{"id":106610,"date":"2024-02-26T16:48:18","date_gmt":"2024-02-26T21:48:18","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=106610"},"modified":"2024-02-27T16:59:44","modified_gmt":"2024-02-27T21:59:44","slug":"nested-groups","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/nested-groups","title":{"rendered":"Why Nested Groups Don\u2019t Exist in the Cloud\u00a0"},"content":{"rendered":"\n

Every Active Directory (AD) admin is familiar with nested groups. Rights are assigned to objects by virtue of their location in the tree; that\u2019s just how things work. It\u2019s convenient and makes entitlement management easier\u2026 until you consider its lack of maturity for identity governance. What once worked well now increases security risks and management overhead.<\/p>\n\n\n\n

Cloud directories have the benefit of shedding that type of technical debt. However, it\u2019s a change in how admins think about how entitlements are handled. The benefits that a flat structure brings to IT efficiency and security may not be obvious, even when attribute-based access control<\/a> (ABAC) solves identity governance problems that have been festering over the past 20 years.<\/p>\n\n\n\n

This brief examines why nested groups have become undesirable and discusses how cloud directories automate user\/device lifecycles and enable more effective work through dynamic groups. You\u2019ll also learn how cloud directories will increase your security.<\/p>\n\n\n\n

What Are Nested Groups?<\/h2>\n\n\n\n

AD is a directory services database and uses Lightweight Directory Access Protocol (LDAP<\/a>) for interacting with data. Its architecture enables admins to make one AD security group<\/a> a member of another, thus \u201cnesting\u201d one group within another. Members of that group then inherit the permissions and rights assigned to the parent group. That concept is simply referred to as nested groups<\/em>.<\/p>\n\n\n\n

Security groups in AD assign users and resources permission to access shared IT assets, and user assignments are either granted manually or by using PowerShell to create elaborate if-else conditions. Nesting is convenient for user provisioning when there are well-specified roles\/functions; however, it\u2019s vulnerable to human error. It\u2019s important that best practices are followed to avoid security breaches due to forgotten users or overprovisioning. <\/p>\n\n\n\n

Add-ons such as Microsoft Identity Manager (MIM) were created out of necessity to manage the identity lifecycle, because nested groups lack automated user management or the ability to synchronize identities between systems. An entire ecosystem of add-ons exists for this purpose.<\/p>\n\n\n\n

Admins that don\u2019t take a proactive approach to lifecycle management through access governance, or purchasing add-ons to extend AD\u2019s capabilities, will encounter problems.<\/p>\n\n\n\n

<\/p><\/div>

Note:<\/strong> \n

MIM is being <\/em>phased out<\/em><\/a> and replaced by Entra ID\u2019s premium SKUs for privileged access management. AD\u2019s access control model is being <\/em>modernized<\/em><\/a> by cloud directory services.<\/em><\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n

What Problems Can Occur with Nested Groups?<\/h2>\n\n\n\n

The biggest issue with nested groups is that members of child groups inherit the entitlements of their parent group(s)… which sounds intentional, <\/em>but unfortunately can result in unintended entitlements, entitlement conflicts, and troubleshooting challenges. This can be especially problematic when there\u2019s a complex organizational structure. <\/p>\n\n\n\n

Child groups aren\u2019t members of the parent object, but they inherit entitlements from it. It can be difficult for IT admins to unravel user entitlement issues if those entitlements are buried deep within those parent\/child entitlement relationships. Nested groups can also lead to individuals gaining improper access to files because of over permissioning.<\/p>\n\n\n\n

Group Policy Objects (GPO) are applied to groups for security. However, past configurations can unintentionally expose the environment. Today\u2019s cyberthreats aren\u2019t the same as before; they are more sophisticated. Configurations are layered on to deal with emerging threats, which adds to the complexity. <\/p>\n\n\n\n

GPOs can overwrite each other, and that makes audits\/compliance more difficult than it has to be. There\u2019s also no certainty that groups are secure. <\/p>\n\n\n\n

