Kayla Coco-Stotts. Read the original post at: