As the <\/span>identity management<\/span><\/a> space heats up, with new approaches, technologies, and marketing terms being thrown around, it is critical for IT organizations to be able to quickly determine the <\/span>differences between solutions<\/span><\/a>. Unified access management is a new term that is being developed by analysts and vendors alike to convey that the concept of the user identity isn\u2019t just on-prem or in the cloud. Rather, it is an integration of those two concepts and much more. In this blog post, we\u2019ll discuss the question, \u201cWhat is unified access management?\u201d But first, we should provide some context. <\/span><\/p>\n\n\n\n
Historically, the core of the identity management world has been delivered from the on-prem directory services platform known as Microsoft\u00ae<\/span> Active Directory\u00ae<\/span><\/a> (AD). Active Directory was introduced in 1999, at a time when IT networks were largely Windows\u00ae based and on-prem. So it made sense for IT admins to implement Microsoft solutions such as <\/span>Windows-based systems<\/span><\/a> for user endpoints, <\/span>Office\u00ae<\/span><\/a> for productivity applications, <\/span>Exchange\u00ae<\/span><\/a> for email, <\/span>Windows Server\u00ae<\/span><\/a> for the file server and domain controller, and <\/span>Active Directory<\/span><\/a> to manage it all. The end result was that an end user would simply log in to their system, and they would subsequently have access to virtually any Windows IT resource. <\/span><\/p>\n\n\n\n
This approach worked well, just so long as the network was on-prem and Windows-based, but then <\/span>web applications<\/span><\/a> like Salesforce<\/span>\u00ae<\/span> and <\/span>Google Apps<\/span>\u2122<\/span><\/a> appeared. These applications were not based on Windows, nor were they on-prem. Consequently, Active Directory struggled to connect users to this new type of IT resource. That\u2019s when a generation of web application single sign-on providers emerged to solve this new <\/span>identity and access management<\/span><\/a> (IAM) problem. <\/span><\/p>\n\n\n\n
Web app SSO platforms were some of the first examples of what would become the <\/span>Identity-as-a-Service<\/span><\/a> (IDaaS) category of identity management. IDaaS solutions generally worked by integrating with the on-prem Active Directory platform. Their purpose was to federate user identities to web applications and other IT resources that couldn\u2019t be managed directly with AD. While effective, one consequence was that IT admins had to manage at least <\/span>one solution on-prem<\/span><\/a> and usually another in the cloud. <\/span><\/p>\n\n\n\n
This is because the web application SSO solution really only focused on the SAML protocol, while on-prem apps often leveraged Kerberos, LDAP, or other authentication protocols. Fast forward to now, and web app SSO providers have realized that they are only solving one piece of the puzzle. As a result, they are now having to go back and try to support on-prem applications as well. This is what unified access management means to these <\/span>first generation IDaaS organizations<\/span><\/a> that are trying to reinvent themselves in a multi-platform, heterogeneous environment. <\/span><\/p>\n\n\n\n
The challenge for these single sign-on providers is that they are not eliminating AD. To truly provide unified access management, the solution needs to become <\/span>the core identity provider<\/span><\/a> as well as the SSO solution. After all, first generation IDaaS solutions were essentially <\/span>Active Directory add-ons<\/span><\/a> that required existing on-prem identity management infrastructure to operate. Not surprisingly, IT admins can\u2019t help but wonder what this new approach will mean for them. So to answer the question, \u201cWhat is unified access management?\u201d, it\u2019s really just another partial <\/span>solution to the overall identity management puzzle<\/span><\/a>.<\/span><\/p>\n\n\n\n
For modern IT organizations, the concept of unified identity management goes far <\/span>beyond just SSO to applications<\/span><\/a>, regardless of location (i.e., on-prem or cloud-based). In fact, modern IT organizations need the concept of unified access management to be more like <\/span>True Single Sign-On<\/span>\u2122<\/span><\/a>. True SSO means that end users can leverage their core identity to connect them to virtually all of their IT resources \u2013 including systems, applications, files, and networks \u2013 regardless of platform, protocol, provider, and location. The good news is that a next generation True SSO provider has emerged that fits the bill. <\/span><\/p>\n\n\n\n
Called <\/span>JumpCloud<\/span>\u00ae<\/span> Directory-as-a-Service<\/span>\u00ae<\/span><\/a>, this next generation cloud directory services platform enables IT organizations to unify access management to virtually all of their IT resources. The same solution can also help IT organizations <\/span>replace their on-prem identity provider<\/span><\/a>, as well as their niche web applications SSO platform. The end result is that IT admins can <\/span>leverage one core identity provider<\/span><\/a> to connect users to on-prem and cloud applications \u2013 and everything else they need too. Sound too good to be true?<\/span><\/p>\n\n\n\n
Drop us a note<\/span><\/a> if we can help answer any questions or point you in the right direction. You can also <\/span>schedule a demo<\/span><\/a>, or <\/span>sign up<\/span><\/a> for a free JumpCloud Directory-as-a-Service account to see the future of unified access management in action today. We offer <\/span>ten free users<\/span><\/a> to help you explore the full functionality of our cloud directory services platform for as long as you see fit \u2013 and we don\u2019t even require a credit card to sign up. Join the JumpCloud family today!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"