This scenario, coupled with continued reliance on nested groups, increases the security risks inherent to using these legacy technologies. Cloud directories don’t have that technical debt.<\/p>\n\n\n\n

Cloud Directories Deprecate Nested Groups<\/h2>\n\n\n\n

Cloud directory vendors, including JumpCloud and Microsoft, operate multi-tenant environments where organizational hierarchies had to be reimagined. Managing nested groups across different tenants would introduce complexities, performance problems, and issues with scalability. Implementing nested groups also fails to ensure interoperability and compatibility with other services. A more uniform approach is necessary in the cloud.<\/p>\n\n\n\n

<\/p><\/div>

Note:<\/strong> Don\u2019t be fooled: Microsoft\u2019s Entra ID is previewing a feature that replicates nested groups, but it doesn\u2019t revert back to the legacy way of doing things in AD. Users are still members of both the parent and child groups. Therefore, its entitlements are explicit and not inherited.<\/p><\/div><\/div><\/div>\n\n\n\n

Modern Directories Offer a Simpler, More Secure Experience <\/h2>\n\n\n\n

Modern directory services utilize a flat architecture where memberships are based upon the attributes of the user object within each organization. Entitlements are then applied directly to groups rather than through an indirect inheritance from the parent group object. This makes it much easier for admins to determine why a user object has a particular entitlement. <\/p>\n\n\n\n

In short, ABAC enables a more mature approach to entitlement lifecycle management through the creation of dynamic groups<\/a> that can automate membership changes. There are numerous benefits including easier on\/off boarding, increased efficiency and responsiveness, and stronger privileged access management (PAM).<\/p>\n\n\n\n

Better Alignment Between HR and IT<\/h3>\n\n\n\n

Dynamic groups streamline lifecycle management and break down silos between IT and HR. For example, a cloud directory can be integrated with human resources (HRIS) systems<\/a> so that changes made by HR are immediately reflected in access rights. Group memberships, which provide privileges to resources, change when a user moves to another department or leaves the organization.<\/p>\n\n\n\n

Increased Admin Efficiency and Responsiveness<\/h3>\n\n\n\n

IT becomes more efficient and responsive to business requirements simply by having ABAC. <\/p>\n\n\n\n

For example, a finance department can be granted access to AWS in order to do some audit work simply by adding a new attribute rule for that group. A \u201cnested\u201d or parent\/child group structure could create compliance, licensing, and security issues that would limit IT\u2019s ability to support finance. Adding finance to the \u201cAWS\u201d group would also grant access to applications that members don\u2019t really need or shouldn\u2019t have access to for compliance purposes.<\/p>\n\n\n\n

Privileged Access Made Easy<\/h3>\n\n\n\n

Access control is also strengthened when dynamic groups are used with conditional access<\/a> (CA) and technologies like phishing-resistant modern authentication<\/a> to manage privileged access from users to resources.<\/p>\n\n\n\n

Don\u2019t Waste Your Licenses<\/h3>\n\n\n\n

SaaS management is another benefit. You\u2019ll save on licenses for apps that are over provisioned to people who don\u2019t need access. That will make better use of your budget, resources, and prevent SaaS sprawl without the slow, manual process of auditing licenses.<\/p>\n\n\n\n

JumpCloud\u2019s Dynamic Groups<\/h2>\n\n\n\n

JumpCloud uses dynamic groups to automatically organize users and devices using basic attributes. It also includes basic operators to create compound queries, which will increase admin efficiency even further and streamline device and identity lifecycle management. Admins can also create custom attributes and configure the directory to fit their business needs.<\/p>\n\n\n\n

\"nested<\/figure>\n\n\n\n

If needed, static groups with explicit assignments are always an option.<\/em><\/p>\n\n\n\n

The open directory platform reestablishes the strong access control that Active Directory once provided in a domain-bound environment and extends it to all of your users and devices. It\u2019s possible to create dynamic groups for users and devices with a few simple steps, which reduces administrative overhead and provides security that\u2019s built around your assets<\/a>.<\/p>\n\n\n\n

