{"id":29701,"date":"2019-03-07T10:00:30","date_gmt":"2019-03-07T17:00:30","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=29701"},"modified":"2024-12-20T14:47:26","modified_gmt":"2024-12-20T19:47:26","slug":"ldap-use-cases","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/ldap-use-cases","title":{"rendered":"Use Cases for LDAP"},"content":{"rendered":"\n
LDAP is the Lightweight Directory Access Protocol<\/a>. Developed in 1993, LDAP is still widely used at businesses and organizations worldwide for directory-based authentication.<\/span><\/p>\n\n\n\n With the changing identity management landscape and all kinds of new, modern authentication protocols, many are wondering if LDAP is still relevant. In this post we\u2019ll start by listing some of the common use cases for LDAP \u2013 then we\u2019ll go on to explain how LDAP started and how it has adapted to the changing IT landscape. <\/span><\/p>\n\n\n\n We\u2019ll also share where we think LDAP is going: a cloud-based, \u201cLDAP-as-a-Service<\/a>\u201d approach that enables organizations to leverage the protocol without having to stand up their own LDAP servers<\/a>.<\/span><\/p>\n\n\n\n When is it appropriate to use LDAP? While LDAP can be considered a legacy protocol, it is still excellent with authenticating Linux-based applications including many open source solutions. Examples of use cases for authenticating via LDAP include:<\/span><\/p>\n\n\n\n This list makes no claims of being comprehensive. In fact, LDAP is such a versatile protocol that we would venture to say there are literally thousands of additional applications that can be integrated using LDAP.<\/span><\/p>\n\n\n\n In modern IT, how do you implement LDAP? It\u2019s a very good question because every IT resource seems to have its preference for protocol. The result is a need for a variety of authentication protocols, including SAML, RADIUS, OAuth, and others. The downstream impact is that IT admins and DevOps engineers end up needing to separately implement each protocol. This is called \u201csiloed identity management\u201d and it can be very time consuming.<\/span><\/p>\n\n\n\n But none of these protocols have completely taken over, so it is critical to have an identity and access management solution that can manage a variety of protocols. We\u2019ll go into further depth at the end about this, but that\u2019s what we\u2019re making at JumpCloud: a cloud-based identity provider that unifies IT resource management by supporting a wide variety of protocols through a single platform. <\/span><\/p>\n\n\n\nUse Cases for LDAP<\/span><\/h2>\n\n\n\n
\n
Using LDAP in a Multi-protocol World<\/span><\/h2>\n\n\n\n
How LDAP Started<\/span><\/h2>\n\n\n