{"id":23892,"date":"2023-09-11T17:44:54","date_gmt":"2023-09-11T21:44:54","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=23892"},"modified":"2024-12-20T13:54:54","modified_gmt":"2024-12-20T18:54:54","slug":"comparing-jumpcloud-azure-ad-intune","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/comparing-jumpcloud-azure-ad-intune","title":{"rendered":"Comparing JumpCloud vs. Entra ID (Azure AD) and Intune"},"content":{"rendered":"\n

Microsoft has established itself in identity and mobile device management (MDM) markets through Microsoft 365 (M365). Many organizations, especially managed service providers (MSPs), are considering Entra ID (formerly, Azure Active Directory)<\/a> with Intune\u2122 for access control and unified endpoint management (UEM). This solution most strongly benefits the Microsoft ecosystem alongside features to support other platforms, and is a gateway to a broad portfolio of security products. Many of its capabilities are designed with enterprises in mind and implementing it can become resource intensive. M365 provides an expansive bundle of features and products.<\/p>\n\n\n\n

JumpCloud takes a different approach with its open directory platform<\/a>, which can consume identities from multiple providers and enable frictionless access into a wide variety of resources using standard protocols. The platform is designed so that small and medium-sized enterprises (SMEs) can follow Zero Trust<\/a> security strategies in identity and access control (IAM) by combining access control with UEM. It automates the user identity lifecycle for organizations that don\u2019t have large IT departments to implement those technologies. <\/p>\n\n\n\n

JumpCloud\u2019s Multi-Tenant Portal<\/a> also makes it possible for MSPs to provision the best resources, from any vendor, to build out their optimal stacks to take on new clients.
SMEs may have a difficult time selecting the appropriate solution when Microsoft and JumpCloud both provide cloud-based IT management tools for identity management and
device management<\/a>. There are, however, some differences and important considerations IT teams should be aware of. This article examines how they compare and the best fit for each platform.<\/p>\n\n\n\n

What Is Entra ID (Azure AD)?<\/h2>\n\n\n\n

Entra was created for the express purpose of extending Microsoft\u2019s presence into the cloud. It connects users with Microsoft 365 services, providing a simpler alternative to Active Directory Federation Services (ADFS<\/a>) for single sign-on (SSO). There\u2019s similar nomenclature, but it doesn\u2019t replace all the features of Active Directory and lacks support for key authentication protocols including LDAP and RADIUS<\/a> without add-ons. It provides SSO and multi-factor authentication (MFA)<\/a> for the Microsoft ecosystem as well as some external resources.<\/p>\n\n\n\n

Microsoft uses a structured gated licensing model with trial subscriptions and a free tier of Entra<\/a> with some restrictions. For example, there are limits on stored objects and the number of apps a single user can access with SSO and group management with role-based access control (RBAC) costs extra. Microsoft also charges for MFA for external identities. Entra\u2019s features, which include some time-limited trial services when users sign up, are listed on its website.<\/p>\n\n\n\n

It also serves as Microsoft\u2019s approach to a multi-tiered portfolio of identity, compliance, device management, and security products. The permutations of its cloud products, and challenges of migrating from Active Directory to the cloud, have given rise to a cottage industry<\/a> of consultants. This is due to the breadth of configurations, and resulting complexity, that many enterprise use cases require. However, some organizations may benefit from this approach. Integrations with other Microsoft services are aggressively marketed, and are oftentimes bundled together.<\/p>\n\n\n\n

\"Intune
Intune is a separate, but interwoven product that must be enabled and scoped from Entra ID<\/figcaption><\/figure>\n\n\n\n

What Is Intune?<\/h2>\n\n\n\n

Microsoft Intune serves as a UEM solution to administer features and settings for Android\u00ae<\/sup>, iOS\u00ae<\/sup>\/iPadOS\u00ae<\/sup>, Linux, and Windows. Windows receives the deepest level of support, but Microsoft is increasing its coverage for other platforms over time. For instance, Intune supports custom\/templated profiles for macOS, compliance policies, shell scripts, Apple Business Manager (ABM), and user\/device enrollment options. Linux support has rolled out slowly and focuses on compliance policies. Microsoft Edge is obligatory<\/a> to utilize some of its features, such as conditional access policies<\/a> for privileged users, extending Microsoft\u2019s overall footprint.<\/p>\n\n\n\n

However, Intune bolsters Microsoft products such as Edge and Configuration Manager as first-class citizens. Windows administrators will be familiar with aspects of how it works, such as ADMX templates. Intune is most robust when it is used to manage Windows systems that are hybrid AD-joined, in combination with other services and security solutions. Separate license requirements and costs may impact which security services will integrate with Intune.<\/p>\n\n\n\n

Here’s an overview of its features:<\/p>\n\n\n\n