Effective, Asset-Based Security<\/h3>\n\n\n\n

Group memberships in JumpCloud follow the ABAC model where entitlements are applied to individual groups. It offers a stronger approach to entitlement lifecycle management than nested groups by automating membership changes using attributes, which helps to enforce the principle of least privilege<\/a>. <\/p>\n\n\n\n

Dynamic groups have the added benefit of helping to protect confidential\/private information with less effort. Admins can configure simple logic using operators to become even more efficient through approvals and automated workflows. JumpCloud makes it easier for admins to determine why a user has access to something for easier auditability and increased visibility.<\/p>\n\n\n\n

It\u2019s also easier to introduce PAM. JumpCloud Go\u2122 works hand-in-hand with CA and dynamic groups to provide modern authentication while eliminating passwords and multi-factor authentication (MFA) fatigue. JumpCloud Go will soon be available for step-up authentication whenever an additional layer of verification is necessary. This feature supports heterogeneous environments including macOS, Linux, and Windows and will work with most browsers.<\/p>\n\n\n\n

A Workflow-Friendly Platform <\/h3>\n\n\n\n
\"nested<\/figure>\n\n\n\n

Membership conditions can be as simple as devices being automatically categorized into a group by operating system. However, compound queries, using operators, will introduce autonomous administration while strengthening device and identity lifecycle management\u00a0by taking more actions against groups.\u00a0<\/p>\n\n\n\n

For example, you could automate deployments by associating group memberships with a manager. HRIS integration expedites onboarding new team members through automation, which is made possible by using these expressions.<\/p>\n\n\n\n

Note: An admin could easily create one user group that \u201ccontains\u201d everyone in sales instead of managing multiple user groups for each region.<\/p>\n\n\n\n

The real-world impact is that onboarding is less time-consuming, permitting IT to move on with confidence that the user entitlements are correct. There\u2019s continuous evaluation\/attestation of user entitlements from that point onward, thanks to dynamic groups. Modern authentication and CA keep privileged resources more secure with less effort. Ultimately, IT team members will be freed up to focus on the deeper, more complex parts of their jobs to add more business value. <\/p>\n\n\n\n

You won\u2019t get any of that with nested groups.<\/p>\n\n\n\n

<\/p><\/div>

Note:<\/strong> \n

JumpCloud\u2019s PowerShell module<\/a> makes it even easier to report on users<\/a> and their associated groups and systems.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n

Try JumpCloud<\/h2>\n\n\n\n

Dynamic groups are a core part of the JumpCloud platform and don\u2019t cost extra to use. Try JumpCloud for free<\/a> and find out if it\u2019s the right option for your organization. You can also try a guided simulation and see what it\u2019s like to create dynamic user<\/a> and device<\/a> groups.<\/p>\n","protected":false},"excerpt":{"rendered":"

Dynamic groups are unconstrained by legacy. There\u2019s less administration, increased efficiency, and better security.<\/p>\n","protected":false},"author":150,"featured_media":91258,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"collection":[2778],"platform":[],"funnel_stage":[3015],"coauthors":[2535],"acf":[],"yoast_head":"\nThe Downsides and Risks of Nested Groups - JumpCloud<\/title>\n<meta name=\"description\" content=\"Dynamic groups are unconstrained by legacy. There\u2019s less administration, increased efficiency, and better security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/nested-groups\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Nested Groups Don\u2019t Exist in the Cloud\u00a0\" \/>\n<meta property=\"og:description\" content=\"Dynamic groups are unconstrained by legacy. There\u2019s less administration, increased efficiency, and better security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/nested-groups\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-26T21:48:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T21:59:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Worthington\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Worthington\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups\"},\"author\":{\"name\":\"David Worthington\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/185ca12034835ee50ee17b100abdfb2e\"},\"headline\":\"Why Nested Groups Don\u2019t Exist in the Cloud\u00a0\",\"datePublished\":\"2024-02-26T21:48:18+00:00\",\"dateModified\":\"2024-02-27T21:59:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups\"},\"wordCount\":1601,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups\",\"url\":\"https:\/\/jumpcloud.com\/blog\/nested-groups\",\"name\":\"The Downsides and Risks of Nested Groups - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg\",\"datePublished\":\"2024-02-26T21:48:18+00:00\",\"dateModified\":\"2024-02-27T21:59:44+00:00\",\"description\":\"Dynamic groups are unconstrained by legacy. There\u2019s less administration, increased efficiency, and better security.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/nested-groups\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg\",\"width\":512,\"height\":384,\"caption\":\"woman working at her desk on her laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/nested-groups#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Nested Groups Don\u2019t Exist in the Cloud\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/185ca12034835ee50ee17b100abdfb2e\",\"name\":\"David Worthington\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/d9acf1381c6e5b50c0f50d47b7b05411\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a6dde901b469c9005c22973e42038d62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a6dde901b469c9005c22973e42038d62?s=96&d=mm&r=g\",\"caption\":\"David Worthington\"},\"description\":\"I'm the JumpCloud Champion for Product, Security. JumpCloud and Microsoft certified, security analyst, a one-time tech journalist, and former IT director.\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\",\"david.worthington@jumpcloud.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Downsides and Risks of Nested Groups - JumpCloud","description":"Dynamic groups are unconstrained by legacy. There\u2019s less administration, increased efficiency, and better security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/nested-groups","og_locale":"en_US","og_type":"article","og_title":"Why Nested Groups Don\u2019t Exist in the Cloud\u00a0","og_description":"Dynamic groups are unconstrained by legacy. There\u2019s less administration, increased efficiency, and better security.","og_url":"https:\/\/jumpcloud.com\/blog\/nested-groups","og_site_name":"JumpCloud","article_published_time":"2024-02-26T21:48:18+00:00","article_modified_time":"2024-02-27T21:59:44+00:00","og_image":[{"width":512,"height":384,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg","type":"image\/jpeg"}],"author":"David Worthington","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Worthington","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/nested-groups#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/nested-groups"},"author":{"name":"David Worthington","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/185ca12034835ee50ee17b100abdfb2e"},"headline":"Why Nested Groups Don\u2019t Exist in the Cloud\u00a0","datePublished":"2024-02-26T21:48:18+00:00","dateModified":"2024-02-27T21:59:44+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/nested-groups"},"wordCount":1601,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/nested-groups#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/nested-groups","url":"https:\/\/jumpcloud.com\/blog\/nested-groups","name":"The Downsides and Risks of Nested Groups - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/nested-groups#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/nested-groups#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg","datePublished":"2024-02-26T21:48:18+00:00","dateModified":"2024-02-27T21:59:44+00:00","description":"Dynamic groups are unconstrained by legacy. There\u2019s less administration, increased efficiency, and better security.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/nested-groups#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/nested-groups"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/nested-groups#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/01\/remote-work.jpeg","width":512,"height":384,"caption":"woman working at her desk on her laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/nested-groups#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Why Nested Groups Don\u2019t Exist in the Cloud\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/185ca12034835ee50ee17b100abdfb2e","name":"David Worthington","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/d9acf1381c6e5b50c0f50d47b7b05411","url":"https:\/\/secure.gravatar.com\/avatar\/a6dde901b469c9005c22973e42038d62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a6dde901b469c9005c22973e42038d62?s=96&d=mm&r=g","caption":"David Worthington"},"description":"I'm the JumpCloud Champion for Product, Security. JumpCloud and Microsoft certified, security analyst, a one-time tech journalist, and former IT director.","sameAs":["https:\/\/jumpcloud.com\/blog","david.worthington@jumpcloud.com"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/106610"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/150"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=106610"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/106610\/revisions"}],"predecessor-version":[{"id":106618,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/106610\/revisions\/106618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/91258"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=106610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=106610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=106610"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=106610"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=106610"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=106610"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=106610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}